WO2004107162A1 - Systeme de mise en correspondance et de manipulation de base de donnees dynamique orientee objets - Google Patents

Systeme de mise en correspondance et de manipulation de base de donnees dynamique orientee objets Download PDF

Info

Publication number
WO2004107162A1
WO2004107162A1 PCT/US2003/015356 US0315356W WO2004107162A1 WO 2004107162 A1 WO2004107162 A1 WO 2004107162A1 US 0315356 W US0315356 W US 0315356W WO 2004107162 A1 WO2004107162 A1 WO 2004107162A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
database
data source
access
cocobase
Prior art date
Application number
PCT/US2003/015356
Other languages
English (en)
Inventor
Ward Mullins
Alexandre Martins
Original Assignee
Thought, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thought, Inc. filed Critical Thought, Inc.
Priority to PCT/US2003/015356 priority Critical patent/WO2004107162A1/fr
Priority to AU2003304169A priority patent/AU2003304169A1/en
Publication of WO2004107162A1 publication Critical patent/WO2004107162A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/289Object oriented databases

Definitions

  • the present invention relates in general to correlating or translating one type of database to another type of database or to an object programming application. Correlating or translating involves relational to object translation, object to object translation, relational to relational, or a combination of the above.
  • the present invention is directed to dynamic mapping of databases to selected objects in a system that supports dynamic class inheritance and distributed caching with either or both of Object to Relational and Relational to Object mapping, and including Cartesian model mapping support and class inheritance model mapping support in a database manipulation and mapping system.
  • this approach to conversions does not provide for communicating the conversions in an efficient manner as, for example, to other entities who may need the same type of conversion on similar data, or who may require the conversion to access the data in another way.
  • this can get exceeding complex.
  • Another drawback of conventional systems and techniques is that dynamic mapping of objects to multiple types of databases is virtually impossible, because the tailored hand code must be updated and recompiled. This may require that an application be stopped and restarted in order to implement mapping changes, i.e., the mapping changes are not dynamic.
  • relational database model is still the most widely accepted traditional format for reliable and quick access to data while using complex data search queries.
  • This model allows the user to store data records and to access the data via a query language that uses relational expressions such as AND, OR, NOT, etc.
  • relational expressions such as AND, OR, NOT, etc.
  • JDBC drivers have been designed to formulate database specific SQL queries or statements from standard SQL strings passed to them by an object programming application.
  • JDBC drivers are specific to a database, and separate statements and separate JDBC drivers must be utilized to access different databases. This is complicated by the fact that many object programming applications either do not permit simultaneous attachment to multiple databases or poorly coordinate transactions that impact multiple databases. Accordingly, relational databases can sometimes be awkward to access, and transferring data from one database to another database can be slow and painful, unless a specific transfer program has been specifically written or tailored to effect that specific transfer of data.
  • the object database model is a newer model that has rapidly increased in usage due to recent trends such as the world-wide-web and application service provider (ASP) architectures.
  • ASP application service provider
  • Such object databases have sometimes been used as the primary source for accessing data, for example, Jasmine and ObjectStore are available from Computer Associates Intl., Inc.
  • object applications have tended to only use simple memory buffers with relational and object databases. Difficulties existed with using either an object database or a relational database to serve as a transient memory resident database "cache" (secondary database) to try to speed up database accesses. No commercially viable solutions have existed with acceptable performance.
  • an object programming application to successfully access a secondary transient memory resident database, as either a relational database or an object database.
  • a dynamic database mapping tool would be necessary to provide the object programming application with a map or maps to both the primary and secondary databases in order to successfully implement a dynamic transient memory resident database. It would be particularly helpful in optimizing the performance of an object programming application if there could be provide a memory resident object database (or a resident portion thereof) as a cache for data retrieval. In such a case it might be possible to directly access (and perhaps re-use) data objects stored in the secondary transient resident memory database, including their metadata, instead of generating data objects from accessed data.
  • It yet another object of the present invention to provide a mapping system wherein multiple objects can be used for a particular map, and preferably providing parent-child two way navigation and inheritance as well as Cartesian model support in a mapping system.
  • Another object of the present invention is to provide such a mapping system wherein object programming applications are tailored to delegate accessing a database and the generation of SQL strings to a runtime library repository, which repository can access the database directly or through a database driver, such as a JDBC driver, without the need to imbed specific database accessing mechanisms in trje application code. It is a preferred object of the invention to provide such a system with a concurrent parameter setting mechanism where the runtime library repository can be set to access a particular database and to generate database specific database calls and SQL strings.
  • a software program or software module such as an API, that can be optionally utilized when another software program or module is generating application programming code from database maps to provide a programming application that will delegate to a runtime library repository the functions of accessing a database and the generation of SQL strings that are specific to a database or JDBC driver.
  • the runtime library repository can be modified and tailored to optimize database access calls and SQL strings for a particular database.
  • such repository supports both Cartesian models and Inheritance models for an object to relation, object to object or relational to object mapping system.
  • Particularly ideal is to provide for such global changes to a distributed cache or a distributed object model that is being used or navigated.
  • Distributed caching of an object model to handle the existence of multiple object navigators is an ideal object of this invention.
  • both the primary data source and the cache data source are registered with the transaction coordinator facilities of the server, and
  • the cache data source acts as secondary data source to speed up data accesses for an object application and the cache data is plugged into the object to relational mapping layer, and
  • the cache data source can be set up as a memory-resident entire database, a disk resident database, or both a memory resident database and disk resident which are synchronized.
  • the memory resident database may be a portion of the disk resident database and the size of the memory for the memory resident database can be set by the user.
  • Another object of the present invention is to provide a database access repository, or a collection of repositories, comprising a runtime library repository having the ability to make database specific calls and to generate database specific SQL strings, and comprising other libraries, information and logic that permit mapping of information related to one or more of a member selected from the group consisting of relational databases, object databases and object programming schemas, and the like.
  • the database access repository may contain one or more items selected from the group consisting of maps of database schemas, object definitions, other programming definitions or parameters, object metadata, database settings, complex relationship definitions.
  • metadata can be placed in a separate structure from the Java object application and can be independently stored and accessed in a database access repository file collection, or in a separate file.
  • an object to relational repository can include a runtime library repository that can be optimized for a particular database and has the ability to access multiple database types, wherein the runtime library repository can be access by object programming applications that delegate database access and SQL string generation to the runtime library repository.
  • a software programming module can automatically generate object source code from at least one database schema map, at least one object programming application schema, or from a combination of at least one database schema map and at least one object programming application schema.
  • the code generated for the application can be set to delegate database access and SQL string generation to the runtime library repository instead of including within the application the more limiting code for non-delegated database access by the application.
  • This arrangement allows the mapping information and associated metadata to be easily accessed, changed and used to convert thousands of lines of code in a data object, as needed.
  • the mapping information can be used to map from objects to relational models or vice versa and generate appropriate code.
  • Figure 2 is a concise flow chart depicting the operation of the system in U.S. Patent No. 5,857,197 in a system comprising (a) an object language application program, (b) a data source manager and abstraction layer system embodiment of the 5,857,197 patented invention such as the CocoBase Enterprise O/R Software Tools Suite Version 4.0 (soon to be released) of Thought, Inc, San Francisco, California, and (c) a relational data source and JDBC driver.
  • the operation of the system of Figure 2 in the context of the flow chart operation will be described in detail below by referring to the Figure 1 numbering system.
  • Figure 3 is a diagram depicting the comprehensive operation of the present invention as described in Figure 2, further including a number of system components or connection points for additional components.
  • the wavy cloud that surrounds some of the system depicts the CocoBase components and the portion of the system that is called the Java environment.
  • the additional component that are shown in Figure 3 beyond the components described in Figure 2 are (1) a CocoBase Object Access and Storage Adapter software module, (2) a CocoBase Object Model Repository (maybe stored in a separate data source or in the system DataSource Relational Database), (3) a Plugin API (and optional caching database attached via the API) to the CocoBase Mapping Layer for caching one or more members of the group consisting of database data, query string(s), CocoBase Map(s), and data object(s), and (4) a CocoBase Dynamic Object/Relational Respository as a separate file, which could also be stored in the DataSource Relational DataBase.
  • FIG. 4 is a diagram depicting the comprehensive operation of the present invention as described in Figure 3, further including a number of system components or connection points for additional components.
  • the additional components shown are (1) an CocoBase Development Software module called CocoAdmin having command line and/or GUI interfaces for accessing, editing and creating new maps, for generating source code, for compiling object classes from source code, or for generating J2EE components such as EBJs from CocoBase maps, (2) one or both of a CocoBase CocoDriver Server, (3) Object Access and Storage Adapter for processing the storage of objects or object schema(s), which may access or process them in the form of objects for an object database, as a UML file for a UML modeling tool, or may convert the objects or object scheme to or from one or more of UML, XML or XMI format representations of such objects or object schema(s), (3) an optional CocoBase Object Model Repository file, which may be stored as stand alone files, in an Object or Relational data source, or an XML repository, and (4)
  • Figure 5 is a diagram depicting the comprehensive operation of the present invention as described in Figure 4, shown without the optional Object Modeling Tool Data File component, but further including a number of system components or connection points for additional components.
  • the additional components are useful in a caching system or in a system for porting data from a first data source to a second data source.
  • These additional components shown in Figure 5 are (1) a second JDBC driver connection, and (2) a Second DataSource or Cache DataBase, where the Cache database may exist completely or in part in the system RAM, and may concurrently have a fixed storage medium component for the caching system.
  • FIG. 6 is a diagram depicting the comprehensive operation of the present invention that combines all of the components described in Figures 2-5, or lists them as options within the diagram.
  • This diagram shows a system having both a DataSource Relational DataBase and an Optional Object Database DataSource, as well as an Optional CocoBase Data Migration Tool.
  • This migration tool can migrate and translate data between each of an Object database, a Relational database, an XML storage file, and a flat text file XMI file.
  • An optional migration tool has the ability to migrate and translate to and from a UML format and an XMI format.
  • Other system components have been described further in Figures 2-5. Also, how to implement or remove various components in a system as shown in Figure 6 is further described below in the detailed description of the invention.
  • Figure 7 is a concise flow chart diagram depicting the comprehensive operation of the present invention, and including a number of variations on the basic system described in Figure 2.
  • the components in Figure 7 that have the same numbering as components in Figure 2 will have the same description as those components as described for Figure 2.
  • the invention of Figure 7 includes (a) a new component or set of components and/or logical steps (3 A) for caching objects, data or maps, (b) a new component or set of components and/or logical steps (7, 51, 52, and 8) for evaluating XML information and for extracting objects, data or maps from the XML information for placement in a object (information can be in XML format) and sending the object to the Object Application 101 in response to request (2A), (c) an new component or set of components and/or logical steps (4B) for converting objects, object schema, data, meta data, or maps into one or more of an XML file or into an XMI file.
  • FIG. 1 illustrates one such embodiment involving a request 100 by an object application 101 and the processing of such request.
  • the system according to one embodiment of the present invention comprises an object schema 200 including meta data 201 corresponding to a data store schema 300, a first adapter 400, and a second adapter 500.
  • the object application 101 is a java applet "cocodemo.java" as listed in Appendix A of U.S. Patent No. 5,857,197 ('197 patent), issued January 5, 1999.
  • One embodiment of the '197 patent invention used a user defined object view of an underlying non-object store, i.e. the object schema 200.
  • the object schema 200 was accessed by an object application 101 through an abstract layer 600 which does the necessary conversions between object and non-object views.
  • This abstraction allowed both kinds of data stores—object and non-object (e.g., relational) ⁇ to be accessed identically from at least one object application 101.
  • the '197 patent invention was capable of accessing objects distributed over a three tier environment using exactly the same application program interface (“API ”) 700 as the local two-tier environment. This wa accomplished by using access "adaptive" technology comprising the adapter abstraction layer 600.
  • API application program interface
  • the adapter abstraction layer 600 of the '197 patent performs any translation work necessary for converting objects to both object data stores 312 and non-object data stores 302.
  • the adapter abstraction layer 600 provided a consistent API 700 for both object and non-object data stores and enables application programmers to migrate between various object stores without application modification.
  • the adapter abstraction layer 600 also facilitated communication with a remotely available second adapter 500 without modifying the object application 101 programming logic.
  • the '197 patent includes the use of meta data 201 (i.e., data used to describe other data) to define how to access and convert non-object data store content 304 to objects and back. This was accomplished by paring down the non-object data store schema 300 into its various components including tables, fields, and conditions 305 in one embodiment.
  • the paring made the creation, management, and access to the meta data 201 to be a convenient and elegant task.
  • the '197 patent provided an abstract view of an underlying data store(s) 302 (312, 322) as an object store.
  • the effected abstraction produced an architecture whereby the underlying data store(s) 302 (312) as well as multi-tier adapters (e.g., 400, 500, 4XX, and 5XX) could be interchanged without object application 101 code modification.
  • the adapter abstraction layer 600 and more specifically the first adapter 400, communicated with a server process, more specifically the second adapter 500, in communication with the underlying data store 302, which transferred the requested data store content 304 to and from the first adapter 400 in communication with object application 101 client.
  • the first adapter 400 instantiated the object 112 from more primitive data types comprising data 115, reflecting the data store content 304 obtained from the server process, more specifically the second adapter 500.
  • the method of breaking down objects 102 (112) into the corresponding primitive types comprising data 105 (115) ensured successful transfers of any kind of object irrespective of object application 101 views of the object(s)' data elements.
  • the ' 197 patent invention used the adapter technology to dynamically load data store access code 205 at runtime.
  • This architecture requires objects to serialize themselves in order to be persistable or for the computer language and language runtime to be able to inspect and set an object's structure in such a way as to be able to automatically persist the object's contents.
  • Persistable is a term of art which means an object's contents can be saved to some more permanent location such as a computer disk, and in this case refers to the storage and retrieval of the object's contents from a data store.
  • the present invention can readily adapt to an N-tier adapter solution which accesses the data store through some intermediate data server, thereby increasing deployment and scalability options.
  • FIG. 1 of the '197 patent shows one embodiment of the '197 patent invention which worked in conjunction with an object schema manager 203.
  • the object schema manager 203 allowed data store administrators to create and maintain an object view of data store content 301 stored in the data store 302.
  • the object schema manager 203 could read, write, and update the meta data 201.
  • One embodiment of the ' 197 patent invention was directed to accessing non-object (e.g., relational) data stores 302, creating meta data 201 based on data store schema 300 comprising tables, fields and clauses or conditions 305, making up the data store 302.
  • non-object e.g., relational
  • One such embodiment of the '197 patent comprised a set of tools which were designed to create and maintain the meta data 201 by storing the information in a repository (such as the data store 302 itself), which information was then loaded by the second adapter at runtime.
  • This meta data 201 then served as a map for operations available on the data store(s) 302 (312), for the way these operations should be performed and under what conditions.
  • FIG. 1 of the '197 patent further illustrated how the object schema manager 203 facilitates the creation and maintenance of the object schema 200, thereby increasing productivity and reducing the opportunities for typographical errors, which can create preventable runtime errors.
  • the object schema manager 203 permitted dynamic modification of object schema 200 without requiring modification or recompile of the object application 101 to ensure that the object application clients were not 'brittle' or limited to a particular database or object model as is traditionally the case in data store access applications.
  • One embodiment of the '197 patent used the meta data 201 to construct an object view of the data store schema 300, e.g., an object schema 200, and used the meta data 201 to generate one or more commands 303 for accessing the data store content 304.
  • the deployment of meta data 201 in this way in one embodiment had the effect of using the non-object data store(s) 302 to be described and accessed as object(s) 102, though its contents might have been more rudimentary and abstract.
  • One embodiment of the '197 patent stored meta data 201 in a data store 204 and dynamically loaded and executed meta data 201 at runtime.
  • access code 205 corresponding to the command(s) 303 is centrally created and managed in a central repository, i.e., data store 204.
  • Such central repository architecture allowed the object schema(s) 200 to be re-used across objects 102 (112) and object applications 101 (111, 121).
  • Such an approach also allowed for any changes of one object schema 200 to be transparently reflected to any client object application 101 accessing and using the object schema 200, without the need for object application 101 modification or recompilation.
  • the '197 patent contemplated a notification mechanism so that data store 302 modifications resulting from requests in one location could be immediately communicated to all object applications 101 accessing that object schema 200.
  • One embodiment of the '197 patent facilitated the separation of data store access code 205 (such as Structured Query Language "SQL") from the object application 101 logic.
  • SQL Structured Query Language
  • This facilitated simple and rapid application development and lowered maintenance cost for a computer system that required database access by improving the flexibility of the object application 101 and by reducing the brittleness of the object application 101 client(s).
  • users of the invention described in the '197 patent could attain a cost savings by centralizing the task, reducing the possibility of typographical errors, installation problems, and skills availability shortages.
  • the object stores could be created and managed by someone with data store (i.e., relational) expertise (as most modern organizations have) without requiring those individuals to also have object programming expertise.
  • One embodiment of the '197 patent resulted in an architecture for centrally storing and managing object schema 200 to promote re-use, effect enhanced performance, and better use of (MIS) engineering and administrative personnel skills.
  • storing the access code 205 within the physical confines of the non-object data store 302 in one embodiment created a centrally manageable and maintainable system for accessing that non-object store 302.
  • the object schema manager 203 thus allowed for better use of the MIS personnel's skill sets by focusing on data access in terms familiar to people maintaining their respective system. That is, one embodiment of the '197 patent allowed object application engineers to concentrate on applications code without concern for or need to learn SQL or any other native access code 205 of the data store 302.
  • data store administrators could concentrate on managing and maintaining the data store(s) 302 without knowledge of application programming and without concern that any changes in the data store content 301 or data store schema 300 would adversely affect the object application(s) 101 in communication with the data store(s) 302 according to one embodiment of the ' 197 patent.
  • a central management architecture provided by one embodiment of the '197 patent allowed data store specialists to see, manage and control all access to the data store(s) 302 down to the individual access code 205 commands. It also allowed for the fine tuning and reconfiguration of those commands by the data store specialists, without involvement of object application developers. This architecture allowed the best skills to complete the respective task at hand without impacting or being impacted by a possible lack of skills that an individual for another area.
  • the object schema manager 203 allowed for the arbitrary creation and management of object schema(s) 200 via a point and click interface, thereby significantly increasing the efficiency of creating the data store access code 205, and improving the reliability of the overall system.
  • This embodiment also allowed completely arbitrary joining and combining of the data store content 301 as a single object view of that data, and overcame the constrained and often uselessly arbitrary or non-existent foreign key constraints of conventional mapping systems and data stores.
  • These hard-coded links such as foreign key constraints may not be supported properly by all underlying data stores, and not be implemented by the specific customer's data store (often legacy) implementation. New foreign key constraints are often not possible on some data stores because they may not work properly with older applications if the constraints were to be created and enforced.
  • a foreign key is generally accepted as a predefined relationship or link which the data store manages in order to ensure that records are properly related in a database.
  • a simple example would be to have a foreign key between an order number in an order table, and an order number in a line item table which keeps the individual items belonging to that order.
  • the foreign key in this example would be between the order numbers in both tables, which might not allow, for example, a line item record to be entered if there is no order in the order table corresponding to the order number.
  • a join using this embodiment of the '197 patent may occur on any arbitrary field of any table within the data store schema 300, even if a foreign key does not exist between the fields of the two tables to be joined.
  • Such flexibility is immeasurably useful when combined with the ability of the object schema manager 203 to access more than one data store 302 at the same time.
  • the resulting architecture of the '197 patent allowed data store content 301 from one data store 302 to be joined with data store content 311 from another data store 312 through the object schema manager 203 without requiring any data store schema 300 changes to either system whose content is being joined.
  • Such transparent and independent flexibility is of utmost value for the many diverse data stores currently operated by most large and small business and other entities.
  • One embodiment of the '197 patent provided a way to manage the data store access code 205, requiring only an understanding of the data store 302 and the data store schema 300, instead of requiring object programming knowledge within the modem working environment.
  • the object application 101 running in the application environment 103 sends a request 100 for an object 102 (possibly including an object data with lookup attributes to be matched) located in at least one data store such as an object data store 312 or a relational data store 302 in one embodiment of the subject invention.
  • the request 100 was dynamically translated to a data store specific request which was then executed and results of which were parsed and new data object(s) 112 created and initialized with the results of the executed request 100.
  • the request 100 and the accompanying object '197 patent was passed from the object application 101 to the adapter abstraction layer 600 comprising the first adapter 400.
  • the first adapter 400 then extracted the object attributes 103 and the object name 104 from the object 102, and packed the object attributes 103 and the object name 104 as data 105 to be used in communication and transport layers.
  • the first adapter 400 then communicated the data 105 and the request 100 to the second adapter 500.
  • the communication medium 630 between the first adapter 400 and the second adapter 500 may comprise an Internet connection, whereby the second adapter 500 is operating inside a firewall.
  • Logical division 650 comprised a logical separation between a client, e.g., the object application 101, and a server, e.g., the abstraction layer 600 and more specifically the second adapter 500.
  • the second adapter 500 searched a meta data-map 206 comprising at least one object name 114 using the object name 104 to determine whether the object name 104 existed in the meta data map 206. If the meta data map 206 contained the object name 104, then the second adapter 500 used the object attributes 103 and the found meta data map 201 to generate at least one command 303 for accessing the data store 302 according to the request 100, if the command has been enabled, ensuring further security by restricting access.
  • the second adapter 500 then executed at least one such command 303 as a data store access client server process 700 in communication with the data store 302 using a JDBC driver to which is passed data store access code 205 and obtains the data store content 301 and an execution status 306 based on executing at least one such command 303.
  • the second adapter 500 then processed the data store content 304 and the execution status 306 using meta data 201, and packed the obtained data store content 304 and the execution status 306 as data 115.
  • the second adapter 500 communicated the data 115 to the first adapter 400.
  • the first adapter 400 unpacked the data 115 and instantiated the object attributes 113 and the object name 114 into potentially one or more new object(s) 112 and/or status according to the request 100 and the data 115.
  • the first adapter 400 then communicated the request 100 and at least one such new object 112 and/or status, if object results were found, from the first adapter 400 to the application program 101.
  • each object(s) 102 data was being read from the data store(s) 302 (312), an instance of the object's class type (or potentially some generic container object) was instantiated (in a preferred embodiment a Java Class is instantiated for each set row result returned) and initialized to the row of attributes returned in the result set.
  • Java can instantiate new objects based on class name, objects could be managed by a preferred embodiment of ' 197 patent even though it may have been unaware of their existence or composition at compile time.
  • each java class in order to be supported by the preferred embodiment must implement a standard interface. With compliance to this standard interface, the subject invention can call the methods necessary to initialize the data automatically, making new instances automatic and transparent to the client object application 101.
  • a preferred embodiment of the '197 Patent used an in-memory list to maintain object references, which list could be either partially or fully pre-fetched.
  • An object application may retrieve one object, all of the objects at once, or in blocks of default, or in blocks of a user defined size. Once the objects were in the memory list, they could be iterated through using their offset in the list as their index.
  • the '197 patent also contemplated incorporating smart vectors for automatically fetching requested Objects from the vector instead of from the data store.
  • a preferred embodiment of the '197 patent provided non-granular simple transaction support, although the ' 197 patent invention contemplated either building it's own transaction management system, or using a pass through mechanism which allowed for more sophisticated transaction management to be written by the application programmer, if the underlying system supports it. Any limitations due to the preferred embodiment of the '197 patent being implemented in the Java Driver Database Layer and JDBC or the Java DataBase Connectivity Layer were not contemplated by the invention in the ' 197 patent. Thus, the ' 197 patent contemplated using more advanced transaction management, as available in the implementing language and architecture.
  • the object schema 200 providing meta data 201 descriptions of how to map to the underlying data store 302 was used to generate the native access code 205 necessary to access the data store content 304.
  • One embodiment of the ' 197 patent used the object schema 200 to build an SQL statement at runtime, which was then executed to get the desired results, based on the request 100. Because multiple statements are likely to be executed against a given class type after it has been first accessed, the '197 patent can cache the meta data for the class (name) in memory, within the second adapter 500 and saves pre-compiled versions of the access code 205 which can simply be re-executed without recompile. This approach provided improved performance characteristics for successive accesses. In the three-tier design embodiment of the subject invention, the cache was physically located on the server, and was therefore shared across all client accesses to that server, providing a performance optimization in an area where performance is most critical.
  • the '197 patent invention comprised the adapter abstraction layer 600 comprising a set of runtime adapters (e.g., the first adapter 400, the second adapter 500, the n-th adapter 4XX, 5XX), which can be transparently interchanged by the object application 101.
  • the adapters serve various functions such as direct 2-tier data access, or 3-tier or even n-tier gateway/transport. Because all adapters implement the same API 700, they are interchangeable in the object application 101, providing new and useful functionality, beyond implementations described in the '197 patent, without requiring object application 101 modification.
  • Object application 101 runtime flags can instantiate entirely new adapters interfacing with radically different data store(s) 302, without modifying object application 101.
  • data store access code e.g. SQL
  • dynamic SQL instead of precompiled SQL
  • One preferred embodiment of the '197 patent addresses these performance issues by pre-compiling SQL the first time a given SQL operation was executed, and by preserving the compiled statement within the second adapter 500 for future executions from the same or a different first adapter 400.
  • the '197 patent invention binds variables to the statement, and re-issues the generated access code with the new SQL. As a result, the penalty as to dynamic execution became a slight overhead the first time an object 102 of a given type was requested from the abstraction layer 600.
  • the performance characteristics should be the same as from any other embedded SQL client, perhaps even better because the amount of information to be processed and transferred to the server accessing the data store 302 was likely to be less using the architecture of the ' 197 patent than one which embeds SQL within a client object application and ships it with every request, and then must process the results inline, and often unnecessary descriptive data that is returned, and which is unnecessary in a system which is already preprogrammed with and understanding of the composition of the return values.
  • the '197 patent invention reduces network latency (which is essential to reduce over the Internet and other io-bound and high latency networks) and increases the performance and scalability of the involved clients and servers.
  • the '197 patent invention also reduces the quantity of extraneous information which is always returned to client object applications by other prior art systems such as the JDBC type-3 distributed database access layer architecture upon which other common Java Database Products are currently built.
  • New adapters e.g., 4XX, 5XX, could be added to the adapter abstraction layer 600 dynamically, even at runtime, as long as they complied with the API 700.
  • Figure 2 is a concise flow chart depicting the operation of a computer system having an implementation of the "System and Method for Accessing Data Stores as Objects" described in U.S. Patent No. 5,857,197.
  • the system of Figure 2 comprises three basic components (a) an object language application program, (b) a data source manager and abstraction layer system embodiment of the 5,857,197 patented invention (such as the soon to be released CocoBase Enterprise O/R Software Tools Suite Version 4.0 of Thought, Inc, San Francisco, California), (c) a relational data source and corresponding JDBC driver, and (d) an optional Maps Files Storage facility.
  • the operation of the system of Figure 2 in the context of the flow chart operation will be described in detail below by referring to the Figure 1 numbering system that was described above.
  • Figure 2 starts at position 1A (Start/End) with a request step 2A from an object application (101 in Figure 1), which calls the CocoBase DataSource Manager and Abstraction layer (hereafter CocoBase system) and delegates the database accessing to CocoBase.
  • the logical loop that the CocoBase system performs begins in response to the request step (2A) and first performs the Extract Object Name step (4).
  • the CocoBase system loop continues onward to the Evaluate Object Properties step (5) and its associated components where (i) object properties are evaluated (5), (if) object to relational maps are accessed, created, or updated by 3B (and this may involve retrieving maps from the system DataStore 3C or from a separate Optional Maps Files Storage facility (1C)), and (Hi) database commands necessary for data retrieval (including SQL strings) are generated at step 2B under the control of the Execution Status Monitor (IB) , before the CocoBase system continues onward to the Obtain Data step (6).
  • step 6 the CocoBase system in coordination with components IB, 2B and 3B, passes SQL strings or other DataBase Access Statements from 2B to the JDBC Driver (2C), which obtains data from the system DataStore (3C) and passes that data to the CocoBase system. Then the CocoBase system places the obtained data in an object (Step 6A, Place Data in Object and sends the Data Object (Step 7A, Send Data Object) to the Requestor Object Application (back to Step 2A position) and the delegation to the CocoBase system by the Object Application ends (back to Step 1 A).
  • Step 6A Place Data in Object
  • Step 7A Send Data Object
  • the Object Application (101) may contain two referenced parts (a) Object Schema (200) and (b) Meta Data (201), and its Request (100) for data at Step 2A, which is delegated to the CocoBase system.
  • the Abstraction Layer Adapter 1 may involve the Object Schema Manager (203), Object Schema (200), object data store contents (301) of DataStore (302) or in a separate external mapping repository storage facility (e.g. , Optional Maps Files Storage (1C)) to obtain the Object Name (104) and Object Attributes (103) for objects (102) or (112) as data (105) to be used by the CocoBase system.
  • the data (105) may be passed (optionally across a logical division 650) to a second Abstraction Layer adapter (500) to an abstraction layer portion 600.
  • the second Abstraction Layer adapter (500) checks the meta data maps (201 or 206), which may be an Object/Relational map.
  • the adapter (500) uses the object attributes (103) and the data map (201 or 206) to generate at least one command (303) such as an SQL string or other DataBase Access Statements (2B) under control of the Execution Status Monitor (IB) of adapter 500 for accessing a database, e.g., relational DataStore (302/3C).
  • a command such as an SQL string or other DataBase Access Statements (2B) under control of the Execution Status Monitor (IB) of adapter 500 for accessing a database, e.g., relational DataStore (302/3C).
  • the second adapter 500 executes at least one command 303 as part of a data store access client server process 700 in communication with a JDBC driver (item 2C in Figure 2) which converts the at least one command into a format that is understood by the data store 302 (item 3C in Figure 2).
  • the JDBC driver communicates with the data store item 3C by using data store access code 205 and obtains at least one item of data store content 301 and an execution status 306 based on executing at least one such command 303.
  • the client server process 700 passes this data store content 301 and execution status 306 back to item 6 (Obtain Data) of the CocoBase system which coordinates with both the client server process 700 of CocoBase and the Execution Status Monitor component of Figure 2 (item IB) to provide this information to the second adaptor 500 of the CocoBase system.
  • the second adapter 500 then processes both the obtained data store content 304 (collection of at least one item of data store content 301) that corresponds to the request and the execution status 306 by using meta data 201 (of 3B in Figure 2), and packs the obtained data store content 304 and the execution status 306 as data 115.
  • the second adapter 500 of Step 6 in Figure 2 communicates the data 115 to the first adapter 400 of Step 6A in Figure 2.
  • Step 6A of Figure 2 the first adapter 400 unpacks the data 115 of Step 6, and instantiates a set of object attributes 113 and the object name 114 (object attributes and object name are obtained in Steps 4-6 of Figure 2, see description above) into potentially one or more new object(s) 112 (see Figure 2, Step 6A "Place Data in Object) and/or status according to the request 100 (the original request from Object Application 101 for data from Step 2A of Figure 2) and the data 115.
  • Step 7A of Figure 2 the first adapter 400 of the CocoBase system then communicates the request 100 and at least one such new object 112 and/or status, if object results were found, from the first adapter 400 to the application program 101 request of Step 2A in Figure 2.
  • the Object Application 101 at 2A indicates receipt of the information to the CocoBase system and at Step 1A the Object Application completes and ends the data request process.
  • Figures 3-6 illustrate more complex variations of the CocoBase system that is described in detail above with respect to Figure 2.
  • Different components and features are added to the basic system of Figure 2 to provide features and functions that are described below in detail in the detailed description of the invention. See the description below for instructions on how to add or remove such additional CocoBase system components and their features to individual computer systems. Such details are provided below contextually for the individual components.
  • Figure 7 is a concise flow chart diagram depicting the comprehensive operation of the present invention, and including a number of variations on the basic system described in Figure 2.
  • the components in Figure 7 that have the same numbering as components in Figure 2 will have the same description as those components as described for Figure 2.
  • the invention of Figure 7 includes (a) a new component or set of components and or logical steps (3 A) for caching objects, data or maps, (b) a new component or set of components and/or logical steps (7, 51, 52, and 8) for evaluating XML information and for extracting objects, data or maps from the XML information for placement in a object (information can be in XML format) and sending the object to the Object Application 101 in response to request (2A), (c) an new component or set of components and/or logical steps (4B) for converting objects, object schema, data, meta data, or maps into one or more of an XML file or into an XMI file.
  • a "module” in the computer programming context is an organized set of computer code designed to act on some externally passed in data, where everything needed for that action is passed in to the module.
  • An "object” in the object oriented programming context is an organized set of encapsulated programming code designed to act on itself at the request of some external system, which system may pass in some additional information to the object when it delegates a task to the object in that request.
  • a "composite object”, or an object programming "component”, in the object programming context each refer to an object comprising a complex and organized set of objects that are encapsulated to form the composite object.
  • composite object and “component” (e.g., a J2EE component such as an EJB,
  • Enterprise Java Bean may be utilized in an interchangeable manner in referring to the same type of logical constructs and concepts.
  • a "delegation" in the object oriented programming context is where an object or a programming application permits another simple object, set of objects, composite object, or a module to perform an action by simply requesting the action from the delegated simple object, set of objects, composite object or a module.
  • a "non-delegation" database access in the object oriented programming context is where an object or a programming application has specific code imbedded in the application which directly controls database calls and the generation of SQL strings, wherein the imbedded code is specifically tailored for accessing a particular database or for a specific database schema.
  • a "user interface" for an object oriented application refers to a software component or module that provides a feature for a user that will permit the user to interact with an object or programming application in some way, such as the interactions of finding, selecting, inserting, updating and deleting data in a database.
  • JSP Java Server Page
  • Swing GUI a software component or module that provides a feature for a user that will permit the user to interact with an object or programming application in some way, such as the interactions of finding, selecting, inserting, updating and deleting data in a database.
  • a "library” is a set of definitions, data, objects or programming modules that may be accessed by a computer programming application to obtain information or to delegate tasks.
  • a "repository” in the object programming context and in the context of this application is a special set of libraries that may include, among other things, items related to object to object mapping, object to relational mapping and database accessing information, database parameters, optimized database access routines, and the like.
  • a repository may be a single file or may be a set of files.
  • the format of items in a repository may vary widely according to the desire of a computer programmer user or developer and may be in one or more of formats such as simple text, XML, XMI, UML, JDBC, source code, compiled code, and the like.
  • mapping information can be placed in a separate structure that is independently stored. This allows the mapping information and associated metadata to be easily accessed, changed and used to convert thousands of lines of code in a data object, as needed. Mapping information can be used to map to and from objects to relational models, objects to objects, object to COBAL or vice versa, and object to XML and the like.
  • mapping information, rules, or metadata can be maintained in a human-readable format and can be interpreted by an application to apply the rules to data objects.
  • This information can be stored directly in the data source or can be stored in a separate file. In either case, this information is called a "repository”.
  • This repository provides an easily maintainable and transportable format for the mapping rules.
  • the rules and java object relationships can be updated, or otherwise changed, dynamically even while other rules or object relationships in the repository are being used to perform conversions.
  • the rules and relationship definitions can be embedded in standard formats such as in Java code, e-mailed, sent as plain text, etc.
  • this repository is in an XML (extensible markup language) format, and the object model definitions can also be present in an XMI (XML metadata interchange) format or can be easily exported to an XMI file format.
  • a more preferred embodiment is such a system and software as provided by an updated CocoBase Enterprise Object/Relation Software package (hereafter CocoBase), which includes the software tool CocoAdmine.
  • CocoBase CocoBase Enterprise Object/Relation Software package
  • Such updated software package is available, or is available shortly, from Thought, Inc., San Francisco, California.
  • An embodiment of the invention using this package is described below.
  • CocoAdmin provides a mechanism for the export of maps defined against a database into a modifiable XML format. This facility allows a system user to select an existing map(s) to be exported, and to also specify the filename of the XML document to be created.
  • the resulting XML document is written to a file with the specified filename using an XML template named coco . dtd that is ordinarily located in the thought ⁇ cocodemo3tier31 ⁇ demos ⁇ resources directory.
  • the basic repository format has CBOb j ect (CocoBase object class) definitions that reflect the select, insert, update, delete and call related map definitions for a CocoBase map.
  • CBOb j ect CocoBase object class definitions that reflect the select, insert, update, delete and call related map definitions for a CocoBase map.
  • Each of those operations further consists of tables, fields and clauses that may exist to specify how the object is mapped to and from the data source.
  • XML files contain a DTD (document type definition) entry which describes the structure of the tags and data contained in the file.
  • the DTD only checks for the existence of required elements, but doesn't check the contents of those elements. Given this desired degree of freedom, it is possible to enter invalid map information which will not be processed properly by the CocoBase runtime and care should be exercised to avoid improper editing.
  • modifications should be restricted to the schema, table, and field name variables in the Tables and Fields entries. These variables may require different values when they are exported from one database instance, and imported into another.
  • the list of selected maps will be presented in a list and the window will prompt for a final acknowledgement of export.
  • the XML repository filename including the directory path can be specified in this window. If the directory path is not specified, the XML repository will be written to the thought ⁇ cocodemos3tier3l ⁇ demos directory.
  • CocoBase creates the XML file in the specified directory. After the document has been written to the disk a dialog appears which acknowledges that the repository has been created.
  • CocoAdmin provides a mechanism for importing XML based CocoBase map definitions, or for importing an XMI object model definitions and then generating corresponding XML based CocoBase map definitions.
  • CocoAdmin can import maps previously defined and exported from a different database or from a different object instance.
  • the XML files generated from CocoAdmin will be validated against the DTD, and a basic syntax check will occur. No in depth syntax checking will occur because of the flexibility allowed in the system.
  • a flag is set to import each of the newer ones.
  • the comparison operation is completed the user can override any flags before the task is initiated. For example, if the XML maps are older than the versions already in the database, this condition causes the Already Exists? flag to be checked and the XML map definitions will not be imported unless the user overrides this flag by checking the Import/Overwrite? box.
  • maps marked for import will automatically be integrated into the list of maps in the CocoBase repository for that database.
  • the imported maps do not reflect the physical structure of the underlying database, they may need to be manually edited by the map editor before using them with an application.
  • XML format maps can be edited before they are imported. For example, an XML editor or any standard text editor can be used for this operation. Most common edits consist of changing column names, table names, and less frequently, the schema names of the tables and the fields that the map may access.
  • CocoBase Programmer's Guide available at the www.thoughtinc.com website provides further information about how to work with XML format maps and CocoBase, which published document is incorporated herein by reference. This document also explains how to set CocoBase (or CocoAdmin of CocoBase) and its runtime modules to cache maps that an application will be using in order to speed up user access. Other user hints and instructions are provided therein. For example, one URL option in CocoBase is to specify an XML repository for the maps that an application will be using. Instead of using the database repository, the runtime can use an XML repository exclusively. This technique allows CocoBase to execute against a production database that cannot be modified with map definition tables. Optional mapping server plug-ins are also described.
  • Data source maps according to the present invention may be utilized to generate application programming code, such as Java source code.
  • the CocoAdmin tool will allow a user to generate Java for a range of targets including most commercial Application Servers and Enterprise Java Bean Servers. A complete list of pre-configured targets can be viewed from the Connections window in the Generate Java wizard of CocoAdmin. Any Java class can readily be used with CocoBase, whether or not it was generated by the CocoAdmin tool.
  • Any Java class can readily be used with CocoBase, whether or not it was generated by the CocoAdmin tool.
  • the CocoAdmin tool can use a combination of the map definition and database foreign key relationships (if any exist) to define how the Java class is going to be generated.
  • the Generate Java wizard of CocoAdmin can be started in one of four ways to generate Java code from a CocoBase map.
  • the CocoAdmin user can also set flags to automatically generate code that does one or more of the following:
  • CBDrop Uses the CBDrop, CBProp or both of CocoBase persistence interfaces (check CBProp and/or CBDrop).
  • the CocoAdmin user can also (optionally) enter in a package pref ix at this point.
  • Java classes are typically organized into packages, which are stored in a common directory.
  • the package pref ix (entered at the Pkg Prefix/ prompt) will then refer to the directory in which the Java code will be stored.
  • the Code Generation Template drop-down list of the CocoAdmin code generation wizards allows a CocoAdmin user to select a target for the classes (Java code) that will be generated for a member of the comprehensive list of targets.
  • the following target categories are supported for most commercially available application servers and EJB servers. • Java for distributed objects and application server applications.
  • CMP Container Managed Persistence
  • the Generic EJB Entity Bean CMP - All Parts option from the drop down of CocoAdmin will generate a completely standard CMP Bean, which can be installed using any vendor supplied CMP installer.
  • CMP concepts for EJBs are discussed in a variety of documents published in this field, including in the appropriate section of the CocoBase Programmers Guide.
  • a user In order to take full advantage of the CocoBase O/R mapping features, such as delegated database access and the like, a user must install the generic CMP with the CocoBase CMP installer tool, which is an optional component of the CocoBase software package. This tool will configure the CMP EJB to run in most commercially available EJB servers that support container managed persistence EJBs and coordinate the database access with the CocoBase runtime libraries.
  • Customizing Attributes to be Generated in Java Code by CocoAdmin Attributes that are to be generated into the Java code by CocoAdmin can be customized through the code generation screen of CocoAdmin, which is displayed when a map is selected from the wizard connections tree and the Next > button is pressed.
  • the corresponding Java Attribute Name and Field Type are editable.
  • the CocoAdmin user can select one of the available data types from the drop- down list. These relational data types will be mapped to a corresponding Java type when the code is generated.
  • a relational to Java conversion table can be found in CocoBase Programmer's Guide, but any functional conversion table may be used. If foreign key references are present, each entry of the reference is also editable. hi general, the attributes for Java code to be generated should not be customized here unless a foreign key relationship needs to be modeled that isn't described by the database foreign keys or that isn't described correctly. Database foreign keys are automatically included in the map if the ForeignKeys checkbox in the wizard connections window is checked. Editing a map to include foreign key relationships is covered in the CocoBase Programmer's Guide.
  • a CocoAdmin user can specify a key for the map for the purposes of code generation by checking the box under the Key column.
  • the attribute corresponding to the checked key box will be used as a key for the map and more than one box can be checked.
  • keys can be useful in applications such as object caching and should contain unique values. Because EJBs require a unique key (for example, see the EJB spec. 1.0 from Sun Microsystems), CocoAdmin will not let a user generate code for an EJB without first specifying a key.
  • Customizing an Output Filename for Generated Java Code When a map is generated into Java code by CocoAdmin, the output class name is specified manually by entering it in the File name field. If no filename is entered, the user will receive an error message when the user attempts to generate the Java code. Generally the user should adhere to Java naming conventions when naming package components. Package components should be saved in the PackageName directory and Java class files should have the form Classname or ClassName.java when entered into this field.
  • a CocoAdmin user can specify an existing output directory for the generated class (generated code) from the Look in: drop-down dialog. If from a previous window, the user specified a package prefix for the source code, then a subdirectory matching the prefix name can automatically be created in the specified output directory, if one does not already exist. Further information on naming and naming customization is presented in sections of the CocoBase Programmer's Guide. Generating Java/EJB Code Using CocoBase
  • a CocoAdmin user can generate the Java code by clicking the Generate button.
  • a dialog box indicating a successful generation will be displayed. If a user attempts to generate an EJB without specifying a key attribute, an Code Generation Exception Key must be specified ! error message is received. Likewise an error message may be received if a file already exists with the filename that was specified by the user for code generation.
  • Prior to code generation maps of CocoBase maybe customized to add relationships between fields, objects, and beans by creating links. Relationships between objects such as 1 to 1, 1 to many, and many to many may be set. Among other relationships, parent child class relationships are supported. Code may be generated which reflects such relationships. Also, during the code generation step relationships may be added using wizards and interfaces of CocoAdmin. Link information can be dynamically entered and edited with a CocoAdmin dialog, or it can be loaded from the resources ⁇ CocoNavLin . properties file of CocoBase if code regeneration is going to occur often with the same class, and if keying in virtual foreign keys isn't practical. The database foreign keys are auto-detected at a table level, and can be edited using a CocoAdmin dialog if the Map name to be used is different from the default one generated using a table name.
  • CocoBase Enterprise all have the ability to customize code generation through the use of multiple code generation templates. Templates are available from the tool through the CocoAdmin . properties configuration file. Each of the GENTEMPLATES name values found in a configuration file are comma delimited and specify the name of the code generation template to be used. The comma delimited file can be viewed using an ASCII text editor, for example. The " ⁇ " character which appears at the end of each line indicates a line continuation and is only relevant to the CocoAdmin tool. Name values present in this file can also describe a set of templates that will be processed simultaneously.
  • the code generation list that appears in the tool by default includes, among other things, all of the major Java Application Server types, production of generic CMP, generate Java classes, generate JSP, and the like. See the current www.thoughtinc.com website for a more complete listing.
  • the default Java object of the listing is a standard Java instance that implements the CocoBase interfaces. If a GemstoneJ EntityBean using Proxy objects is selected, for example, CocoAdmin will generate all of the GemstoneJ files necessary for a Bean Managed Persistent EJB Object. Such an "All Parts" template reference will actually cause several files to be generated. Such a selection would have a CocoAdmin . proper ies entry that specifies which template files are to be processed, and in what order to process them.
  • Such a file might be found in the thought ⁇ cocodemos 3 tier3l ⁇ demos ⁇ resources directory of a particular version of the installed CocoBase software package.
  • any file prefix suffix values to be appended to the filename would also be prefixed or appended to the map name automatically.
  • the invention provides a system for mapping from a first database format to a second database format, or from one database to another database of the same type, as a way for transferring data or synchronizing data sources.
  • the system includes: data in the' first database format stored in the system; rules for translating from the first format to the second format stored as a separate structure from the data; and means for applying the rules to the data to obtain the second format.
  • This system may include a means for transferring the data from a first data source to a second data source.
  • this system includes a simple computer program in a computer language such as Java, which reads the data from the first database using a repository map that may optionally be cached in the computer memory of the system and then stores the accessed data to a second database using the same or a different repository map.
  • a simple computer program in a computer language such as Java, which reads the data from the first database using a repository map that may optionally be cached in the computer memory of the system and then stores the accessed data to a second database using the same or a different repository map.
  • Ml is a map (or maps) defining the database schema SI of Rl including map (or maps) with definitions for relationships between Java objects corresponding to the data of Bl, and
  • M2 is a map (or maps) defining the database schema S2 of R2 including map (or maps) with definitions for relationships between Java objects corresponding to the data of B2.
  • step (vii) as described above involves having data retrieved by Obj-1 and then converted to an XML format data file which is then forwarded to a different location (and optionally simultaneously to a different user) on a distributed network, whereupon an existing or new instance of Obj-2 is populated with data from the forwarded XML format data file and Obj-2 then stores the data in B2.
  • the XML format data file may be simply of a Java object, the data than can be stored in a Java object, or both the Java object and its data.
  • the above example is an example of object to "DataSource” mapping.
  • Data may be mapped to (or from) object and relational databases and may also be stored in XML.
  • XML stored maps can be utilized by CocoAdmin as a resource from which to generate object code for user applications.
  • two system users using a single (or several major recognized) XML standard(s), can export or import (as XML files) either or both of the XML map definitions (relationships of data) and data (dataset) of the database. This would permit a user to distribute parts or all of a dataset (and/or maps) to a distributed network, or to multiple network users in useable XML format files.
  • Such a phenomenon may be referred to generically as O/X mapping (object to XML) or R/X (relational to XML) in addition to O/R (object to relational mapping).
  • O/X mapping step would permit importation or exportation of data (that was converted to XML) from XML to and from any business object.
  • data from any business implementation object could be exported as XML along with its relationships as defined by the mapping tool.
  • This would implement a more flexible and dynamic mapping facility for taking XML datasets and using them to populate object instances other than the original ones that may have created the data.
  • One good example of such an implementation would be to take a first XML document that is presented as a user screen interface to a dataset and utilize the information (dataset) populating the first XML document to seamless populate a second XML document (datasource to datasource via a XML (or another exchange format similar to XML) translation step.
  • One business use would be for a first party to use XML as a data export document to send information to a second party (e.g., items offered for sale) and the second party would import that information in order to generate a second XML data document (e.g., purchase order) that the first party can import.
  • This would provide a much needed exchange format for the newly developing business to business market that might be able to rely on standardized XML data formats and avoid problems caused by object programming models that may vary widely from company to company.
  • Such a dynamic mapping facility would provide a critical missing facility to easily translate data models and object model into a format that can be readily used by business to business companies, or by the same company for department to department interactions.
  • mapping examples include, mapping from object to object databases and from COBAL (mainframe computers of businesses often use this language data source) to object. See the IBM "white paper" on the topic of COBAL to object mapping (may be downloaded from URL http://www.thoughtinc.com/websphere.html).
  • a translation layer translates between an object application (or a potential object application, i.e. an object model) to at least one relational database which includes data entries organized as tables and records.
  • object application or a potential object application, i.e. an object model
  • relational database which includes data entries organized as tables and records. Examples are database architectures supported by companies such as Oracle, Sybase, ifonnix, etc. Such an organization is well-suited for manipulation by relational query languages such as SQL. However, the traditional relational database organization is not ideally suited for manipulation by an object- based system.
  • JDBC Java Database Connectivity
  • a translation or abstract layer communicates : with at least one JDBC (relational database driver) and at least one primitive Extended Java Bean (EJB) construct.
  • JDBC relational database driver
  • EJB Extended Java Bean
  • the function of such a translation layer is to translate object-based queries for the data into queries that JDBC can, translate into queries for a relational database.
  • the translation layer can generate an SQL string (or strings) based upon the object-based queries, which can be passed to at least one JDBC, which JDBC can then generate an SQL statement from the SQL string.
  • the abstract layer accepts results from the queries and provides them to one or more of the EJB constructs in a suitable object format.
  • JDBC is not necessary for all implementations of the invention.
  • Different types of databases, data models, computation architectures, and the like can be used within the basic principle of the present invention. This mapping can be one-to-one, many-to-one, many-to-many, or any variation.
  • mapping tables allows for mapping tables to be plain text, or text-based XML repository files.
  • This not only allows the maps to be human readable and editable with standard editions, email programs, web browsers, etc., but allows for easy transportability and delivery of the maps.
  • Another feature of the maps is that they can be dynamically loaded into a computer system to provide for new dynamic mapping in a system that can that can continue to run while the new maps are loaded and executed.
  • the use of the translation maps provides advantages in organization, standardization of interfaces, efficiency of design, compatibility, scalability, portability and other advantages.
  • the system of the '197 patent provided an entire set of tools to simplify and improve an operators ability to manipulate the maps without requiring high levels of programming knowledge or database query language familiarity.
  • the present invention is based upon a translation operation derived from the operation of U.S. Patent No. 5,857,197, and depicted by the flow chart at Figure 1.
  • the application software is operating, and reaches a point where data must be accessed to continue the operation.
  • the application software is object oriented, and is being run by a customer at a customer location.
  • the application software need not always be limited to object orientation. Rather, other types of software models can be facilitated by the present invention to be described herein.
  • a request 2(a) is made for that data.
  • the object information provided the object application is received in an abstract layer, also known as a translation layer, at step 4.
  • an analysis takes place to extract certain information regarding the object sent by the object application.
  • This information is used to select and manipulate a particular metadata maps provided by a data manager, which handles the data store containing any information required by the object application.
  • the data manager carries out an analysis of the arrangement of data in a data store controlled by the data manager at step 1(b). Depending upon the size of the data manager and the data store, any number of analysis can be carried out to help facilitate access by parties interested in the data held by the data store.
  • a metadata map or maps based upon generated object characteristics of the arrangement of the data store.
  • any number of metadata maps can be generated.
  • the number of generated object characteristics, which would be the basis of the metadata maps depends upon the data manager operator, and his/her response to the requirements and characteristics of those seeking access to the data store.
  • a metadata map or metadata maps based upon the object characteristics of the arrangement of the data store, are generated. The number and characteristics of these maps depend upon the characteristics of the arrangement of the data store, and the responsiveness of the data manager operator to the various types of demands for data by object applications.
  • Each metadata map provides the necessary means to obtain data or particular types of data from the data store.
  • object characteristics can be derived from a relational data store.
  • the data related to particular derived object characteristics that can be accessible using a metadata map generated for a selected group of object characteristics.
  • the operation of the object application and the management of the relational data store come together at step 5.
  • an evaluation is made between the object information provided from the object application and object characteristics associated with the metadata map available in the data manager.
  • the evaluation results in a selection of at least one metadata map appropriate for the object characteristics sent from the application.
  • the selected metadata map is used to navigate through the data store to obtain data that is desired for the object application at step 6. It should be noted that more than one metadata map can be used to obtain data from the data store.
  • step 6 of obtaining data and step 7 of sending data are constituted by a much greater number of sub-steps. These include: generating demands from the metadata map; executing the commands used by the metadata map; obtaining data from the data store in response to the command; processing the data access from the data store using the metadata map; packing and manipulating the data for transmittal; unpacking the data; instantiating objects using the accessed data and returning the instantiated objects to the object application for further processing. It should be noted that the results of the overall data accessing process may contain many rows of data which can be used to instantiate a plurality of objects.
  • An important purpose of the aforementioned system is to achieve a high degree of flexibility with dynamic mapping to objects as they occur in object applications. Accordingly, it may become necessary to handle a plurality of objects at any one time, and obtain the necessary data to instantiate or otherwise satisfy requirements of each of the objects addressed in the object application.
  • large amounts of data associated with each object may become cumbersome.
  • a single map for plural objects may also become awkward to handle .
  • Evaluation of object characteristics sent by object applications can often be time-consuming while not resulting in the selection of the best metadata map, and thus the most appropriate data may not be accessed. Further, depending upon the amount of data available in a data store and the number of metdata maps available, the selection process may become very slow and cumbersome.
  • the enhanced operation and efficiency of the basic system by U.S. Patent No. 5,857, 197 is enhanced by the inventive modifications depicted in Figure 7.
  • the goal and purpose of the modified operation of Figure 7 is to more quickly handle greater amounts of data by streamlining or otherwise enhancing the operation depicted in Figure 1.
  • the operation of Figure 7 also facilitates greater flexibility in that the system more easily handles multiple maps for a single object as well as use of plural objects for a single map.
  • the reconversion process of Figure 7 also allows conversion between database formats of a wide variety. As a result, editing of data for a particular object application (or other type of application) is more easily facilitated. Further, changes in data for a particular object need be done only once if such changes are handled in accordance with the invention depicted in Figure 7.
  • a key attribute of the process of Figure 7 is the enhanced processing speed facilitated thereby.
  • steps 1(a) and 2(a) are carried out in the same manner as in the process of Figure 1.
  • the invention of Figure 7 does not require that only objects be used to obtain data from relational databases. Rather, virtually any type of database can be accessed by virtually any type of application. However, for purposes of presenting a coherent example, translation relational database to objects required by an application will continue to be used.
  • an abstract or translation layer is used to receive the request for data related to the objects provided by the object application. It should be noted that the abstract layer, which carries out much of translation activity can be constituted in a number of different ways.
  • the abstract layer can be the computers and communication links of a third entity (in addition to the application entity and data manager entity).
  • a third entity in addition to the application entity and data manager entity.
  • One example would be the business entity Thought, Inc., the Assignee in the instant application. Thought, Inc. would provide all of the necessary software for the various translations and other operations that would provide the translation of relational data into object oriented form required by the object application in a manner that appears to be transparent.
  • the abstract layer need not be confined to a single business entity for a single group of computers. Rather, the functions of the abstract layer can be distributed over a number of different entities and associated computers, linked via the Internet, a number of different intranet arrangements, temporarily dedicated lines for fax or FTP transfers, satellite links, microwave links or any other communication link which will be used for exchanging data.
  • the abstract layer could be associated with the data manager, and be operated as a part thereof. However, depending upon the scope of data handled by the data manager, operations of the abstract layer could be limited thereby.
  • the abstract layer would be part of the operating system of the entity operating the object-oriented application of software.
  • the cache check at step 51 can be carried out in the abstract layer as indicated in Figure 7, the present invention is not limited thereby. Rather, the object data can be also be contained in a cache to be checked at step 3(a) at the application site. In this manner, the necessary object data can be transmitted directly to the abstract layer and used for the evaluation with the metadata (step 6) without going through the cumbersome extraction process.
  • the cache check operation 51 can be carried out by a plug-in software addition.
  • the abstract layer may act as another database at a remote location.
  • the best method is to keep a cache memory located within the processing computers of the abstract layer to more quickly facilitate the cache check 51. This allows the manager of the abstract layer to control the object data that is cached for easy re-use.
  • the present invention to provides a fully synchronized caching system that utilizes the transaction coordination facilities of a server such as a J2EE application server (for example, Weblogic 6.1), such system comprising a local or distributed computer system having a first data source referred to as the primary data source, a second data source referred to as the cache data source and the cache data source is associated with an object to relational mapping layer to provide a data source cache for object applications, and a server having a transaction coordinator with the ability to register multiple data sources, wherein:
  • both the primary data source and the cache data source are registered with the transaction coordinator facilities of the server, and (b) the cache data source acts as secondary data source to speed up data accesses for an object application and the cache data is plugged into the object to relational mapping layer, and
  • a number of SQL searchable memory resident relational databases that utilize JDBC drivers exist in the art, which may be adapted for use as a secondary database buffer in the context of the present invention.
  • Non-limiting examples are: (a) HypersonicSQL, an open source relational database (publicly available for free at http ://sourcefor ge .net including source code) that is simultaneously disk and memory resident, (b) TimesTen by TimesTen Performance Software, Mountain View, CA, and (c) Polyhedra by Polyhedra, pic, Bellview, WA.
  • a particularly preferred embodiment of the invention provides a cache data source can be set up as a memory-resident entire database, a disk resident database, or both a memory resident database and disk resident which are synchronized.
  • the memory resident database maybe a portion of the disk resident database and the size of the memory for the memory resident database can be set by the user.
  • One embodiment of the present invention provides a dynamic distributed or local caching system for an object model or one or more datasources by utilizing a call back API and at least one listener object that utilizes the call back API to listen for when changes to an object are to be pushed to a datasource or persisted.
  • the main listener object will broadcast such changes to any other registered listener(s) such as a navigation object, session bean persistence objects, or other such listeners, hi a distributed caching system, a main session bean for persistence can be a listener for changes to any objects or object models that are registered to be persisted and may broadcast such changes to other session beans or object model navigator object instances.
  • a listener detects via the call-back API that a change to an object or object model is pushed to a database
  • the object or model is marked by the listener as being dirty or invalidated, and the system can be set (parameters, flags, or property files) to provide different ways to handle this change in the cache.
  • an object or object model can be re-read from the datasource to obtain the changed object or object model and update the cache.
  • the listener can be set through the call back API to obtain data from the changed object and the broadcast notification of the change to registered listeners can contain the new object or object model values which can be used to update the local copy of the object or object model instead of obtaining the updated object or object model information directly from a data source.
  • a system can be set to notify the user that an object or object model cannot be changed because they have has been updated by someone else in the system, and to notify the user to simply obtain an updated copy of the object or object model or to mark their copy of the object as being old and not useable by the system.
  • a plug-in can be used as a database synchronization mechanism across multiple databases or multiple users such as across a first database and a second database.
  • This example does not show (but the user can envision in view of the above description) where a listener class is checking for any push of changed objects or object models to a data source such as the caching data source or the main data source.
  • the example below involves two data sources, but could easily have been two users of a cache, object, object model or data source. Two different instances by the same user are logically two users.
  • CocoBase commercially available object to relational mapping tool having a mapping repository capability
  • CocoDriver . getCocoDriver (cbdriver , j dbcdriver, j dbcUr1 +
  • (suppose replicationDB is set to connection to database B2) : public int insert (int code, CocoUser userObj , Object keyObject, String objectName, Integer obj Count) ⁇ switch (code) ⁇ case CocoServerPlugin .
  • CB_PRE break; case CocoServerPlugin.
  • any accesses to the database Bl such as: connBl . insert ( . . . ) will have the plug-in access B2 and replicate the operation that was conducted on database Bl.
  • the same mechanism described above can be used to replicate the result of other database operations (e.g. update, select, delete, etc.) that are performed against Bl .
  • the application that uses CocoBase maps to access Bl and B2 can have CocoBase set Bl as the primary database and B2 as the cache database. In such a situation only the cache database B2 needs to be accessed to retrieve data when data that the application needs is present in B2, but both data sources need to be accessed in order to insert or store data.
  • steps 1(b), 2(b) and 3(b) are carried out in the same manner as the operation of the system in Figure 1.
  • step 4(b) selected metadata maps are converted to the XML format.
  • This is a format already known for its facility in the handling text, thereby making modifications to the text of the map relatively easy.
  • Selected metadata map or maps are loaded at step 6 into the abstract layer.
  • the evaluation process at step 7 takes place to determine how to construct the actual commands to access the necessary data from the data store in order to satisfy the request from the object application (step 8) in XML format.
  • the use of XML format facilitates modification of the map with simple text editors. Once the map is altered (to determine how data is to be stored and arranged), the application user can then use the map to effect the desired data handling for any associated objects. As a result, the data is easily manipulated without extensive recoating or programming expertise for the data store architecture, as is required with conventional systems.
  • step 52 Another alternative that speeds the overall operation of the translation process is to convert selected cached objects into XML format at step 52.
  • the system is carrying out objects to XML mapping to facilitate faster operation to the overall system, as well as easier modification of the object and map.
  • XML is a highly desirable data exchange format since the data can be e-mailed to XML format more easily.
  • mapping can be loaded very quickly, responsive to requests based upon object data.
  • map can also be altered dynamically (during the run time of the application) to suit the requester managing the application software.
  • object to XML mapping would permit importation of data from XML format to any business object.
  • data from any business implementation object could be converted and exported in XML format along with its relationship, as defined by mapping tool such as metadata map. Greater flexibility and faster dynamic mapping can also be achieved by taking
  • XML data sets and using them to substantiate selected objects.
  • An example of this would be to take a first XML document and utilize the information (data) within the first XML document to seamlessly substantiate objects in a second XML document. While this can be done by altering step 4(b) in Figure 7 to convert data store to XML in response to a provision of selected objects.
  • mapping includes object-to-object mapping and JAVA to object mapping. Once algorithms translating between XML and object formats are standardized, translations between any type of system can take place seamlessly and very quickly. Mapping can also include the use of JAVA Server Page (JSP) format.
  • JSP JAVA Server Page
  • the snapshots or map modifications, or even general data of modification is facilitated through the use of caching. Since a variety of different types of data (including metadata maps, objects, production data, and the like) are used as options in the inventive system, a number of caching methods must be adopted in order to accommodate the various types of data. Examples of caches include : a write-through cache without transactional integration; a two phase commit integrated cache; and, a temporary working storage cache, which acts as a second database. All three of these techniques are discussed in more detail below.
  • the present invention is also used to distribute caching or database using a plug-in Java database. Any number of different caching arrangements can be applied to the system of the present invention, but are limited only by what is possible in the art of data storage.
  • the various caching arrangements can also be used to facilitate global changes in maps and data. If caching arrangements are to be used with CocoBase, the accessing and updating of information must be defined in some clear way to control the caching and avoid unclear or unacceptable results. Discussed below are three methods for our caching controlling, followed by two examples of ways we cache in memory as either a "database” in memory with a third party plug-in or a "caching in memory of data" where both are connected to the O/R run-time layer. When a user connects to the O/R layer and subsequent database they register any optional plug-ins for caching or extending behavior and this then controls the access to data per one of the three mechanisms. Such options can be very powerful when combined with transaction capabilities of some Java application servers.
  • the first type of cache design is a "write-through cache without transactional integration" (no two-phase commit).
  • This model assumes that applications not going through CocoBase may also be updating data in the first database (data source), hi this method if a store data attempt fails at the first database, then the corresponding data of the second database (cached data) is deleted and may be (or may not be) refreshed from the first database depending upon developer policy. If the store data succeeds at the first database, then the corresponding data is updated in the second database (cached data). Notification of storage attempt results can be sent to the user to indicate a successful or failed attempt to store data. Therefore, multiple users can be utilizing the same cache in this instance and multiple applicationw (e.g, applications that do not go through CocoBase) may be accessing the first database and data integrity can be maintained.
  • applicationw e.g, applications that do not go through CocoBase
  • the second type of cache design is a two-phase commit cache design.
  • This type of caching only allows updates of data by applications that work through CocoBase, through an application(s) that is either a compatibly integrated application(s) working concurrently with CocoBase, or uses the same policies of updating as CocoBase.
  • data is only updated if CocoBase, or the integrated application can update the data in both the first database (source) and the second database (cached data).
  • a commit to change data in both the first and second database (or information cache) is obtained as a first 1 step and store data (update) completion is done in a second step. Again multiple users can use the same database source (or multiple application if they are integrated properly with CocoBase) and data integrity can be maintained.
  • the third type of cache design is a temporary working cache design.
  • This type of caching only allows updates of data by applications that work through this temporary working storage cache (i.e., memory buffer or a second database which may be completely or partially memory resident database).
  • This temporary working storage cache is designed to shield a first database from access and act as the datasource to users. The updating and accessing of the first database can be defined by rules of the developer as they desire.
  • This cache design assumes that database accesses by database information users are directed to the cached information through CocoBase or through another application.
  • this working storage cache is used to intermittently update or to not update the first database (data source) as defined by the developer, i such a model, transactional coordinated database updates and persistence should be synchronized by registering both databases with the application having transaction coordination, such as the J2EE server Weblogic 6.1, for example, h such a case, this cache design maybe described as a synchronized transactional database caching model.
  • the CocoBase software suite provides distributed caching of a database by using a plug-in third party free java database (for example HYPERSONIC SQL), however any third party java accessible database could be used.
  • a CocoBase application user can define a map of a first relational or object database to be accessed, and then import the data into a memory cache through a plug-in Java accessible database (second database).
  • second database can be used. This can allows CocoBase or compatible integrated applications to control access to data as defined by a developer, and database users may re-directed to access the second database in memory instead of accessing the first database in order to speed up performance.
  • This also permits a database to be distributed to multiple users or to multiple applications on a network, where CocoBase or pre-defined developer rules control the updating and persisting of data by storing back to the original database any changes made to the memory cached java accessible database according to one of the three caching methods described above.
  • a distributed cache may use optional mapping server plug-ins and control access to multiple server databases.
  • the data source object database such as Oracle is opened as a first server database
  • a second server database for example HYPERSONIC SEQUEL
  • the second server database can be loaded into a designated mapping server memory area.
  • caching capability of a server to which CocoBase is providing maps and connectivity with a database or the caching capability of another accessible caching facility.
  • Any stand alone caching facility that a developer connects with the O/R layer as describe above in the caching methods descriptions can be implemented as a cache for database accesses).
  • a caching facility may be utilized by CocoBase to create a single or multiple objects in accessible caching facility memory, which object (or objects) may be stored in a relational database (or really any other piece of data, data object or data stream) object database, etc. for possible re-use or multiple use by application(s).
  • CocoBase integrated applications, or pre-defined developer rules will then control access to data and can permit the developer to require a user to directly access the data in cached memory rather than accessing the original data source. This can really speed up performance, e.g., up to 40 times faster with the combination of Oracle as the first database and Hypersonic as the second (cache) database than by using ordinary Oracle database accessing.
  • the underlying mapping connection automatically does this in CocoBase. So for example if a user is accessing an instance of 'Customer', the underlying thought . CocoBase . CocoPowder software module will cache the map information for the customer map within the connection object.
  • map caching is when the software suite reads and caches the map created with a mapping administration tool such as CocoAdmin into RAM (random access memory) of the computer system. Once this map is cached, the CocoBase runtime repository libraries can generate and execute SQL much faster, but the first step of reading a map into RAM can be relatively expensive resource-wise.
  • the cached maps are kept internally by CocoBase in a pre-compiled form that is exceedingly efficient for the runtime to access. Maps by default are cached within a connection once they are loaded and used for the first time. It is also possible to cache maps for all connections within a Java Virtual Machine (JVM) by using the CocoBase URL extensions for controlling cross connection caching.
  • JVM Java Virtual Machine
  • the first is to use a cache configuration file that specifies which maps to prefetch and to place in shared cache. This type of map caching is controlled through a syntax such as:
  • the cocorep syntax can begin with a colon ':' or semi-colon ';' syntax, so it can be compatible with different computer systems.
  • the resource syntax describes what conf ig resource should be loaded from the CLASSPATH, either directly from the file system or from some archived file such as a JAR or Zip file.
  • the syntax of the Conf ig file is that a list of MAPNAMES needs to be specified in a comma delimited form for the tag MAPNAME.
  • a sample resourcef ile . properties file might appear as follows:
  • CocoBase software suite map caching is based on an XML repository.
  • a set of maps can be exported as an XML repository and either placed into an archived deployment file, such as a JAR or zip file, or the XML repository can be an un-archived file that is loaded directly from the file system.
  • CocoBase Both the colon and semi-colon are supported as the separator character for CocoBase URL extensions. As a result ' ; cocorep ... ' and ' : cocorep ... ' would be processed the same by the CocoBase runtime libraries. Some EJB descriptor syntax requirements place special meaning on the colon or semi-colon, so CocoBase makes it possible to use either of these two syntax choices.
  • map caching with CocoBase only needs to occur once a session or once a JVM depending on the option used, and then it is cached in RAM. This initial read and caching process should be taken into account if any performance tests are being created to test CocoBase. Using the per JVM map caching can be a great way to pre-load and pre-fetch maps so that performance numbers are accurate based on normal execution patterns.
  • the mapping server of CocoBase can be extended through custom developed classes called plug-ins.
  • a CocoBase plug-in implements the Java interface thought . CocoBase . CocoServerPlugin. This is a standard Java interface, and any Java class, which implements it and provides a public default constructor can be loaded automatically by the server at startup. Examples of such plug-ins are the cache and connection pool that ship as source code in the demos directory of the CocoBase software tools suite.
  • a CocoBase mapping server plug-in will implement the following interface signature:
  • CocoServerPlugin public int call (int code, CocoUser userObj , int obj Count, Object keyObject, String objectName, Vector returnOb s) ; public int close (int code, CocoUser userObj); public int commit (int code, CocoUser userObj); public int connect (int code, CocoUser userObj); public int delete (int code, CocoUser userObj, Object keyObject, String objectName, Integer objCount) ; public int getColumns (int code, CocoUser userObj, String catalogName, Vector collnfo) ; public int getValue(int code, CocoUser userObj, Object key, Object value) ; public int insert (int code, CocoUser userObj, Object keyObject, String objectName, Integer ob Count) ; public int roll
  • each method will be called before and after the associated operation (such as select) and the code will specify whether the action is a pre or post process operation also defined as public static codes in the plug-in interface API class.
  • the Post condition will always be called unless the plug-in aborts or finishes the operation in the pre-condition of the plug-in. Otherwise the plug-in will finish its pre processing, continue into the actual mapping connection, and then call the plug-in again with the post processing flag. After the completion of the post-processing, the resulting Objects or return codes will be passed back to the client process.
  • CB_FINISH return code can be returned as the return code of the method. If there is an error in the pre-processing and it is desirable to abort the request once again without involving the actual mapping layer, then we can return a CB_ABORT code.
  • CocoBase uses a code to distinguish what the client actually requested the call with the following values. This tells CocoBase if a select, selectBlock, selectNext or selectAll was called by the client, and the software can respond accordingly.
  • CocoBase needs a way to determine the 'context' of which user and which connection the callback is dealing with. In each of the methods, an instance of the thought . CocoBase . CocoUser is passed into the plug-in. This is the context Obj ect, which contains all of the information of the user, its underlying mapping connection and any other private data that the plug-in wishes to store in the Obj ect.
  • Each of the CocoUser instances has the following public 'get' interfaces (note that each has a corresponding set operation available): public class CocoUser ⁇ public String getCocoConnectio () ; public String getCocoDriver () ; public String getCocoURLO ⁇ public Object getDBConnection() ⁇ public String getPasswordO ⁇ public String getUser() ⁇ public Object getUserlnfo () ⁇ ⁇
  • the getUserlnfo ( ) method (and corresponding setUserlnf o ( ) method) is used by CocoBase to retrieve a plug-specific Obj ect.
  • This can be any object (include lists of other objects) that will prove useful in the plug-in. This provides a very simple and flexible system that is fully extensible, and still easy to program.
  • mapping server provides a convenient platform to access and map and enterprise set of data sources, not just a single database. This provides a convenient system for porting data from one data source to another data source (see above).
  • the server connection can access multiple physical databases through a software product called a 'Gateway'. These systems create a virtual relational database over top of a user's physical databases. Vendors such as Computer Associates, Oracle and B2Systems all have Gateway products that can be accessed from JDBC drivers, and such JDBC drivers can easily be connected to CocoBase.
  • Oracle DBLinks can be used to link in tables from other instances into the current instance being accessed.
  • CocoBase evaluation distribution along the lines described above and in the instructions of the distribution, and loading the extended plug-in into the Mapping server.
  • a simple example for extending one of the shipped plug-in would be to have ( two open connections, one connection to a first database and a one connection to a second reference database.
  • the client wishes to first try to obtain data from the second database (for example, the second database is a faster or smaller memory resident database)
  • a shared connection to the second database is left open in the plug- in, which would append a list of Ob j ect s available from that database to the getColumns lookup.
  • connection to the second database would integrate into the selected plug-in to provide a pre-process state so that data requested from the first database by the client program will cause the CocoBase runtime libraries to first look in the second reference database for an object that is present in the reference list of available Ob j ect s before attempting to access the first database that also has an open connection.
  • a plug-in could be modified to use the CocoUser storage area to store additional Connect ions or lists of connections to be accessed first in response to efforts by an application client to look up Obj ect s.
  • Object caching is provided by reading an Object (usually representing an underlying database row or fetched result set) instance and placing the data in memory for future reference while causing the database connection of CocoBase to remembers that the data is now in memory for future reference and it is unnecessary to access the database for that data.
  • Object usually representing an underlying database row or fetched result set
  • CocoBase CocoBase to remembers that the data is now in memory for future reference and it is unnecessary to access the database for that data.
  • this technique can be simply pulled from memory, instead of having to be retrieved from the physical database and the related overhead associated from that operation. Since subsequent reads are read from the in-memory copy instead of the underlying data storage system, this technique can be VERY efficient and highly enhance performance. If the database server is over burdened, this can become essential for optimizing and increasing overall system performance. Since the Object Cache allows users to retrieve data quickly and efficiently from memory, it can often avoid the need for object look-up again, even with multiple clients.
  • CocoBase Object Caching as the data for each object (or the object in the case of accessing an object database) is loaded from the data source, the loaded object is stored in an in memory object cache.
  • the Object must be uniquely identifiable to be cached - in other words a 'unique' primary key field or composite key fields must be defined. This cache is shared by all of the clients accessing the Mapping Server, and, as a result, only one copy needs to be in memory at once.
  • the CocoBase Object Cache contains a method for looking up the object in terms of its unique object identifier column(s). Before an object is loaded from the database by the CocoBase runtime repository, it is looked up in the cache by the identifier column(s). Using this technique, an object present in the cache is loaded from the cache instead of requiring the system to access the data source and create a new instance of the object. If the object is found in the cache, then that object is returned from the cache. A developer could create the cache in a way that would cause it to grow and fill all available memory, so it is wise to use a large memory size for the Java startup parameters. If a VERY large set of tables needs to be cached, then something like the Gemstone/J Java virtual machine should be used. Their virtual machine can grow with its own virtual memory, allowing the cache to grow as needed.
  • CocoBase Enterprise provides two separate examples of a shared central cache source code examples of optional mapping server plug-ins. These programs are CocoServerSampleCache . j ava and
  • CocoServerSampleCachePool . j ava each is included as both source and pre-compile binary forms.
  • the plug-ins can be modified for custom caching, or they can used as they are shipped to provide useful out-of-the-box shared caching.
  • the shipped compiled binary code classes belong to the thought . CocoBase package by default, and should be copied into the subdirectory
  • the attributes are ALWAYS upper case, and that they match the 'virtual' column name used in the map (for example : NAME and : ADDRESS even if columns are NAM and ADDR).
  • the client Presuming they have permission through proper assignment of their admin ids by system administrators
  • this default properties file each column that is included in the properties file is made part of the lookup key by the cache.
  • This example code is extracted from the demo program CocoDemoCache . j ava included in the demos directory of the installed CocoBase software package.
  • the example code uses the CBSETCACHEKEY “virtual Object” and “procedure call", both of which can be intercepted in the caching plug-in, and the plug-in can be set to over-ride each of them to manage caching configuration.
  • client side configuration is also possible using the technique described above.
  • Both plug-ins keep the cached objects in a local in memory server cache until the changes have been committed into the database. Once the changes to objects are committed into the database, the cached objects are merged into the central shared cache and are then accessible by other clients needing those objects.
  • Performance can be enhanced by maintaining a list of previously instantiated objects in an "in memory" cache list of objects in the Optional Mapping Server. This can be readily accomplished through using a variety of data structures and facilities including Hashtables, Vectors and Obj ect databases such as Gemstone (which use a technique called "persistence by reachability") to extend the Java Virtual machine to have Virtual Memory.
  • CocoBase can support several thousand direct database requests per minute even on a simple Pentium server with garden-variety databases. Caching provides an even better scaling promise, especially for heavily accessed databases. Services such as Caching and connection pool management can significantly enhance performance numbers. Tests of the caching methods when CocoBase was being improved to implement the above concepts have shown that performance ca nearly triple through the use of even simple caching techniques. For example, some internal benchmarks with CocoBase and caching have clocked a 233MHz 6/Pentium processor machine with Windows NT and 64MB RAM as being able to serve up about 20,000 database requests per minute for individually requested cached data objects.
  • Performance enhancement of an individual system and application configuration may vary based on Java Runtime, OS, Database(s) used, networking configuration including and bandwidth capacity, ORB, etc. Where caching really can really be beneficial to a system is in the client's
  • the CocoBase system uses caches that are written to serve multiple users out of a single pool, and by default the CocoBase cache system is a write-through cache for extremely scalable performance numbers.
  • Such a write through cache is written for a CocoBase system designed to provide scalable performance while avoiding certain undesirable impacts on the transactional capabilities of individual application servers. Since caching is a complex science, it should not be tackled at the beginning of a project that uses the CocoBase system. Instead caching should be implemented and fine-tuned as a final step in development. Such techniques can allow a developer to refine and improve an already streamlined system and avoids using a cache during development that could lead to unfortunate masking of poor software designs and system design flaws. Such problems might only become evident when the final application is implemented and scaled, if performance issues arise, which were masked by the caching during development stages.
  • caching is implemented in the Server Plug-ins instead of being within the Optional Mapping Server itself. This can provide more flexible caching that is user extensible. If either the CocoServerSampleCache or CocoServerSampleCachePool plug-in is loaded, all objects having a database primary key that is accessible from a JDBC will be cached by the CocoBase system. In this system, object data caching is done through the Optional Mapping Server plug-in APIs. Source code jump-starts for providing caching are included with the Optional Mapping Server as source code, but the CocoBase system does not automatically integrate caching directly into the Optional Mapping Server.
  • a developer can utilize the source code provided with the CocoBase package and implement a specific kind of caching necessary for the design of the developed system, and integrate that caching system into the Mapping Server.
  • the code is extensible and can be modified to meet specific project requirements.
  • Sample cache provided can yield many of the common features needed by developers when the CocoBase system is implemented, and the sample cache will probably be completely useful without modification for many tasks. Modification and implementation of caches are an advanced developer functionality issue. The steps of implementing and tuning caching should only be taken on as a final step before deployment, and be taken on with careful planning. Blindly implementing caching without fully understanding a system design and understanding the purposes for caching in the context of that system design can create serious performance, memory and data integrity issues. For example, having multiple databases open in combination with caching can raise real issues with respect to data integrity if caching and multiple databases are not managed properly, particularly where database accesses are not properly managed and synchronized. Managing Object Integrity for Applications Using a CocoBase System
  • Object integrity is typically maintained by keeping the cache synchronized with the data in the underlying data store, and by ensuring that any changes are reflected in the cache if, and ONLY if, such changes are successfully committed to the database.
  • a programming application ends a transaction with a commit operation, any updated persistent objects are written back to the data store, locks are released, and the client specific cache is invalidated (this is referred to as integrating the client specific cache into the shared cache).
  • updates are discarded, locks are released, and the client specific cache is invalidated. This will leave the shared cache unaffected and unmodified.
  • objects may additionally need to be retained in the cache across transaction boundaries (in other words it may be desirable to integrate a change into the shared cache before it is committed).
  • some application-specific logic is needed to deal with the need for consistency between the objects and the underlying data store.
  • Object Integrity Another important issue associated with Object Integrity is the need for unique Object Instances. If duplicates are allowed, it can become nearly impossible for a system to cache and to track Object Instances without the use of the transactional capabilities of a server to synchronize the cache and the main datasource. Because of this, some 'composite' key may be required to ensure that unique instances exist. If a unique key definition exists, then the Mapping Server can manage Object Integrity more properly.
  • Map Caching caches the user data, and must be implemented in a Optional Mapping Server plug-in.
  • Map Caching automatically occurs in a CocoBase connection. Since Maps can become quite complex depending on the number of where conditions and fields involved in its definition, it becomes critical to Cache connections by default.
  • CocoBase meta data for each Map is cached by the CocoBase system the first time that the Object is accessed. The meta data caching can be triggered for a particular map before the data from the map is utilized by calling the method getColumns ( ) on the Connection with the Map name as the parameter such as:
  • a Customer Map will be accessed and cached in the CocoBase runtime before any SQL is created or allowed to execute.
  • This is a convenient method designed to speed runtime access of Maps in the Mapping Server through pre-loading and caching the Map. If this pre-loading and caching is necessary for Maps that are likely to be accessed by clients, it can be done at server/connection startup in order to improve perceived user performance characteristics. Once the server/connection is achieved the system is ready for database accesses, there is nos second delay required to pre-load and to cache the maps before accessing data.
  • the CocoBase runtime is not configured by default to auto-load all maps, only those specifically requested to be loaded or accessed directly will be automatically loaded.
  • Map caching a lazy cache is more effective. Especially since with a lazy cache it is so easy to trigger a load and cache of particular Maps that are likely to be used.
  • CocoBase is currently configured to only permit an application to dump a Map cache from a connection by closing and re-open a connection. Such a dump involves only two method calls, and is easy to implement if necessary by simply entering calls similar to the calls to the "MyBase" database that following two lines illustrate:
  • the CocoBase system and runtime resolves this issue by using a default setting with respect 'unique' keys. This default setting will only permit caching of those records that are specified by a 'unique' key, which identified through the Database Meta Data available from JDBC. Additionally, it is possible for a developer to define a unique key column (or set of columns) through a startup init file or through the runtime API.
  • the CocoBase system is designed to manage the cache by using a unique key, or the key column(s), as the unique identifier in looking up instances and then stores the instances in a Java Properties Object with the unique key as the identifier. With this design, if two duplicate records are retrieved from the database, only one instance will be preserved in the Properties based cache.
  • the CocoBase is not designed to create uniqueness or to enforce uniqueness for database tables that do not have unique index defined.
  • the CocoBase system is designed to ignore an attempt to create caching or to use caching if a unique primary key has not been defined in the database, or a unique key is over-ridden by the developer by their software application design.
  • the CocoBase system is designed to allow non-unique objects to be accessed just as in ordinary database accesses where the CocoBase system is not used. However, the use of as caching is not turned on for those Objects. If a database table doesn't define a unique key, the Objects simply get passed through the CocoBase plug-in without caching becoming involved. However, a developer can easily take advantage of CocoBase plug-in caching even if a database table does not use a 'unique' key column set, by simply defining their own unique key for the database table.
  • CocoBaseBundle properties startup init file to see how the CocoBase system provides an ability to dynamically define a Unique Key. Also, developers can review the CocoDemoCache . j ava file portions related to the CocoBase connect ( ) methods format and commands, for an example of how a developer can easily define an Object Unique key through the use of the Mapping server CBSETCACHEKEY functionality. Design of the CocoBase Sample Optional Mapping Server Object Caching
  • CocoServerSampleCache . j ava is designed to provide a combined caching and connection pooling.
  • the cache portion for each plug-in is basically identical to one another, and the cache design is fairly intelligent with respect to caching systems.
  • the cache portion of the plug-in keeps a rollback log for each client that is using the cache (a private cache) which is integrated with the shared cache upon the completion of a successful commit that updates the datasource. If the cache setting of AutoCommit is used, the caching system of the plug-in is designed to automatically integrate the changes to the private cache into the shared cache after each operation is completed that changes the private cache.
  • the CocoServerSampleCache plug-in is loaded as the default plug-in for the script start cache, ⁇ bat/sh ⁇ .
  • the other plug-in is used by substituting the script startcachepool .
  • ⁇ bat/sh ⁇ and CocoServerSampleCachePool is loaded as the CocoBase system plug-in instead of the default cache plug-in.
  • the caching portion of the plug-in is also designed to support some administrator control functions for starting, stop, and managing the cache. Additional features may be added by modifying the source code that is provided as part of the CocoBase system.
  • the cache plug-in source code described herein supports (among other things) the administrator control functions of CBSTARTCACHE, CBSTOPCACHE and CBSETCACHEKEY, which can be used by a developer to set a caching system design that will start and stop the shared cache, as well providing the ability to override the primary key column(s) used at a resource to lookup Objects in the cache.
  • the cache plug-in source code does not need to be modified to manage transactional coordination or regulate cache memory size management.
  • Cache system design is easily configured to solve such issues in a much more reliable fashion.
  • Cache databases for example, ODI and HYPERSONIC SQL each implement both manual and automatic mechanisms to trim the cache size on low memory availability.
  • Other cache management features are provided by server monitoring capabilities, such as the multiple database synchronization capabilities of Weblogic 6.1, as described earlier. If the cache database and the main database are both registered with the Weblogic 6.1 server (or other application servers having similar monitoring capabilities), the transactional capabilities of the server can be harnessed to manage synchronization of the cache database with the primary database in coordination with the CocoBase system and fully implement the cache plug-in features of CocoBase for enhanced system performance.
  • the CocoBase Optional Mapping Server is designed to integrate into and interoperate with standard Application Servers whose users need to have database access.
  • the CocoBase runtime and Optional Mapping Server can be used to provide persistence and mapping functionality to the overall system irrespective of the type of object programming application server that is chosen to be utilized for a particular computer system.
  • application servers enable corporations to develop, deploy, and manage business-critical applications that frequently need to have transactional coordination capabilities.
  • Object programming applications that run under such servers can delegate certain functions, such as the transactional coordination to the server.
  • CocoBase database access features for development and deployment.
  • a few of those reasons are high performance, rapid development, scalability, easy integration with existing enterprise systems, state management, load balancing, and table/row locking mechanisms.
  • Such features can be the keys to good html and Jave Server Pages (JSP) creation that can interface well with a user and permit the user to access to data and to conduct transactions that implement important features of the server system and the CocoBase system that are invisible to the user. Examples are the server transactional coordination and the CocoBase runtime and caching systems.
  • Such software application programs can be developed to delegate the functions of database access and data persistence to the CocoBase system, without the need to include database specific or persistence specific code in the application program source code.
  • CocoBase can automatically generate the server connectivity source code and persistence source code from the database maps.
  • CocoBase leverages the functionality of the Optional Mapping Server and features of application servers to provide additional advance mapping functions - typically the weakest link in Application Servers. CocoBase has become the preeminent mapping technology in Java, and provides superior mapping that can be readily utilized with virtually any mapping server as part of the overall system design. Application servers should be thought of as very complimentary technology to the CocoBase database mapping features, the CocoBase mapping server, CocoBase cache plug-in features, CocoBase runtime SQL generation facilities as well as other functionalities of the CocoBase software system product line.
  • Connection pooling may be described as the concept of keeping database connections open and re-using them with new clients. Since it can be a resource intensive prospect to open a new database connection it is often advantageous to reuse existing database connections when possible, and to even use cached objects that are obtained from an earlier access of the database.
  • a connection pool can be created for multiple clients. It keeps the connection to the database open for future requests. Creating a pool of JDBC connections gives clients ready access to connections that are already open. Connection pooling can improve performance by removing the overhead of opening and closing a new connection for each database operation or each time a new user tries to access the same database.
  • the connection management service of CocoBase can determine whether a database query can use a connection from the connection pool based on data source, user name, password, and the logged-on user account, etc.
  • the connections in the pool can be shared among any users who can successfully match the login requirements.
  • each member client can get a connection from the pool for use, and then return it to the pool when finished (but the connection itself is not closed).
  • the developer can simply edit the Pool configuration file to set the desire connection pooling requirements (the file CocoPoolConf ig .properties).
  • Both the CocoServerSampleConnectionPool . j ava example plug-in and the CocoServerSampleCachePool . j ava example plug-in are designed to utilize this property file in order to configure the system Connection Pooling.
  • the source code of each Connection Pooling plug-in can be readily customized to meet any project requirement not covered automatically in view of the discussion and description provided herein.
  • CocoBase provides a solid infrastructure to allow easy user plug-ins for state management, load balancing, caching, connection pooling, etc. Because the focus of this server is on mapping, it can be referred to as an Optional Mapping Server. Such a mapping server it is designed to tie together different data base driver systems, and provide transparent and consistent use of those systems for an application developer. Another good use of such a system it to permit the easy transport of data from one data system to another, as described above in detail.
  • the CocoBase Optional Mapping Server is designed as an ORB Service loaded into the CORBA ORB. hi such a case, each mapping server is fully multi-threaded and capable of supporting many simultaneous users.
  • the CocoBase Optional Mapping Server also provides access to and transparent use of JDBC and either CORBA or RMI with 3 -tier CocoBase adapters to the Mapping Server, without requiring application developers to understand or to program in either of those driver systems.
  • the CocoBase System also provides applications with an added level of security that is not possible from Internet enabled JDBC drivers.
  • the CocoBase system runtime, data caching, object caching, and mapping features can be readily utilized by a developer to achieve a very scalable and high- performance data access and mapping system. This is accomplished by minimizing I/O between the client and server, in a fully multi-thread multi server architecture. The developer can permit client applications to decide when and where and how much data is sent between the client and server. This means the system does not need to burden down data pipes with irrelevant information or with lots of small independent network requests. Because less I/O is used, a system can be designed which utilize the same data bandwidth to support many more users with the CocoBase system implemented than it could have supported in the absence of CocoBase.
  • Object programming applications can delegate database accesses to CocoBase runtime and mapping repositories to create increased security on computer systems. This can be particularly helpful when the system is connected to the internet or other open connections. Applications that interface with uses are more secure if they have been written to utilized the CocoBase system and to delegate the database accesses to CocoBase. In such a case, clients (system users and application software) access the optional mapping server through a CocoBase map. Each map explicitly specifies each table field and where conditions associated with available operations, and the client does not have access to the underlying database driver. This can be utilized to restrict the data that can be access by a particular client.
  • the CocoBase System provides this additional security because database access is done through the list of maps available to a particular user, and the client or application software does not have direct access to the underlying database driver and therefore to data other than that available through the list of maps.
  • the CocoBase system is designed to provide this additional layer of remote security by providing a list of maps to which a particular user is granted access. Even this security feature can be easily extended by customizing the source code of the Optional Mapping Server Plug-in.
  • the CocoBase Optional Mapping Server model does not place SQL in client applications (which reduces rogue client capabilities). Instead, the runtime libraries of the CocoBase system as described at length earlier above.
  • the CocoBase runtime libraries in combination with the pre-defined maps manage all SQL access to the data source through the Mapping Server and predefined Maps. An implication of this design means is that if a given CocoBase map, an operation within a map, or an attribute within an operation isn't published to the client, it does not exist from the perspective of the client.
  • the CocoBase Relational 2-tier system sits directly on the JDBC driver instead of utilizing the mapping server and the runtime maps, and the 2-tier system does not possess the same security mechanism.
  • the JDBC driver instead of utilizing the mapping server and the runtime maps, and the 2-tier system does not possess the same security mechanism.
  • CocoBase 2-tier runtime libraries permit a getConnect ion ( ) call, which returns information necessary to access the system JDBC driver.
  • a getConnect ion ( ) call returns information necessary to access the system JDBC driver.
  • Many system that are not truly an "O/R" system in that they are not fully delegated the control of database assess have the same problem, hi such a system, security will be limited to whatever security is provided by the JDBC driver and the associated database, such as database login protocols and the like. Such login protocols can be limited.
  • database login protocols can be limited.
  • CocoBase adapter and the associated mapping server may be sufficient mainly for Enterprise 2-tier Intranet application development. However, even in such systems it may be desirable to have a single database where certain data needs to be secure from access by some system users.
  • the Optional Mapping Server provides applications an added level of security not possible from Internet or Intranet enabled JDBC drivers. Due to the security design flaws present with typical JDBC drivers, and the concept of permitting a JDBC driver is to pass arbitrary SQL from client applications to back-end server systems, it can be difficult or virtually impossible to secure JDBC systems for Internet or Intranet use without the use of the CocoBase 3 -tier system of delegated database access.
  • the CocoBase system may also be described as having architecturally secure design that works on the 'publish paradigm' with the server managing and publishing all access to SQL on the database server. Client access is restricted to only those defined maps, which are published as being available from the Mapping Server.
  • the CocoBase Enterprise 3 -tier system (with its delegated database access features) allows companies to pre-define maps that can be executed by clients, instead of allowing clients to define or change the SQL statement that the server is capable of executing.
  • developers can easily integrate/extend the components for providing additional security, and to delegate security and project specific logic to the CocoBase system. Maps and objects related to those maps can be created in a number of ways, usually in response to application users requests.
  • the system of the present invention will have to accommodate such numbers of objects and maps associated with those objects. Because of the flexibility of the present system, maps can be bonded to objects dynamically (during the application run time). The result will be that a single map could be appropriate for a plurality of objects. On the other hand, a single object may be bonded by a plurality of maps. Objects that can be used to access large volumes of data, the use of any particular map may initiate a data response so large that it cannot be easily managed. Accordingly, single object may have a number of different maps each configured to access only a particular portion of the data associated with the selected object, hi this manner, maps can be used to select only that data which would be relevant to the map user.
  • This selectivity will render a large volume of data associated with a particular object to be more manageable for access and use.
  • the distributed of selected maps to access only selected portions of the datastore associated with a particular object can be used in as a security device. In this manner, individuals are provided with maps having the capability of accessing only those portions of the database that are appropriate for the map user.
  • the selection and distribution of maps for a particular object can serve as a security hierarchy with respect to the data to be made available.
  • the dynamic mapping of the present invention can be applied where a Java object provides translation by mapping such an object to first data source (either relational or object) can also by mapping such an object to an XML for a second format database. This arrangement allows greater control as to how the data steps are exchanged, filtered, and validated by exchanging data.
  • Multiplicity link between the Department and Employee, shown below as a 1 : 1 link. Right click on the DeptEmp to edit or create the Map and Link variables.
  • the Wizard allows a user to add a new target link for the map or to remove a map from the Mst.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

L'invention concerne un système et un procédé pour une base de données dynamique orientée objets (2C). L'invention concerne également un système de mise en correspondance et de manipulation (4B) permettant de mettre en corrélation ou de traduire un type de base de données en un autre type de base de données ou en une application de programmation d'objets, et de mettre en correspondance dynamique des bases de données avec des objets choisis (3B). La mise en corrélation et la traduction comprennent : la traduction relationnel-objet, la traduction objet-objet, relationnel-relationnel ou une combinaison de celles-ci. L'invention concerne également des systèmes et des procédés comprenant facultativement des éléments de mise en antémémoire (3A), des dispositifs de sécurité (51), des outils de transfert de données, ainsi que des éléments de lecture, d'écriture, d'interprétation et de manipulation de fichiers de données XML et XMI (52).
PCT/US2003/015356 2003-05-19 2003-05-19 Systeme de mise en correspondance et de manipulation de base de donnees dynamique orientee objets WO2004107162A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/US2003/015356 WO2004107162A1 (fr) 2003-05-19 2003-05-19 Systeme de mise en correspondance et de manipulation de base de donnees dynamique orientee objets
AU2003304169A AU2003304169A1 (en) 2003-05-19 2003-05-19 Dynamic object-driven database manipulation and mapping system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2003/015356 WO2004107162A1 (fr) 2003-05-19 2003-05-19 Systeme de mise en correspondance et de manipulation de base de donnees dynamique orientee objets

Publications (1)

Publication Number Publication Date
WO2004107162A1 true WO2004107162A1 (fr) 2004-12-09

Family

ID=33488764

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/015356 WO2004107162A1 (fr) 2003-05-19 2003-05-19 Systeme de mise en correspondance et de manipulation de base de donnees dynamique orientee objets

Country Status (2)

Country Link
AU (1) AU2003304169A1 (fr)
WO (1) WO2004107162A1 (fr)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090150367A1 (en) * 2007-11-30 2009-06-11 Microsoft Corporation Mapping and query translation between xml, objects, and relations
CN101145164B (zh) * 2007-10-30 2010-06-02 金蝶软件(中国)有限公司 一种序时簿的查询方法及一种序时簿的查询装置
US7941461B2 (en) 2006-01-23 2011-05-10 International Business Machines Corporation System and method for developing and enabling model-driven XML transformation framework for e-business
CN103810171A (zh) * 2012-11-06 2014-05-21 深圳市金蝶中间件有限公司 生成限定范围的随机测试数据的方法及系统
US9727599B2 (en) 2013-10-30 2017-08-08 International Business Machines Corporation Automatically correcting invalid scripts in web applications
EP3422355A1 (fr) * 2017-06-28 2019-01-02 Fenwal, Inc. Système et procédé de synchronisation de bases de données de dispositif médical
CN109815579A (zh) * 2019-01-18 2019-05-28 石家庄铁道大学 边坡参数的确定方法、计算机可读存储介质及终端设备
CN110825356A (zh) * 2019-11-12 2020-02-21 东方电子股份有限公司 一种微服务开发框架及实时监控实现方法
CN115834654A (zh) * 2023-02-22 2023-03-21 广东广宇科技发展有限公司 一种基于多重映射的数据高效传输方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5761509A (en) * 1993-06-14 1998-06-02 International Business Machines Corporation System and method for enabling before/after method processing in an object oriented system
US5784553A (en) * 1996-01-16 1998-07-21 Parasoft Corporation Method and system for generating a computer program test suite using dynamic symbolic execution of JAVA programs
US20020120859A1 (en) * 2000-01-14 2002-08-29 Lipkin Daniel S. Method and apparatus for an improved security system mechanism in a business applications management system platform
US6591272B1 (en) * 1999-02-25 2003-07-08 Tricoron Networks, Inc. Method and apparatus to make and transmit objects from a database on a server computer to a client computer

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5761509A (en) * 1993-06-14 1998-06-02 International Business Machines Corporation System and method for enabling before/after method processing in an object oriented system
US5784553A (en) * 1996-01-16 1998-07-21 Parasoft Corporation Method and system for generating a computer program test suite using dynamic symbolic execution of JAVA programs
US6591272B1 (en) * 1999-02-25 2003-07-08 Tricoron Networks, Inc. Method and apparatus to make and transmit objects from a database on a server computer to a client computer
US20020120859A1 (en) * 2000-01-14 2002-08-29 Lipkin Daniel S. Method and apparatus for an improved security system mechanism in a business applications management system platform

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7941461B2 (en) 2006-01-23 2011-05-10 International Business Machines Corporation System and method for developing and enabling model-driven XML transformation framework for e-business
CN101145164B (zh) * 2007-10-30 2010-06-02 金蝶软件(中国)有限公司 一种序时簿的查询方法及一种序时簿的查询装置
US20090150367A1 (en) * 2007-11-30 2009-06-11 Microsoft Corporation Mapping and query translation between xml, objects, and relations
US9336327B2 (en) * 2007-11-30 2016-05-10 Microsoft Technology Licensing, Llc Mapping and query translation between XML, objects, and relations
CN103810171A (zh) * 2012-11-06 2014-05-21 深圳市金蝶中间件有限公司 生成限定范围的随机测试数据的方法及系统
CN103810171B (zh) * 2012-11-06 2017-02-08 深圳市金蝶天燕中间件股份有限公司 生成限定范围的随机测试数据的方法及系统
US9727599B2 (en) 2013-10-30 2017-08-08 International Business Machines Corporation Automatically correcting invalid scripts in web applications
US10713237B2 (en) 2013-10-30 2020-07-14 International Business Machines Corporation Automatically correcting invalid scripts in web applications
EP3422355A1 (fr) * 2017-06-28 2019-01-02 Fenwal, Inc. Système et procédé de synchronisation de bases de données de dispositif médical
US11475992B2 (en) 2017-06-28 2022-10-18 Fenwal, Inc. System and method of synchronizing medical device databases
CN109815579A (zh) * 2019-01-18 2019-05-28 石家庄铁道大学 边坡参数的确定方法、计算机可读存储介质及终端设备
CN109815579B (zh) * 2019-01-18 2023-04-07 石家庄铁道大学 边坡参数的确定方法、计算机可读存储介质及终端设备
CN110825356A (zh) * 2019-11-12 2020-02-21 东方电子股份有限公司 一种微服务开发框架及实时监控实现方法
CN115834654A (zh) * 2023-02-22 2023-03-21 广东广宇科技发展有限公司 一种基于多重映射的数据高效传输方法
CN115834654B (zh) * 2023-02-22 2023-05-05 广东广宇科技发展有限公司 一种基于多重映射的数据高效传输方法

Also Published As

Publication number Publication date
AU2003304169A1 (en) 2005-01-21

Similar Documents

Publication Publication Date Title
US7149730B2 (en) Dynamic class inheritance and distributed caching with object relational mapping and cartesian model support in a database manipulation and mapping system
US6999956B2 (en) Dynamic object-driven database manipulation and mapping system
US6985912B2 (en) Dynamic object-driven database manipulation and mapping system having a simple global interface and an optional multiple user need only caching system with disable and notify features
US5857197A (en) System and method for accessing data stores as objects
US20040006549A1 (en) Micro edition dynamic object-driven database manipulation and mapping system
US7464386B2 (en) Data controls architecture
US7051032B2 (en) System and method for providing post HOC access to legacy applications and data
US6654747B1 (en) Modular scalable system for managing data in a heterogeneous environment with generic structure for control repository access transactions
US7103600B2 (en) Displayable presentation page and SQL searchable relational data source implementation of a system, method and software for creating or maintaining distributed transparent persistence of complex data objects and their data relationships
JP2720904B2 (ja) 自己記述によるデータベース管理システムの構成方法および開発/変更方法
US20030167456A1 (en) Architecture for building scalable object oriented web database applications
WO2003010691A1 (fr) Procede servant a creer une persistance transparente repartie d'objets de donnees complexes
US20050289160A1 (en) System and method for delayed fetching of designated members of a user defined type
WO2004107162A1 (fr) Systeme de mise en correspondance et de manipulation de base de donnees dynamique orientee objets
EP1344157A1 (fr) Systeme dynamique de manipulation et de mappage d'une base de donnees orientee objet
Danturthi Comparative study of web application development with sql server and db4o
Bai JDBC API and JDBC Drivers
US20240126727A1 (en) Techniques for comprehensively supporting json schema in a rdbms
US20240126726A1 (en) Techniques for comprehensively supporting json schema in a rdbms
Banerjee et al. Oracle C++ Call Interface Programmer's Guide, 11g Release 2 (11.2) E10764-01
MacLean et al. Exploring Android Persistence and Content Providers
Akin et al. Analysis of Java distributed architectures in designing and implementing a client/server database system
Banerjee et al. Oracle C++ Call Interface Programmer's Guide, 11g Release 2 (11.2) E10764-04
Ball A framework of services to provide a persistent data access service for the CORBA environment
Banerjee et al. Oracle C++ Call Interface Programmer's Guide, 11g Release 2 (11.2) E10764-02

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP