WO2002075601A2 - System for and method of synchronizing a standard-protocol database with a legacy data - Google Patents

System for and method of synchronizing a standard-protocol database with a legacy data Download PDF

Info

Publication number
WO2002075601A2
WO2002075601A2 PCT/US2002/008058 US0208058W WO02075601A2 WO 2002075601 A2 WO2002075601 A2 WO 2002075601A2 US 0208058 W US0208058 W US 0208058W WO 02075601 A2 WO02075601 A2 WO 02075601A2
Authority
WO
WIPO (PCT)
Prior art keywords
data
computer
shaper
application
client device
Prior art date
Application number
PCT/US2002/008058
Other languages
French (fr)
Other versions
WO2002075601A3 (en
Inventor
Neil Hickey
Original Assignee
Orchid Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Orchid Systems, Inc. filed Critical Orchid Systems, Inc.
Priority to AU2002248638A priority Critical patent/AU2002248638A1/en
Publication of WO2002075601A2 publication Critical patent/WO2002075601A2/en
Publication of WO2002075601A3 publication Critical patent/WO2002075601A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application

Definitions

  • a bank using a legacy system may make a portion of its account information available to a Web- accessible database.
  • the bank needs to prevent any corruption of data or intrusion into its internal system by external Web users. Further, the bank needs to prevent any degradation in internal system performance caused by large numbers of external users accessing the system concurrently. What is needed is a way to decouple a legacy system and a publicly accessible database.
  • FIG. 1 is a schematic diagram illustrating an embodiment of a system for synchronizing non-legacy data with legacy data in accordance with the present invention.
  • Figure 2 is a flowchart illustrating a method of training database synchronization system 100 to synchronize non-legacy data with legacy data.
  • Figure 3 is a flowchart illustrating a method of using database synchronization system 100 to synchronize non-legacy data with legacy data
  • the present invention is a system for and method of synchronizing non-legacy data with legacy data.
  • the system monitors and reinterprets the data stream associated with an existing application and, according to rules established during a training sequence, programmatically updates data in a non-legacy database with data from a legacy database with near simultaneity.
  • the non-legacy database may be publicly accessible database, such as a Web-enabled database.
  • Figure 1 is a schematic representation of a database synchronization system 100, which includes a DB-Shaper computer 140, a host computer 120, and a training terminal 154.
  • Host computer 120 further includes a data storage device 110, a host application 121, and a host terminal 170.
  • DB-Shaper computer 140 further includes a DB-Shaper application 150, a database application 151, an auxiliary storage device 157, and a shaper rule set storage device 153.
  • the system 100 may be comprised of the applicants' patented trainable user interface technology mentioned above.
  • Database synchronization system 100 also includes a first network 125 and a second network 132.
  • Host computer 120 may connect to DB-Shaper computer 140 directly or via first network 125.
  • Training terminal 154 may connect to DB-Shaper computer 140 directly or via second network 132.
  • First network 125 and second network 132 may be intranet networks or the Internet. Alternatively, first network 125 and second network 132 may be the same network.
  • Database application 151 is any available standard database system such as Oracles SQL+ or IBM's SQL server plus appropriate software to allow external access.
  • multiple host computers 120 may connect to DB- Shaper computer 140.
  • host computer 120 may include multiple host applications 121.
  • host computer 120 and DB-shaper computer 140 may be the same device.
  • Training terminal 154 is typically a PC running terminal emulation software, but may also be a display and keyboard connected directly to DB-Shaper computer 140.
  • Host terminal 170 is typically a wired terminal, such as a 3270 or VTlOO-style terminal, but may also be other types. For the purposes of training the DB-Shaper system, training terminal 154 may also have the capability of emulating host terminal 170, thus obviating the need for host terminal 170 to be physically present.
  • Step 210 Defining data to be made available
  • the trainer determines which data is to be made available via the updated interface. After the data is defined, the trainer uses training terminal 154 to interact with database application 151 to create an empty database stored in auxiliary storage device 157. The database stored on auxiliary storage device 157 is now prepared to contain the data that will be made publicly accessible.
  • Step 220 Identifying host operations that change any of the data
  • the trainer using host terminal 170 or training terminal 154, exercises host application 121 to gain familiarity with its operation.
  • the trainer determines which operations within host application 121 change any of the data that is to be made publicly available. For example, if host application 121 is an airline scheduling application and the data to be made publicly available are airline departure and arrival times, the trainer determines what specific host application 121 operations are used to place, delete, or change airplane schedules within the system.
  • Step 230 Preparing sample data sets
  • the trainer using training terminal 154 or host terminal 170, defines a list of sample data to be used to exercise host application 121.
  • the trainer chooses sample data that will exhaustively exercise host application 121. This includes data that would normally be processed by host application 121 successfully (that is, non-exception data) and data that would normally cause exceptions or errors within host application 121 (that is, exception data).
  • the use of such sample data results in a rule set that accommodates all data conditions.
  • the rule set is defined as the sequence of steps necessary for DB-Shaper application 150 to perform a needed function.
  • Step 235 Selecting a sample data set
  • the trainer chooses a sample data set from the list defined in step 230.
  • Step 240 Exercising host application
  • the trainer using training terminal 154, exercises host application
  • DB-Shaper application 150 via DB-Shaper application 150.
  • a rule set is generated and stored on shaper rule set storage device 153.
  • the rule set captures the operations performed by the trainer and captures the data as it is entered. In this way, the rule set codifies the procedures for recognizing entered data. If the operation for each sample data set is processed successfully (for non-exception data), the data stored on data storage device 110 is updated. If the transaction fails or aborts (for exception data), there is no change to the data stored on data storage device 110.
  • Step 250 Adding rules to rule set
  • the trainer using training terminal 154, manually adds database access rules to the rule set stored on shaper rule set storage device 153. These rules inform database application 151 how to update the data stored in auxiliary storage device 157 so that this data exactly matches the data stored in data storage device 110.
  • An example of a database access rule that might be manually added is an SQL statement. In this way, DB-Shaper application 150 is trained to synchronize the data stored in data storage device 110 and auxiliary storage device 157.
  • Step 260 More data sets?
  • the trainer determines if there are additional data sets to be processed. If yes, process 200 returns to step 235; if no, process 200 ends.
  • Step 305 Pre-populating the public database
  • auxiliary database 157 In this step, the user, using training terminal 154, pre-populates auxiliary database 157 so mat the data stored therein exactly matches the data stored in the legacy database data storage device 110.
  • the method for this data migration step is more fully described in the applicants' co-pending U.S. patent application , entitled , the contents of which are hereby incorporated by reference in their entirety. (Invention Disclosure Orchid 008.)
  • Step 310 Operating host application
  • the user operates host application 121 via training terminal 154 and DB-Shaper application 150.
  • Step 320 Monitoring rule set
  • DB-Shaper application 150 compares the steps that host application 121 performed in step 310 with the rule set that was generated in step 240 of process 200 and stored in shaper rule set storage device 153. When a correspondence occurs between a host application 121 operation and the rule set, data in auxiliary storage device 157 is updated accordingly, as described in step 330.
  • Step 330 Updating public database
  • DB-Shaper application 150 updates the data in auxiliary storage device 157 according to the rule set generated in step 240 of process 200. In this manner, data synchronization occurs between the publicly accessible data stored in auxiliary storage device 157 and the legacy data stored in data storage device 110.
  • Step 340 End data synchronization?
  • step 300 the user determines if data synchronization is complete. If no, process 300 returns to step 320; if yes, process 300 ends. Data synchronization between data storage device 110 and auxiliary storage device 157 continues as long as the user operates host application 121 or until DB-Shaper application 150 is disabled.
  • host application 121 In order for data synchronization to occur, host application 121 must be operated from training terminal 154 and not from host terminal 170.
  • DB-Shaper computer 140 and DB-Shaper application 150 are installed external to host computer 120 and are therefore not invasive to host computer 120 or host application 121. As a result, all of the functionality and business logic of host application 121 is preserved when DB-Shaper computer 140 is installed, including error checking and error handling functions.

Abstract

A system for and method of providing a new client interface to an existing application. The various embodiments described employ a trainable user interface translator application to monitor, analyze, and reformat data packet streams. The translator application analyzes data packet streams during a training session using a first client device and a training terminal, and stores format information in format data packet maps for subsequent use following creation of a new client interface.

Description

System for and Method of Synchronizing Non-Legacy Data with Legacy Data
Background of the Invention With the World Wide Web becoming more pervasive in business applications, increasing numbers of organizations need to make some or all of their computer data available for public use. For example, a bank may wish to make select account information available to customers via the Web on a publicly accessible database while maintaining the remainder of its operational data on an internal database. For organizations utilizing legacy systems that employ nonstandard data access methods, this often requires manually migrating the data from one database to the other. Not only is this a laborious, costly, and error-prone process, but data security and synchronization are also major concerns, particularly in cases where the data in the legacy system is updated frequently. Real-time updating of data and decoupling of the public and non-public systems are of critical importance in most business applications. An automated system that provides security and synchronizes legacy data with non-legacy data could lead to more efficient and safer business practices, a larger customer base, and higher revenues.
Many large businesses are heavily invested in their legacy systems. The complex business logic and error checking functionality of these legacy systems often make them irreplaceable. Because of their widespread business use, the market for integrating legacy systems with standard-access databases is measured in the tens of millions of dollars annually. Software companies that expand the reliability, performance, and longevity of existing business software by developing more efficient data access methods could seize a significant portion of this market.
As businesses increasingly utilize data from disparate sources, they have a need to update data in two databases with near-simultaneity in order to keep the databases synchronized. For example, a bank using a legacy system may want to make a portion of its account available to a Web-accessible database. The Web- accessible database must remain synchronized with the legacy system in order to provide accurate account information to clients using the Web. Current systems for achieving this function require that the databases support the same interface protocols, severely limiting their usefulness, especially to users of legacy computer systems. What is needed is a way to synchronize a nonstandard legacy database with a standard-protocol database. As businesses diversify their operations to both internal and external functions, system security becomes a critical concern. For example, a bank using a legacy system may make a portion of its account information available to a Web- accessible database. The bank, however, needs to prevent any corruption of data or intrusion into its internal system by external Web users. Further, the bank needs to prevent any degradation in internal system performance caused by large numbers of external users accessing the system concurrently. What is needed is a way to decouple a legacy system and a publicly accessible database.
As businesses using legacy systems place data onto publicly accessible databases, maintaining currency and consistency of the data between the two systems becomes an important requirement. For example, a bank that has made a portion of its account information available on a Web-accessible database requires that the Web data be updated immediately following a change in its legacy database. Failure to immediately update the Web database may result in inaccurate information being displayed on the Web and, therefore, dissatisfied customers. What is needed is a way to maintain consistency and timeliness of data between a legacy system and a publicly accessible database.
There are a number of existing database tools that are designed to access databases that comply with standard protocols like JDBC and ODBC. The systems supported by these standard databases can typically be scaled rapidly to support a large number of users. However, many businesses rely heavily on the business logic inherent to their legacy systems, which tend to be less scalable than the standard systems. In order to increase legacy system performance, these businesses have a need to take advantage of the higher performance of the newer database systems while still utilizing the business logic within their legacy systems. What is needed is a way to provide broad access to legacy data via standard database protocols.. Summary of the Invention
Brief Description of the Drawing Figure 1 is a schematic diagram illustrating an embodiment of a system for synchronizing non-legacy data with legacy data in accordance with the present invention.
Figure 2 is a flowchart illustrating a method of training database synchronization system 100 to synchronize non-legacy data with legacy data.
Figure 3 is a flowchart illustrating a method of using database synchronization system 100 to synchronize non-legacy data with legacy data
Detailed Description of Certain Preferred Embodiments of the Invention
Preferred embodiments of the invention will now be described with reference to the accompanying drawings.
The present invention is a system for and method of synchronizing non-legacy data with legacy data. The system monitors and reinterprets the data stream associated with an existing application and, according to rules established during a training sequence, programmatically updates data in a non-legacy database with data from a legacy database with near simultaneity. The non-legacy database may be publicly accessible database, such as a Web-enabled database.
Figure 1 is a schematic representation of a database synchronization system 100, which includes a DB-Shaper computer 140, a host computer 120, and a training terminal 154. Host computer 120 further includes a data storage device 110, a host application 121, and a host terminal 170. DB-Shaper computer 140 further includes a DB-Shaper application 150, a database application 151, an auxiliary storage device 157, and a shaper rule set storage device 153. The system 100 may be comprised of the applicants' patented trainable user interface technology mentioned above.
Database synchronization system 100 also includes a first network 125 and a second network 132.
Host computer 120 may connect to DB-Shaper computer 140 directly or via first network 125. Training terminal 154 may connect to DB-Shaper computer 140 directly or via second network 132. First network 125 and second network 132 may be intranet networks or the Internet. Alternatively, first network 125 and second network 132 may be the same network.
Database application 151 is any available standard database system such as Oracles SQL+ or IBM's SQL server plus appropriate software to allow external access.
In an alternate configuration, multiple host computers 120 may connect to DB- Shaper computer 140. Similarly, host computer 120 may include multiple host applications 121. Further, host computer 120 and DB-shaper computer 140 may be the same device. Training terminal 154 is typically a PC running terminal emulation software, but may also be a display and keyboard connected directly to DB-Shaper computer 140. Host terminal 170 is typically a wired terminal, such as a 3270 or VTlOO-style terminal, but may also be other types. For the purposes of training the DB-Shaper system, training terminal 154 may also have the capability of emulating host terminal 170, thus obviating the need for host terminal 170 to be physically present.
A method of training database synchronization system 100 to synchronize non-legacy data with legacy data is now described with reference to Figure 2.
Step 210: Defining data to be made available In this step, the trainer determines which data is to be made available via the updated interface. After the data is defined, the trainer uses training terminal 154 to interact with database application 151 to create an empty database stored in auxiliary storage device 157. The database stored on auxiliary storage device 157 is now prepared to contain the data that will be made publicly accessible.
Step 220: Identifying host operations that change any of the data In this step, the trainer, using host terminal 170 or training terminal 154, exercises host application 121 to gain familiarity with its operation. During this process, the trainer determines which operations within host application 121 change any of the data that is to be made publicly available. For example, if host application 121 is an airline scheduling application and the data to be made publicly available are airline departure and arrival times, the trainer determines what specific host application 121 operations are used to place, delete, or change airplane schedules within the system.
Step 230: Preparing sample data sets In this step, the trainer, using training terminal 154 or host terminal 170, defines a list of sample data to be used to exercise host application 121. The trainer chooses sample data that will exhaustively exercise host application 121. This includes data that would normally be processed by host application 121 successfully (that is, non-exception data) and data that would normally cause exceptions or errors within host application 121 (that is, exception data). The use of such sample data results in a rule set that accommodates all data conditions. The rule set is defined as the sequence of steps necessary for DB-Shaper application 150 to perform a needed function.
Step 235: Selecting a sample data set
In this step, the trainer chooses a sample data set from the list defined in step 230.
Step 240: Exercising host application In this step, the trainer, using training terminal 154, exercises host application
121 via DB-Shaper application 150. As host application 121 is exercised, a rule set is generated and stored on shaper rule set storage device 153. The rule set captures the operations performed by the trainer and captures the data as it is entered. In this way, the rule set codifies the procedures for recognizing entered data. If the operation for each sample data set is processed successfully (for non-exception data), the data stored on data storage device 110 is updated. If the transaction fails or aborts (for exception data), there is no change to the data stored on data storage device 110.
Step 250: Adding rules to rule set In this step, the trainer, using training terminal 154, manually adds database access rules to the rule set stored on shaper rule set storage device 153. These rules inform database application 151 how to update the data stored in auxiliary storage device 157 so that this data exactly matches the data stored in data storage device 110. An example of a database access rule that might be manually added is an SQL statement. In this way, DB-Shaper application 150 is trained to synchronize the data stored in data storage device 110 and auxiliary storage device 157.
Step 260: More data sets?
In this step, the trainer determines if there are additional data sets to be processed. If yes, process 200 returns to step 235; if no, process 200 ends.
A method of using database synchronization system 100 to synchronize non- legacy data with legacy data is now described with reference to Figure 3.
Step 305: Pre-populating the public database
In this step, the user, using training terminal 154, pre-populates auxiliary database 157 so mat the data stored therein exactly matches the data stored in the legacy database data storage device 110. The method for this data migration step is more fully described in the applicants' co-pending U.S. patent application , entitled , the contents of which are hereby incorporated by reference in their entirety. (Invention Disclosure Orchid 008.)
Step 310: Operating host application
In this step, the user operates host application 121 via training terminal 154 and DB-Shaper application 150.
Step 320: Monitoring rule set
In this step, DB-Shaper application 150 compares the steps that host application 121 performed in step 310 with the rule set that was generated in step 240 of process 200 and stored in shaper rule set storage device 153. When a correspondence occurs between a host application 121 operation and the rule set, data in auxiliary storage device 157 is updated accordingly, as described in step 330.
Step 330: Updating public database In this step, DB-Shaper application 150 updates the data in auxiliary storage device 157 according to the rule set generated in step 240 of process 200. In this manner, data synchronization occurs between the publicly accessible data stored in auxiliary storage device 157 and the legacy data stored in data storage device 110.
Step 340: End data synchronization?
In this step, the user determines if data synchronization is complete. If no, process 300 returns to step 320; if yes, process 300 ends. Data synchronization between data storage device 110 and auxiliary storage device 157 continues as long as the user operates host application 121 or until DB-Shaper application 150 is disabled.
In order for data synchronization to occur, host application 121 must be operated from training terminal 154 and not from host terminal 170.
DB-Shaper computer 140 and DB-Shaper application 150 are installed external to host computer 120 and are therefore not invasive to host computer 120 or host application 121. As a result, all of the functionality and business logic of host application 121 is preserved when DB-Shaper computer 140 is installed, including error checking and error handling functions.
Other embodiments of the invention will be apparent to those skilled in the art from a consideration of the specification or practice of the invention disclosed herein. It is intended that the specification and examples be considered as exemplary only, with the true scope and spirit of the invention being indicated by the following claims.

Claims

What is claimed is: 1. A trainable system for providing a new client interface to an existing application, comprising:
a shaper computer operating a trainable user interface translator application and further comprising and storing a shaper rule set and data packet format maps identifying data formats acceptable to a host application, and an auxiliary database for storing training data sets;
a training terminal electrically connected to the shaper computer for establishing the shaper rule set and data packet format maps during a training session;
a host computer electrically connected to the shaper computer and a first client device operating first client software, the host computer operating the host application, thereby generating data streams to and from the first client software that may be monitored and analyzed by the shaper computer to establish the shaper rule set and data packet format maps;
a second client device electrically connected to the shaper computer upon which a new client interface is implemented;
wherein the shaper computer communicates user data between the new client interface and the host application, whereby the trainable user interface translator application remaps the user data according to the data packet format maps defined during the training session and transmits the remapped user data to the second client device for presentation in the new client interface.
2. The trainable system of claim 1 , wherein one or more of the electrical connections are implemented on one or more networks.
3. The trainable system of claim 1 , wherein one or more of the electrical connections are direct connections.
4. The trainable system of claim 1, wherein the host computer and the first client device are the same computer.
5. The trainable system of claim 1, wherein the shaper computer and the second client device are the same computer. "
6. In a trainable system comprising a shaper computer operating a trainable user interface translator application and storing data packet format maps, a training terminal electrically connected to the shaper computer, a host computer electrically connected to the shaper computer and a first client device, further comprising a data storage device and operating a host application, thereby generating streams of data packets to and from the first client device, and a second client device electrically connected to the shaper computer, a method of training the trainable system to provide a new client interface to the host application, comprising the steps of:
selecting training data sets designed to fully exercise the host application;
entering a training data set into the trainable user interface translator application;
operating the trainable user interface translator application via the training terminal and first client device to exercise the host application to generate streams of data packets between the host application and the first client device;
analyzing the format of the data packets to create packet maps and storing the packet maps; entering new training data via the training terminal into the trainable user interface translator- application, which creates modified data packets according to the packet maps and transmits the modified data packets to the host computer, which in turn updates data stored in the data storage device and generates response data packets;
exercising the host application via the first client device to review the presence of updated data;
repeating the steps above with data expected to create exceptions and errors in the operation of the host application; and
determining if all data packet formats have been mapped, and if not repeating the steps above.
In a trained system comprising a shaper computer operating a trainable user interface translator application and storing data packet format maps, a training terminal electrically connected to the shaper computer, a host computer electrically connected to the shaper computer and a first client device, and operating a host application, thereby generating streams of data packets to and from the first client device, and a second client device electrically connected to the shaper computer, a metliod of using the trained system for providing a new client interface to the host application, comprising the steps of:
designing and implementing a new client interface on the second client device;
starting via the training terminal the trainable user interface translator application; 1 operating the second client device to communicate with the host
2 application via the shaper computer, which remaps data packets
3 transmitted from the host application according to the data packet
4 format maps and forwarding remapped data packets to the second
5 client device for presentation in the new client interface; and 6
7 determining whether to continue using the new client interface, and if
8 so, reverting to the previous step.
PCT/US2002/008058 2001-03-16 2002-03-15 System for and method of synchronizing a standard-protocol database with a legacy data WO2002075601A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002248638A AU2002248638A1 (en) 2001-03-16 2002-03-15 System for and method of synchronizing a standard-protocol database with a legacy data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US27665401P 2001-03-16 2001-03-16
US60/276,654 2001-03-16

Publications (2)

Publication Number Publication Date
WO2002075601A2 true WO2002075601A2 (en) 2002-09-26
WO2002075601A3 WO2002075601A3 (en) 2003-10-16

Family

ID=23057556

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/008058 WO2002075601A2 (en) 2001-03-16 2002-03-15 System for and method of synchronizing a standard-protocol database with a legacy data

Country Status (2)

Country Link
AU (1) AU2002248638A1 (en)
WO (1) WO2002075601A2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5806074A (en) * 1996-03-19 1998-09-08 Oracle Corporation Configurable conflict resolution in a computer implemented distributed database
US6003084A (en) * 1996-09-13 1999-12-14 Secure Computing Corporation Secure network proxy for connecting entities
US6014657A (en) * 1997-11-27 2000-01-11 International Business Machines Corporation Checking and enabling database updates with a dynamic multi-modal, rule base system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5806074A (en) * 1996-03-19 1998-09-08 Oracle Corporation Configurable conflict resolution in a computer implemented distributed database
US6003084A (en) * 1996-09-13 1999-12-14 Secure Computing Corporation Secure network proxy for connecting entities
US6014657A (en) * 1997-11-27 2000-01-11 International Business Machines Corporation Checking and enabling database updates with a dynamic multi-modal, rule base system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BISBAL J ET AL: "An overview of legacy information system migration: A Brief Review of Problems, Solutions and Research" TRINITY COLLEGE DUBLIN COMPUTER SCIENCE DEPARTMENT TECHNICAL REPORT, XX, XX, no. 38, 1999, pages 1-18, XP002226579 *
KUDRASS T ET AL: "Active object-relational mediators" COOPERATIVE INFORMATION SYSTEMS, 1996. PROCEEDINGS., FIRST IFCIS INTERNATIONAL CONFERENCE ON BRUSSELS, BELGIUM 19-21 JUNE 1996, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC P, US, 19 June 1996 (1996-06-19), pages 228-239, XP010200765 ISBN: 0-8186-7505-5 *
LAW K C K ET AL: "Web-enabling legacy applications" PARALLEL AND DISTRIBUTED SYSTEMS, 1998. PROCEEDINGS. 1998 INTERNATIONAL CONFERENCE ON TAINAN, TAIWAN 14-16 DEC. 1998, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, 14 December 1998 (1998-12-14), pages 218-225, XP010318690 ISBN: 0-8186-8603-0 *

Also Published As

Publication number Publication date
WO2002075601A3 (en) 2003-10-16
AU2002248638A1 (en) 2002-10-03

Similar Documents

Publication Publication Date Title
US11194828B2 (en) Method and system for implementing a log parser in a log analytics system
US20220092063A1 (en) Method and system for implementing machine learning classifications
US11803548B1 (en) Automated generation of metrics from log data
CN114746856B (en) Method and system for converting data stream into structured data
US6012098A (en) Servlet pairing for isolation of the retrieval and rendering of data
US7092956B2 (en) Deduplication system
US8024796B2 (en) System and method for storing events to enhance intrusion detection
US11847480B2 (en) System for detecting impairment issues of distributed hosts
US5983170A (en) System and method for generating semantic analysis of textual information
US20220092062A1 (en) Method and system for implementing a log parser in a log analytics system
WO2016161381A1 (en) Method and system for implementing a log parser in a log analytics system
WO2004107094A2 (en) Data integration system and method for presenting 360° customer views
JP2022118108A (en) Log auditing method, device, electronic apparatus, medium and computer program
CN106484739A (en) The structure comparative approach of data base and device
US20030126109A1 (en) Method and system for converting message data into relational table format
CN112039701A (en) Interface call monitoring method, device, equipment and storage medium
JPWO2007007410A1 (en) Message analysis apparatus, control method, and control program
WO2002075601A2 (en) System for and method of synchronizing a standard-protocol database with a legacy data
US20030131071A1 (en) Electronic document interchange document object model
US11327748B2 (en) Software cooperation possibility determination apparatus and software cooperation possibility determination method
US20240037214A1 (en) Information processing device, information processing method, and computer readable medium
CN106547626A (en) For the method and server of peer-to-peer architecture equalization server
WO2002077876A2 (en) System for and method of automatically updating data in a host system based upon third party data
US20020163536A1 (en) System for and method of providing a new client interface to an existing application
Boss Information Technology Standards

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP