WO2001025917A2 - Environment service architectures for netcentric computing systems - Google Patents

Environment service architectures for netcentric computing systems Download PDF

Info

Publication number
WO2001025917A2
WO2001025917A2 PCT/US2000/026914 US0026914W WO0125917A2 WO 2001025917 A2 WO2001025917 A2 WO 2001025917A2 US 0026914 W US0026914 W US 0026914W WO 0125917 A2 WO0125917 A2 WO 0125917A2
Authority
WO
WIPO (PCT)
Prior art keywords
services
computing system
netcentric computing
application
environment
Prior art date
Application number
PCT/US2000/026914
Other languages
French (fr)
Other versions
WO2001025917A3 (en
Inventor
Scott R. Sargent
Original Assignee
Accenture Llp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Accenture Llp filed Critical Accenture Llp
Priority to AU76242/00A priority Critical patent/AU7624200A/en
Publication of WO2001025917A2 publication Critical patent/WO2001025917A2/en
Publication of WO2001025917A3 publication Critical patent/WO2001025917A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/953Organization of data
    • Y10S707/959Network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/964Database arrangement
    • Y10S707/966Distributed
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99934Query formulation, input preparation, or translation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99935Query augmenting and refining, e.g. inexact access
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99942Manipulating data structure, e.g. compression, compaction, compilation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99944Object-oriented database structure
    • Y10S707/99945Object-oriented database structure processing

Definitions

  • the present invention relates generally to business computing systems, and more particularly to environment service architectures for netcentric computing systems.
  • this processing opened up the file of transactions found in batch transactions and allowed the user to submit them one at a time, receiving either immediate confirmation of the success of the transaction or else feedback on the nature of the transaction error.
  • the conceptually simple change of having the user interact with the computer on a transaction-at- a-time basis caused huge changes in the nature of business computing. More important, users saw huge changes in what they could do on a day-to-day basis. Customers were no longer forced to wait for a batch run to process the particular application. In essence, the computer had an impact on the entire work flow of the business user.
  • Client/server computing is a style of computing involving multiple processors, one of which is typically a workstation, and across which a single business transaction is completed. Using the workstation, the transaction entered by the user could now be processed on a keystroke-by- keystroke basis.
  • LAN local area network
  • workstation-to-workstation communications at speeds of 100 to 1,000 times what was typically available on a WAN.
  • the LAN was a technology that could be grown and evolved in a local office with little need for direct interaction from the telecommunications group.
  • the present invention discloses an environment services architecture and a method of providing an environment services architecture that is part of a netcentric execution architecture used in a netcentric computing system.
  • the environment services architecture includes runtime services for converting non-compiled computer languages into machine code during the execution of an application on the netcentric computing system.
  • System services perform system level functions on the netcentric computing system that may be selected from the group consisting of system security services, profile management services, task and memory management services and environment verification services.
  • Application services perform common functions in the netcentric computing system. The common functions may be selected from the group consisting of application security services, error handling/logging services, state management services, code table services, active help services, application integration services and common services.
  • a component framework service provides components of the netcentric computing system with a standard infrastructure for allowing an application running on components to communicate within and across applications in the netcentric computing system.
  • Operating system services are provided for providing the netcentric computing system with underlying basic computing services.
  • the preferred environment service architecture is designed to provide the netcentric computing system with miscellaneous application and system level services that do not deal directly with managing the user interface, communicating to other programs, or accessing data.
  • the runtime services include language interpreter services and virtual machine services.
  • the language interpreter services decompose a scripting language into machine code at runtime.
  • the virtual machine services include at least one virtual machine. In the preferred embodiment, the virtual machine services provide a layer of abstraction between applications and the underlying operating system and are used to support operating system independence.
  • the system services include system security services, profile management services, environment verification services and task and memory management services.
  • the system security services provide applications with the ability to interact with native security mechanisms that are used by an operating system on the netcentric computing system.
  • the profile management services are used to access and update a plurality of user or application profiles.
  • the environment verification services monitor, identify and validate application integrity before applications are executed on the netcentric computing system.
  • the task and memory management services allow applications or events to control individual computing tasks or processes and manage memory resources in the netcentric computing system.
  • the application services include application security services, error handling logging services, state management services, codes table services, active help services, file services, application integration services and other common services.
  • the application security services may be selected from the group consisting of user access services, data access services and function access services.
  • the error handling/logging services present users of the netcentric computing system with an explanation of errors and logs error events in a database.
  • the state management services enable information to be shared between windows, web pages and applications in said netcentric computing system.
  • the codes table services enable applications or a client to use externally stored parameters and validation rules on the netcentric computing system.
  • the active help services enable applications to provide assistance to a user or a client for a specific task in said netcentric computing system.
  • the file services enable applications to use, manage and write to files that are located in the netcentric computing system.
  • the application integration interface services provide a gateway for passing context and control of information to an external application.
  • the common services provide a plurality of reusable routines that may be used across a set of applications in said netcentric computing systems.
  • Figure 1 illustrates a netcentric execution architecture for a netcentric computing system that includes a environment services architecture.
  • Figure 2 illustrates a representative illustration of a netcentric computing system.
  • Figure 3 illustrates an environment services architecture for a netcentric computing system.
  • a business enterprise 18 includes at least one client 14, at least one database server 22, at least one firewall 24, at least one application server 26, at least one web server 28 and a local area network (LAN) connection 30, which are electrically connected as illustrated in Fig. 2 to form a network.
  • LAN connections 30 are comprised of software and various other devices that are used to interconnect various components or computing devices that are located at a first enterprise location 32 within the much larger business enterprise 18.
  • LAN connection should be broadly construed to hardware and software that allows clients 14 and servers 22, 26, 28 to be connected together to share data and files as well as the resources available on the netcentric computing system 12. Those skilled in the art would recognize that several components, such as network cards and cabling, may be required to create the LAN connection 30. In addition, those skilled in the art would recognize that various types of LAN connections 30 exist and may be used in the present invention.
  • firewall 24 is used to isolate internal systems from unwanted intruders.
  • firewalls 24 isolate web servers 28 from all Internet traffic that is not relevant to the netcentric computing system 12.
  • the only requests allowed through the firewall 24 are for services located on the web servers 28. All requests for other applications (e.g., FTP, Telnet) and other IP addresses are typically blocked by the firewall 24 during operation of the netcentric computing system 12.
  • the web servers 28 are the primary interface to the clients 14 for all interactions with the applications or services that are provided by the netcentric computing system 12.
  • the main task of the web servers 28 is to authenticate the clients 14, establish a secure connection from the clients 14 to the web servers 28 using encrypted messages, and allow applications the clients 14 are using to transparently access the resources of the netcentric computing system 12.
  • the web servers 28 are responsible for accepting incoming HTTP (Hyper-Text Transfer Protocol) messages and fulfilling the requests.
  • HTTP Hyper-Text Transfer Protocol
  • HTML Hyper-Text Markup Language
  • static pages such as help pages, are preferably generated entirely by the web servers 28.
  • client should be construed herein to include remote clients and local clients, unless otherwise specified, as set forth in detail below.
  • the primary function of the application servers 26 is to provide a link through which the web servers 28 can interact with the clients 14, trigger business transactions, and send back resulting data to the clients 14.
  • a fundamental role of the application servers 26 is to manage the logical flow of transactions and keep track of the state of sessions.
  • the application servers 26 are also responsible for managing all sessions within the netcentric computing system 12.
  • a session is a period of time in which a client 14 is interacting with, and using, a resource of the netcentric computing system 12, preferentially by accessing the resources through a web browser that is connected with the web server 28.
  • the main purpose of the database servers 22 is to handle an application log. All requests sent to the web servers 28 and application servers 26, as well as their respective responses, are logged in the application log.
  • the application log is preferentially used for traceability. In the preferred embodiment, requests are logged in the application log directly by the application server 26.
  • a second business enterprise location 34 may be connected with the first business enterprise location 32 using an intranet connection 36. Those skilled in the art would recognize that various intranet connections 36 exist and may be used in the present invention.
  • the intranet connection 36 allows the computing resources of the second business enterprise location 34 to be shared or connected with the computing resources available at the first business enterprise location 32.
  • the term intranet connection should be broadly construed to include software and hardware that is used to connect one server at business location with another server at another business location. Although not illustrated, several other enterprise locations, each containing its own computing resources, may be connected with the netcentric computing system 12.
  • the firewall 24 of the first business enterprise location 32 is connected with an Internet connection 38 to a plurality of remote clients 39.
  • the remote clients 39 that are connected to the Internet connection 38 access data and resources at the business enterprise 18 by using the Internet connection 38 and a web browser located on the remote client 39.
  • the Internet connection 38 gives the remote clients 39 the ability to gain access to applications, information and data that may be located on the database server 22, the application server 26 and the web server 28.
  • the difference between a "remote" client 39 and a traditional client 14 is that the remote client 39 accesses data and resources of the netcentric computing system 12 only through an Internet connection 38 and not a LAN connection 30 or a intranet connection 36. This allows users on remote clients 39 to access the resources of the netcentric computing system 12 from remote geographic locations anytime, anywhere (such as, at home, a friends house, laptops in hotels, kiosks, library terminals, etc.).
  • Internet connection 38 may be broadly construed to include the hardware and software that enables remote clients 39 and servers 22, 26, 28 to connect with, and communicate on the global information network commonly known as the Internet.
  • the present invention discloses an environment services architecture 10 for a netcentric execution architecture 11 that is used in a netcentric computing system 12.
  • the preferred environment services architecture 10 includes runtime services 40, system services 42, application services 44, component framework services 46 and operating system services 48.
  • the environment services architecture 10 provides services to the netcentric computing system 12 that allows the netcentric computing system 12 to operate optimally to provide business solutions to various enterprises desiring an Internet based solution.
  • the environment services architecture 10 provides miscellaneous application and system level services to the netcentric computing system 12 that do not deal directly with managing the user interface on the clients 14, communicating to other applications, or accessing data in the netcentric computing system 12.
  • the runtime services 40 are used to convert non-compiled computer languages into machine code during the execution of an application within the netcentric computing system 12.
  • Two sub-services comprise the preferred runtime services 40, which are language interpreter services 50 and virtual machine services 52.
  • the language interpreter services 50 decompose a fourth-generation and/or a scripting language into machine code (executable code) at runtime.
  • the virtual machine services 52 provide virtual machines (VM) to the netcentric computing system 12, which as known in the art are implemented in software on top of an operating system and are used to run applications.
  • the virtual machine services 52 provide a layer of abstraction between applications and the underlying operating system on the client 14 or server 22, 26, 28 and are often used to support operating system independence.
  • the system services 42 are applications that are used to perform system-level functions in the netcentric computing system. As illustrated in Fig. 3, in the preferred embodiment the system services 42 preferentially include system security services 54, profile management services 56, task and memory management services 58 and environment verification services 60.
  • the system security services 54 allow applications to interact with an operating system's native security mechanisms.
  • the operating system's native security mechanisms include basic services that include the ability to log in, log off, authenticate to the operating system and enforce access control to system resources and executables.
  • several basic services, as defined herein, are provided by commonly used operating systems manufacturers that can provide various levels of security to clients 14, 39 and servers 22, 26, 28.
  • the profile management services 56 of the systems services 42 are used to access and update local or remote clients 14, 39 user or application profiles by the netcentric computing system 12.
  • User profiles for example, can be used to store a variety of information, from the user's language and color preferences to basic job function information. This information may be used and shared with other services in the netcentric computing system 12 as well. Those skilled in the art would recognize that several types of information may be stored and located in user profiles.
  • the environment verification services 58 ensure functionality by monitoring, identifying and validating environment integrity prior to and during the execution of an application (e.g., free disk space, monitor resolution and correct version) in the netcentric computing system 12.
  • the environment verification services 58 are invoked when an application begins processing or when a component is called.
  • Applications can use the environment verification services 58 to verify that the correct versions of the required netcentric execution architecture 11 components and other application components are available.
  • ActiveX frameworks can be included in the netcentric computing system 12 for providing services for automatic installation and upgrade of ActiveX controls.
  • the task and memory management services 60 are provided for allowing applications and/or other events in the netcentric computing system 12 to control individual computer tasks or processes and manage memory.
  • the task and memory management services 60 provide applications for scheduling, starting, stopping and restarting both client 14, 39 and server 22, 26, 28 tasks (e.g., software agents).
  • Memory management the allocating and freeing of system resources, is one of the more error-prone development activities when using 3GL development tools.
  • Using task and memory management services 60 for memory-handling functions reduces the frequency of errors, which are difficult to debug. Those skilled in the art would recognize that task and memory handling applications will vary from system to system, depending on the needs and requirements of each particular netcentric computing system 12.
  • the application services 44 include applications that perform common functions within the netcentric computing system 12.
  • the application services 44 use applications that provide functions that can apply to one application or across multiple applications.
  • the application services 44 preferentially include application security services 62, error handling/logging services 64, state management services 66, code table services 68, active help services 70, file services 72, application integration interface services 74 and other common services 76. Each of the above-referenced services is discussed in detail below.
  • the preferred application services 44 include application security services 62.
  • application security services 62 In addition to the system security services 54, such as logging into a network (typically provided in LAN connection cases), the environment services architecture 10 there are also application security services 62 associated with specific applications on the clients 14, 39 and servers 22, 26, 28 that include user access services, data access services and function access services.
  • User access services provide a set of common functions that limits application access to specific users within a company or external customers.
  • Data access services provide a set of common functions that limits access to specific data within an application to specific users or user types (e.g., secretary, manager).
  • Function access services provide a set of common functions that limits access to specific functions within an application to specific users or user types (e.g., secretary, manager).
  • netcentric computing systems 10 application security becomes more critical because there are more types of users (e.g., employees and customers) and additional types of transactions (e.g., e-Commerce and help desks). In traditional client/server environments, most users of the companies computing systems are employees of the company. In netcentric computing systems 10, there are also external users (e.g., vendors and registered users) and the general public, which may access the netcentric computing system 12 from a variety of remote clients 39 located in vast geographic locations. Different types of users can be given different application security requirements limiting what data they can see and what functions they can execute in the netcentric computing system. Also, new types of transactions, such as verifying credit when doing e-Commerce transactions, also require additional application security services.
  • the error handling logging services 64 support the handling of fatal and nonfatal hardware and software errors for an application in the netcentric computing system 12.
  • the error handling/logging services 64 present users on clients 14, 39 with an understandable explanation of what has happened and coordinating with other services to ensure that transactions and data are restored to a consistent state.
  • the error handling/logging services 64 support the logging of informational, error and warning messages. Logging services record application and user activities in enough detail to satisfy any audit trail requirements or to assist the systems support team in recreating the sequence of events that led to an error.
  • system errors occur when the application is being executed and some kind of serious system- level incompatibility is encountered, as a result of which the application cannot proceed with its normal execution.
  • system errors can result from such things as memory/resource depletion, database access problems, network problems or printer-related problems.
  • Architecture errors are those that occur during the normal execution of the application. They are generated in architecture functions that are built by a project architecture team to isolate the developers from complex coding, to streamline the development effort by reusing common services. These architecture functions perform services such as database calls and state management.
  • Application errors are also those that occur during the normal execution of the application. They are generally related to business logic errors such as invalid date, invalid price and so forth.
  • an application is written using a combination of various programming languages (e.g., Visual Basic and C). Therefore, a common error-handling routine should be written in a language that can be called from any other language used in the application.
  • Logging must also be done, however, to mitigate problems, centralize logs and create a standard, usable log format. Third-party logs should be mapped into the central format before any analysis is attempted.
  • errors are rarely logged on the client 14, 39 (although an exception may be for an intranet-type application) and are virtually always logged on the servers 22, 26, 28. Logging can add a great deal of stress to a web server 28 and log files can quickly grow very large. Consequently, system administrators should not plan to log all errors, but, instead, only those deemed necessary for processing exceptions.
  • the state management services 66 enable information to be passed or shared among windows and web pages and/or across applications in the netcentric computing system 12. For example, suppose that several fields in an application need to be passed from one window to another window on the client's 14, 39 desktop. In pseudo-conversation mainframe 3270- style applications, passing data from one screen to another screen was done using context management services, which provided the ability to store information on a host computer (here, the term "context management" refers to storing state information on the server, not the client). Client/server architectures simplified or eliminated the need for context management (storing state information on the server) and created a need to store state information on the client. In the netcentric computing system 12, this type of state management (i.e., data sharing) is preferentially done on the client 14, 39 using hidden fields, global variables, messages, files or local databases.
  • the popularity of the Internet's HTTP protocol has revived the need for implementing some form of context management services (storing state information on the web server 28).
  • the HTTP protocol is a stateless protocol. Every connection is negotiated from scratch, not just at the page level, but for every element on the page.
  • the web server 28 does not maintain a session connection with the client 14, 39 nor save any information between exchanges of information (i.e., web page submits or requests) with the clients 14, 39.
  • Each HTTP exchange is a completely independent event. Therefore, information entered into one HTML form must be saved by the associated server application somewhere where it can be accessed by subsequent programs in a conversation.
  • the preferred state management services 66 implement state management on both the client 14, 39 and servers 22, 26, 28 in the environment services architecture 10.
  • the codes table services 68 enable applications on clients 14, 39 to utilize externally stored parameters and validation rules in the netcentric computing system 12. For example, an application may be designed to retrieve the tax rate for the state of Illinois. When the user enters "Illinois" on the screen, the application first validates the user's entry by checking for its existence on the "State Tax Table” and then retrieves the tax rate for Illinois from the web server 28. Note that codes tables provide an additional degree of flexibility. If the tax rates change, the data simply needs to be updated on the web server 28; no application logic needs to be modified.
  • the codes table services 68 provides the application developers with a set of APIs that can be used to create code/decode tables. This component also provides the option of caching all or parts of the codes table in the application memory on the client 14, 39 for easier and faster access in the future. Code/decode information can be stored at any layer of an n-tier architecture- client 14, 39 databases or server 22, 26, 28 databases. The decision needs to be based upon codes table size and number, information update frequency and write access to the client 14, 39.
  • the active help services 70 enable an application to provide assistance to a user for a specific task or set of tasks.
  • Context-sensitive help is preferentially used in applications of the netcentric computing system 12; however, this can imply more active support than just hitting the Fl key for example.
  • each active help service application that is located in the active help services 70 is designed to include help that is aware of the user's environment, process and context; in this sense, it can be called "active.”
  • the preferred active help services 70 may include components such as wizards (which walk users through a new process), stored or real-time multimedia support and on-demand computer-based training.
  • the file services 72 enable applications to use, manage, and write to files that may be located on a variety of platforms in a variety of locations within the netcentric computing system 12.
  • File services 72 give clients 14, 39 remote access to files as if they were located locally, thereby providing transparent access to files for the client 14, 39.
  • the application integration interface services 74 provide a method or gateway for passing context and control of information to an external application in the netcentric computing system 12.
  • the application integration interface services 74 specify how information will be passed, which is typically from the web server 28 to the client 14, 39, and defines the interface by which other applications can expect to receive information.
  • External applications in this context could include anything from integrated performance support systems to ERP systems such as SAP or Peoplesoft, to external custom applications that have been previously developed.
  • application integration interfaces services 74 should make use of the component model defined by the project to broker information (i.e., OLE/COM interfaces) as opposed to custom building data-sharing modules.
  • OLE/COM interfaces component model defined by the project to broker information
  • Those skilled in the art would recognize that various application integration interface services 74 may be readily incorporated and used in the preferred environment services architecture 10.
  • the common services 76 component of the application services 44 is a catchall category for a plurality of reusable routines that are useful across a set of applications that may be used in the netcentric computing system 12.
  • Some examples of common services include date routines, time zone conversions and field validation routines. The examples set forth above have been set forth for illustrative purposes only and should not be construed as a limitation of the present invention. Those skilled in the art would recognize that several common services 76 exist and may be used in the application services 44 of the environment services architecture 10.
  • the component framework services 46 provide a standard infrastructure for building components so that they can communicate within an application and across applications, on the same machine (i.e.- client 14, 39 or server 22, 26, 28) or on multiple machines across a network, to work together.
  • COM/DCOM and CORBA are the two leading component industry standards. These standards define how components should be built and how they should communicate and interact with each other.
  • Object Request Broker (ORB) services based on COM/DCOM and CORBA, focus on how components communicate.
  • the preferred component framework services 42 which are preferentially also based on CORBA and COM/DCOM, focus on how components should be built.
  • two of the most dominant component frameworks include active X/OLE and JavaBeans.
  • ActiveX and Object Linking and Embedding are implementations of COM/DCOM.
  • ActiveX is a collection of facilities forming a framework for components to work together and interact. ActiveX divides the world into two kinds of components: controls and containers. Controls are relatively independent components that present well- defined interfaces or methods that containers and other components can call. Containers implement the part of the ActiveX protocol that allows for them to host and interact with components, forming a kind of back plane into which controls can be plugged.
  • ActiveX is a scaled-down version of OLE for the Internet.
  • OLE provides a framework to build applications from component modules and defines the way in which applications interact using data transfer, drag-and-drop and scripting.
  • OLE is a set of common services that allows components to collaborate intelligently. In creating ActiveX from OLE2.0, Microsoft enhanced the framework to address some of the special needs of web-style computing. Microsoft's web browser, Internet
  • Explorer is an ActiveX container. Therefore, any ActiveX control can be downloaded to, and plugged into, the browser. This allows for executable components to be interleaved with
  • HTML content and downloaded as needed by the web browser.
  • JavaBeans is Sun Microsystems' proposed framework for building Java components and containers. The intent is to develop and API standard that will allow components developed in Java (or beans), to be embedded in completing container frameworks including ActiveX or OpenDoc. JavaBeans API makes it easier to create reusable components in the Java language.
  • OpenDoc OpenDoc
  • One CI Labs, formed in 1993, created the OpenDoc architecture to provide a cross-platform alternative component framework, independent of Microsoft's OLE.
  • the OpenDoc architecture is constructed from various technologies supplied by its founding members: IBM, Apple and Word Perfect.
  • the technologies include Bento (Apple's object storage model), Open Scripting Architecture (OSA-Apple's scripting architecture) and SOM/DSOM (IBM's System Object Model Distributed SOM).
  • IBM's SOM architecture provides analogous services to that of Microsoft's DCOM architecture.
  • OpenDoc provides an open compound document infrastructure based on CORBA. It uses CORBA as its object model for inter-component communications. OpenDoc architecture provides services analogous to those provided by OLE, and OpenDoc components can also interoperate with OLE components. The OpenDoc equivalent of an object is termed a "part.” Each type of part has its own editor, and the OpenDoc architecture has responsibility for handling the communications between the distinct parts.
  • Open Network Environment is an object-oriented software framework from Netscape Communications for use with Internet clients and servers. It enables the integrating of web clients and servers with other enterprise resources and data. By supporting CORBA, ONE-enabled systems will be able to link with object software from a wide array of vendors, including IBM, Sun Microsystems, Digital Equipment and Hewlett-Packard. Netscape is positioning ONE as an alternative to Microsoft's Distributed Common Object Model (DCOM). ONE also complies with Sun Microsystems' Java technology.
  • the operating system services 48 are the underlying services - such as multi-tasking, paging and memory allocation - that are typically provided by today's modern operating systems.
  • the operating system services 48 are typically used by clients 14, 39 to perform basic computing tasks such as providing a desktop and web browser . applications that allow clients 14, 39 to connect to the web servers 28.
  • the operating system services 48 provide the clients 14, 39 and servers 22, 26, 28 of the netcentric computing system 12 with underlying basic computing services. Where necessary, an additional layer of APIs may be provided to gain either operating system independence or a higher level of abstraction for application programmers.
  • Those skilled in the art would recognize that various operating system services 48 exist and may be used in the preferred environment services architecture 10 to provide basic underlying computing capabilities to the netcentric computing system 12.

Abstract

An environment services architecture for a netcentric computing system is disclosed by the present invention. The environment services architecture includes runtime services for converting non-compiled computer languages into machine code during the execution of an application on the netcentric computing system. System services perform system-level functions in the netcentric computing system are also provided that may be selected from the group consisting of system security services, profile management services, task and memory management services and environment verification services. In addition, the environment services architecture also includes application services for performing common functions in the netcentric computing system. A component framework service provides components of the netcentric computing system with a standard infrastructure for allowing an application running on components to communicate within and across applications in the netcentric computing system. Further, operating system services are provided for providing the netcentric computing system with underlying basic computing services.

Description

ENVIRONMENT SERVICE ARCHITECTURES FOR NETCENTRIC COMPUTING SYSTEMS
This application claims the benefit under 35 U.S.C. §119(e) of U.S. provisional application Serial No: 60/156,962 filed on October 1, 1999.
Field of the Invention
The present invention relates generally to business computing systems, and more particularly to environment service architectures for netcentric computing systems.
Background of the Invention
Computer based business solutions have existed for various different types of transactions since the mid-to-late 1960s. During this time period, the technology focused on the use of batch technology. In batch processing, the business user would present a file of transactions to the application. The computer system would then run through the transactions, processing each one, essentially without user intervention. The system would provide reporting at some point in the batch processing. Typically, the reports would be batch printed, which in turn, would be used by the business user to correct the input transactions that were resubmitted along with the next batch of transactions. In the 1970s, businesses began a transition to on-line, interactive transactions. At a conceptual level, this processing opened up the file of transactions found in batch transactions and allowed the user to submit them one at a time, receiving either immediate confirmation of the success of the transaction or else feedback on the nature of the transaction error. The conceptually simple change of having the user interact with the computer on a transaction-at- a-time basis caused huge changes in the nature of business computing. More important, users saw huge changes in what they could do on a day-to-day basis. Customers were no longer forced to wait for a batch run to process the particular application. In essence, the computer had an impact on the entire work flow of the business user.
Along with the advent of on-line interactive systems, it was equally significant that the systems provided a means for the business user to communicate with others in the business as the day-to-day business went along. This capability was provided on the backbone of a wide area network (WAN). The WAN was in itself a demanding technology during this time period and because of these demands telecommunications groups emerged within organizations, charged with the responsibility to maintain, evolve, and manage the network over a period of time. The theme of the 1980s was database management systems (DBMSs). Organizations used and applied database technology in the 1970s, but in the 1980s they grew more confident in the application of DBMS technology. Because of the advances in network technology, the focus was now on the sharing of data across organizational and application boundaries. Curiously, database technology did not change the fundamental way in which business processing was done. DBMS made it more convenient to access the data and to ensure that it could be updated while maintaining the integrity of the data.
In the 1990s, technology began to shift toward client/server computing. Client/server computing is a style of computing involving multiple processors, one of which is typically a workstation, and across which a single business transaction is completed. Using the workstation, the transaction entered by the user could now be processed on a keystroke-by- keystroke basis.
Furthermore, there was a change in the communications. With client/server, users could communicate with others in the work group via a local area network (LAN). The LAN permitted workstation-to-workstation communications at speeds of 100 to 1,000 times what was typically available on a WAN. The LAN was a technology that could be grown and evolved in a local office with little need for direct interaction from the telecommunications group.
During the late 1990s, the Internet began to receive widespread use by consumers and businesses. In the business world, the Internet has caused the concept of business users to expand greatly because of the way in which computers are now capable of being interconnected. In addition, the cost of computers has dropped to the point that it is affordable for almost every household to own a computer if they so desire. As such, a need to expand the reach of computing both within and outside the enterprise, and that enables the sharing of data and content between individuals and applications has developed.
To that end, a great need exists amongst existing and newly created business enterprises for computing solutions that capture and take advantage of the advantages and capabilities provided by the Internet.
Summary of the Invention
The present invention discloses an environment services architecture and a method of providing an environment services architecture that is part of a netcentric execution architecture used in a netcentric computing system. The environment services architecture includes runtime services for converting non-compiled computer languages into machine code during the execution of an application on the netcentric computing system. System services perform system level functions on the netcentric computing system that may be selected from the group consisting of system security services, profile management services, task and memory management services and environment verification services. Application services perform common functions in the netcentric computing system. The common functions may be selected from the group consisting of application security services, error handling/logging services, state management services, code table services, active help services, application integration services and common services.
A component framework service provides components of the netcentric computing system with a standard infrastructure for allowing an application running on components to communicate within and across applications in the netcentric computing system. Operating system services are provided for providing the netcentric computing system with underlying basic computing services. As set forth above, the preferred environment service architecture is designed to provide the netcentric computing system with miscellaneous application and system level services that do not deal directly with managing the user interface, communicating to other programs, or accessing data.
The runtime services include language interpreter services and virtual machine services. The language interpreter services decompose a scripting language into machine code at runtime. The virtual machine services include at least one virtual machine. In the preferred embodiment, the virtual machine services provide a layer of abstraction between applications and the underlying operating system and are used to support operating system independence.
As previously set forth, the system services include system security services, profile management services, environment verification services and task and memory management services. The system security services provide applications with the ability to interact with native security mechanisms that are used by an operating system on the netcentric computing system. The profile management services are used to access and update a plurality of user or application profiles. The environment verification services monitor, identify and validate application integrity before applications are executed on the netcentric computing system. The task and memory management services allow applications or events to control individual computing tasks or processes and manage memory resources in the netcentric computing system.
As set forth above, the application services include application security services, error handling logging services, state management services, codes table services, active help services, file services, application integration services and other common services. The application security services may be selected from the group consisting of user access services, data access services and function access services. The error handling/logging services present users of the netcentric computing system with an explanation of errors and logs error events in a database. The state management services enable information to be shared between windows, web pages and applications in said netcentric computing system.
The codes table services enable applications or a client to use externally stored parameters and validation rules on the netcentric computing system. The active help services enable applications to provide assistance to a user or a client for a specific task in said netcentric computing system. The file services enable applications to use, manage and write to files that are located in the netcentric computing system. The application integration interface services provide a gateway for passing context and control of information to an external application. The common services provide a plurality of reusable routines that may be used across a set of applications in said netcentric computing systems. Further objects and advantages of the present invention will be apparent from the following description, reference being made to the accompanying drawings wherein preferred embodiments of the present invention are clearly shown.
Brief Description of the Drawings Figure 1 illustrates a netcentric execution architecture for a netcentric computing system that includes a environment services architecture.
Figure 2 illustrates a representative illustration of a netcentric computing system. Figure 3 illustrates an environment services architecture for a netcentric computing system.
Detailed Description of the Presently Preferred Embodiments of the Invention
Referring to Figs. 1 and 2, the present invention discloses an environment services architecture 10 that is preferentially used in a netcentric execution architecture 11 of a netcentric computing system 12. The physical picture of an illustrative netcentric computing system 12 is illustrated in Fig. 2. In this example, a business enterprise 18 includes at least one client 14, at least one database server 22, at least one firewall 24, at least one application server 26, at least one web server 28 and a local area network (LAN) connection 30, which are electrically connected as illustrated in Fig. 2 to form a network. As known in the art, LAN connections 30 are comprised of software and various other devices that are used to interconnect various components or computing devices that are located at a first enterprise location 32 within the much larger business enterprise 18. The term LAN connection, as used herein, should be broadly construed to hardware and software that allows clients 14 and servers 22, 26, 28 to be connected together to share data and files as well as the resources available on the netcentric computing system 12. Those skilled in the art would recognize that several components, such as network cards and cabling, may be required to create the LAN connection 30. In addition, those skilled in the art would recognize that various types of LAN connections 30 exist and may be used in the present invention.
For the purpose of the present invention, the firewall 24 is used to isolate internal systems from unwanted intruders. As known in the art, firewalls 24 isolate web servers 28 from all Internet traffic that is not relevant to the netcentric computing system 12. In the preferred embodiment, the only requests allowed through the firewall 24 are for services located on the web servers 28. All requests for other applications (e.g., FTP, Telnet) and other IP addresses are typically blocked by the firewall 24 during operation of the netcentric computing system 12.
The web servers 28 are the primary interface to the clients 14 for all interactions with the applications or services that are provided by the netcentric computing system 12. The main task of the web servers 28 is to authenticate the clients 14, establish a secure connection from the clients 14 to the web servers 28 using encrypted messages, and allow applications the clients 14 are using to transparently access the resources of the netcentric computing system 12. The web servers 28 are responsible for accepting incoming HTTP (Hyper-Text Transfer Protocol) messages and fulfilling the requests. For dynamic HTML (Hyper-Text Markup Language) page generation, requests are forwarded to the application servers 26. During operation, static pages, such as help pages, are preferably generated entirely by the web servers 28. The term client should be construed herein to include remote clients and local clients, unless otherwise specified, as set forth in detail below.
In the preferred embodiment, the primary function of the application servers 26 is to provide a link through which the web servers 28 can interact with the clients 14, trigger business transactions, and send back resulting data to the clients 14. A fundamental role of the application servers 26 is to manage the logical flow of transactions and keep track of the state of sessions. The application servers 26 are also responsible for managing all sessions within the netcentric computing system 12. A session is a period of time in which a client 14 is interacting with, and using, a resource of the netcentric computing system 12, preferentially by accessing the resources through a web browser that is connected with the web server 28.
In the preferred embodiment of the present invention, the main purpose of the database servers 22 is to handle an application log. All requests sent to the web servers 28 and application servers 26, as well as their respective responses, are logged in the application log. The application log is preferentially used for traceability. In the preferred embodiment, requests are logged in the application log directly by the application server 26. Those skilled in the art would recognize that any number of data items can be monitored and kept track of in the application log. As further illustrated in Fig. 2, a second business enterprise location 34 may be connected with the first business enterprise location 32 using an intranet connection 36. Those skilled in the art would recognize that various intranet connections 36 exist and may be used in the present invention. The intranet connection 36 allows the computing resources of the second business enterprise location 34 to be shared or connected with the computing resources available at the first business enterprise location 32. The term intranet connection, as used herein, should be broadly construed to include software and hardware that is used to connect one server at business location with another server at another business location. Although not illustrated, several other enterprise locations, each containing its own computing resources, may be connected with the netcentric computing system 12. In the preferred embodiment illustrated in Fig. 2, the firewall 24 of the first business enterprise location 32 is connected with an Internet connection 38 to a plurality of remote clients 39. Preferentially, the remote clients 39 that are connected to the Internet connection 38 access data and resources at the business enterprise 18 by using the Internet connection 38 and a web browser located on the remote client 39. The Internet connection 38 gives the remote clients 39 the ability to gain access to applications, information and data that may be located on the database server 22, the application server 26 and the web server 28. The difference between a "remote" client 39 and a traditional client 14 is that the remote client 39 accesses data and resources of the netcentric computing system 12 only through an Internet connection 38 and not a LAN connection 30 or a intranet connection 36. This allows users on remote clients 39 to access the resources of the netcentric computing system 12 from remote geographic locations anytime, anywhere (such as, at home, a friends house, laptops in hotels, kiosks, library terminals, etc.).
Those skilled in the art would recognize that several methods and devices may be used to provide an Internet connection 38 to the netcentric computing system 12. In addition, those skilled in the art would recognize that various devices (e.g. - modems, cable modems, etc.) and sub-services (such as Internet Service Providers) may be used to provide remote clients 39 with the Internet connection 38. As used herein, the term Internet connection 38 should be broadly construed to include the hardware and software that enables remote clients 39 and servers 22, 26, 28 to connect with, and communicate on the global information network commonly known as the Internet.
Referring to Fig. 1, for a detailed discussion of the other elements of the preferred netcentric execution architecture 1 1, as well as netcentric computing systems 12, refer to co- pending U.S. patent application Serial Number entitled ARCHITECTURES FOR NETCENTRIC COMPUTING SYSTEMS, which was filed on September 29, 2000 and is hereby incorporated by reference, in its entirety.
Referring to Figs. 1 and 3, the present invention discloses an environment services architecture 10 for a netcentric execution architecture 11 that is used in a netcentric computing system 12. As illustrated in Fig. 3, the preferred environment services architecture 10 includes runtime services 40, system services 42, application services 44, component framework services 46 and operating system services 48. As set forth below, the environment services architecture 10 provides services to the netcentric computing system 12 that allows the netcentric computing system 12 to operate optimally to provide business solutions to various enterprises desiring an Internet based solution. The environment services architecture 10 provides miscellaneous application and system level services to the netcentric computing system 12 that do not deal directly with managing the user interface on the clients 14, communicating to other applications, or accessing data in the netcentric computing system 12.
In the preferred embodiment of the present invention, the runtime services 40 are used to convert non-compiled computer languages into machine code during the execution of an application within the netcentric computing system 12. Two sub-services comprise the preferred runtime services 40, which are language interpreter services 50 and virtual machine services 52. The language interpreter services 50 decompose a fourth-generation and/or a scripting language into machine code (executable code) at runtime. The virtual machine services 52 provide virtual machines (VM) to the netcentric computing system 12, which as known in the art are implemented in software on top of an operating system and are used to run applications. The virtual machine services 52 provide a layer of abstraction between applications and the underlying operating system on the client 14 or server 22, 26, 28 and are often used to support operating system independence. The system services 42 are applications that are used to perform system-level functions in the netcentric computing system. As illustrated in Fig. 3, in the preferred embodiment the system services 42 preferentially include system security services 54, profile management services 56, task and memory management services 58 and environment verification services 60. The system security services 54 allow applications to interact with an operating system's native security mechanisms. The operating system's native security mechanisms include basic services that include the ability to log in, log off, authenticate to the operating system and enforce access control to system resources and executables. As known in the art, several basic services, as defined herein, are provided by commonly used operating systems manufacturers that can provide various levels of security to clients 14, 39 and servers 22, 26, 28.
The profile management services 56 of the systems services 42 are used to access and update local or remote clients 14, 39 user or application profiles by the netcentric computing system 12. User profiles, for example, can be used to store a variety of information, from the user's language and color preferences to basic job function information. This information may be used and shared with other services in the netcentric computing system 12 as well. Those skilled in the art would recognize that several types of information may be stored and located in user profiles.
The environment verification services 58 ensure functionality by monitoring, identifying and validating environment integrity prior to and during the execution of an application (e.g., free disk space, monitor resolution and correct version) in the netcentric computing system 12. The environment verification services 58 are invoked when an application begins processing or when a component is called. Applications can use the environment verification services 58 to verify that the correct versions of the required netcentric execution architecture 11 components and other application components are available. In some client 14, 39/server 22, 26, 28 applications, it may be necessary to implement the environment verification services 58 to ensure that the client 14, 39 and server 22, 26, 28 applications are of a compatible release level before continuing.
ActiveX frameworks can be included in the netcentric computing system 12 for providing services for automatic installation and upgrade of ActiveX controls. Internet
Explorer, Microsoft's web browser, is integrated with Windows OS, so ActiveX controls can be automatically installed and automatically upgraded on the clients 14, 39 without the developer adding any additional code. This service may be used in the netcentric computing system 12 to upgrade and ensure that applications being provided by the servers 22, 26, 28 can run properly on the clients 14, 39.
In the preferred embodiment, the task and memory management services 60 are provided for allowing applications and/or other events in the netcentric computing system 12 to control individual computer tasks or processes and manage memory. The task and memory management services 60 provide applications for scheduling, starting, stopping and restarting both client 14, 39 and server 22, 26, 28 tasks (e.g., software agents). Memory management, the allocating and freeing of system resources, is one of the more error-prone development activities when using 3GL development tools. Using task and memory management services 60 for memory-handling functions reduces the frequency of errors, which are difficult to debug. Those skilled in the art would recognize that task and memory handling applications will vary from system to system, depending on the needs and requirements of each particular netcentric computing system 12.
The application services 44 include applications that perform common functions within the netcentric computing system 12. The application services 44 use applications that provide functions that can apply to one application or across multiple applications. As illustrated in Fig. 3, in the preferred embodiment of the present invention, the application services 44 preferentially include application security services 62, error handling/logging services 64, state management services 66, code table services 68, active help services 70, file services 72, application integration interface services 74 and other common services 76. Each of the above-referenced services is discussed in detail below.
As set forth in Fig. 3, the preferred application services 44 include application security services 62. In addition to the system security services 54, such as logging into a network (typically provided in LAN connection cases), the environment services architecture 10 there are also application security services 62 associated with specific applications on the clients 14, 39 and servers 22, 26, 28 that include user access services, data access services and function access services. User access services provide a set of common functions that limits application access to specific users within a company or external customers. Data access services provide a set of common functions that limits access to specific data within an application to specific users or user types (e.g., secretary, manager). Function access services provide a set of common functions that limits access to specific functions within an application to specific users or user types (e.g., secretary, manager).
In netcentric computing systems 10 application security becomes more critical because there are more types of users (e.g., employees and customers) and additional types of transactions (e.g., e-Commerce and help desks). In traditional client/server environments, most users of the companies computing systems are employees of the company. In netcentric computing systems 10, there are also external users (e.g., vendors and registered users) and the general public, which may access the netcentric computing system 12 from a variety of remote clients 39 located in vast geographic locations. Different types of users can be given different application security requirements limiting what data they can see and what functions they can execute in the netcentric computing system. Also, new types of transactions, such as verifying credit when doing e-Commerce transactions, also require additional application security services. The error handling logging services 64 support the handling of fatal and nonfatal hardware and software errors for an application in the netcentric computing system 12. The error handling/logging services 64 present users on clients 14, 39 with an understandable explanation of what has happened and coordinating with other services to ensure that transactions and data are restored to a consistent state. In addition, the error handling/logging services 64 support the logging of informational, error and warning messages. Logging services record application and user activities in enough detail to satisfy any audit trail requirements or to assist the systems support team in recreating the sequence of events that led to an error.
Primarily, there are three types of errors: system, architecture and application. System errors occur when the application is being executed and some kind of serious system- level incompatibility is encountered, as a result of which the application cannot proceed with its normal execution. These errors can result from such things as memory/resource depletion, database access problems, network problems or printer-related problems.
Architecture errors are those that occur during the normal execution of the application. They are generated in architecture functions that are built by a project architecture team to isolate the developers from complex coding, to streamline the development effort by reusing common services. These architecture functions perform services such as database calls and state management.
Application errors are also those that occur during the normal execution of the application. They are generally related to business logic errors such as invalid date, invalid price and so forth. Typically, an application is written using a combination of various programming languages (e.g., Visual Basic and C). Therefore, a common error-handling routine should be written in a language that can be called from any other language used in the application. Logging must also be done, however, to mitigate problems, centralize logs and create a standard, usable log format. Third-party logs should be mapped into the central format before any analysis is attempted. In netcentric computing systems 10, errors are rarely logged on the client 14, 39 (although an exception may be for an intranet-type application) and are virtually always logged on the servers 22, 26, 28. Logging can add a great deal of stress to a web server 28 and log files can quickly grow very large. Consequently, system administrators should not plan to log all errors, but, instead, only those deemed necessary for processing exceptions.
The state management services 66 enable information to be passed or shared among windows and web pages and/or across applications in the netcentric computing system 12. For example, suppose that several fields in an application need to be passed from one window to another window on the client's 14, 39 desktop. In pseudo-conversation mainframe 3270- style applications, passing data from one screen to another screen was done using context management services, which provided the ability to store information on a host computer (here, the term "context management" refers to storing state information on the server, not the client). Client/server architectures simplified or eliminated the need for context management (storing state information on the server) and created a need to store state information on the client. In the netcentric computing system 12, this type of state management (i.e., data sharing) is preferentially done on the client 14, 39 using hidden fields, global variables, messages, files or local databases.
The popularity of the Internet's HTTP protocol has revived the need for implementing some form of context management services (storing state information on the web server 28). The HTTP protocol is a stateless protocol. Every connection is negotiated from scratch, not just at the page level, but for every element on the page. In the preferred netcentric computing system 12, the web server 28 does not maintain a session connection with the client 14, 39 nor save any information between exchanges of information (i.e., web page submits or requests) with the clients 14, 39. Each HTTP exchange is a completely independent event. Therefore, information entered into one HTML form must be saved by the associated server application somewhere where it can be accessed by subsequent programs in a conversation. The preferred state management services 66 implement state management on both the client 14, 39 and servers 22, 26, 28 in the environment services architecture 10.
The codes table services 68 enable applications on clients 14, 39 to utilize externally stored parameters and validation rules in the netcentric computing system 12. For example, an application may be designed to retrieve the tax rate for the state of Illinois. When the user enters "Illinois" on the screen, the application first validates the user's entry by checking for its existence on the "State Tax Table" and then retrieves the tax rate for Illinois from the web server 28. Note that codes tables provide an additional degree of flexibility. If the tax rates change, the data simply needs to be updated on the web server 28; no application logic needs to be modified.
In situations where an application requires extensive use of codes tables, the codes table services 68 provides the application developers with a set of APIs that can be used to create code/decode tables. This component also provides the option of caching all or parts of the codes table in the application memory on the client 14, 39 for easier and faster access in the future. Code/decode information can be stored at any layer of an n-tier architecture- client 14, 39 databases or server 22, 26, 28 databases. The decision needs to be based upon codes table size and number, information update frequency and write access to the client 14, 39. The active help services 70 enable an application to provide assistance to a user for a specific task or set of tasks. Context-sensitive help is preferentially used in applications of the netcentric computing system 12; however, this can imply more active support than just hitting the Fl key for example. Preferentially, each active help service application that is located in the active help services 70 is designed to include help that is aware of the user's environment, process and context; in this sense, it can be called "active." The preferred active help services 70 may include components such as wizards (which walk users through a new process), stored or real-time multimedia support and on-demand computer-based training.
The file services 72 enable applications to use, manage, and write to files that may be located on a variety of platforms in a variety of locations within the netcentric computing system 12. File services 72 give clients 14, 39 remote access to files as if they were located locally, thereby providing transparent access to files for the client 14, 39. Those skilled in the art would recognize that the file services 72 will vary from enterprise to enterprise, depending on the needs and requirements of the particular netcentric computer system 12. The application integration interface services 74 provide a method or gateway for passing context and control of information to an external application in the netcentric computing system 12. The application integration interface services 74 specify how information will be passed, which is typically from the web server 28 to the client 14, 39, and defines the interface by which other applications can expect to receive information. External applications in this context could include anything from integrated performance support systems to ERP systems such as SAP or Peoplesoft, to external custom applications that have been previously developed. Where possible, application integration interfaces services 74 should make use of the component model defined by the project to broker information (i.e., OLE/COM interfaces) as opposed to custom building data-sharing modules. Those skilled in the art would recognize that various application integration interface services 74 may be readily incorporated and used in the preferred environment services architecture 10.
The common services 76 component of the application services 44 is a catchall category for a plurality of reusable routines that are useful across a set of applications that may be used in the netcentric computing system 12. Some examples of common services include date routines, time zone conversions and field validation routines. The examples set forth above have been set forth for illustrative purposes only and should not be construed as a limitation of the present invention. Those skilled in the art would recognize that several common services 76 exist and may be used in the application services 44 of the environment services architecture 10.
The component framework services 46 provide a standard infrastructure for building components so that they can communicate within an application and across applications, on the same machine (i.e.- client 14, 39 or server 22, 26, 28) or on multiple machines across a network, to work together. COM/DCOM and CORBA are the two leading component industry standards. These standards define how components should be built and how they should communicate and interact with each other.
Object Request Broker (ORB) services, based on COM/DCOM and CORBA, focus on how components communicate. The preferred component framework services 42, which are preferentially also based on CORBA and COM/DCOM, focus on how components should be built. Currently, two of the most dominant component frameworks include active X/OLE and JavaBeans.
Active X and Object Linking and Embedding (OLE) are implementations of COM/DCOM. ActiveX is a collection of facilities forming a framework for components to work together and interact. ActiveX divides the world into two kinds of components: controls and containers. Controls are relatively independent components that present well- defined interfaces or methods that containers and other components can call. Containers implement the part of the ActiveX protocol that allows for them to host and interact with components, forming a kind of back plane into which controls can be plugged. ActiveX is a scaled-down version of OLE for the Internet. OLE provides a framework to build applications from component modules and defines the way in which applications interact using data transfer, drag-and-drop and scripting. OLE is a set of common services that allows components to collaborate intelligently. In creating ActiveX from OLE2.0, Microsoft enhanced the framework to address some of the special needs of web-style computing. Microsoft's web browser, Internet
Explorer, is an ActiveX container. Therefore, any ActiveX control can be downloaded to, and plugged into, the browser. This allows for executable components to be interleaved with
HTML content and downloaded as needed by the web browser.
JavaBeans is Sun Microsystems' proposed framework for building Java components and containers. The intent is to develop and API standard that will allow components developed in Java (or beans), to be embedded in completing container frameworks including ActiveX or OpenDoc. JavaBeans API makes it easier to create reusable components in the Java language.
Other component frameworks include OpenDoc and One. CI Labs, formed in 1993, created the OpenDoc architecture to provide a cross-platform alternative component framework, independent of Microsoft's OLE. The OpenDoc architecture is constructed from various technologies supplied by its founding members: IBM, Apple and Word Perfect. The technologies include Bento (Apple's object storage model), Open Scripting Architecture (OSA-Apple's scripting architecture) and SOM/DSOM (IBM's System Object Model Distributed SOM). IBM's SOM architecture provides analogous services to that of Microsoft's DCOM architecture.
OpenDoc provides an open compound document infrastructure based on CORBA. It uses CORBA as its object model for inter-component communications. OpenDoc architecture provides services analogous to those provided by OLE, and OpenDoc components can also interoperate with OLE components. The OpenDoc equivalent of an object is termed a "part." Each type of part has its own editor, and the OpenDoc architecture has responsibility for handling the communications between the distinct parts.
Open Network Environment (ONE) is an object-oriented software framework from Netscape Communications for use with Internet clients and servers. It enables the integrating of web clients and servers with other enterprise resources and data. By supporting CORBA, ONE-enabled systems will be able to link with object software from a wide array of vendors, including IBM, Sun Microsystems, Digital Equipment and Hewlett-Packard. Netscape is positioning ONE as an alternative to Microsoft's Distributed Common Object Model (DCOM). ONE also complies with Sun Microsystems' Java technology. The operating system services 48 are the underlying services - such as multi-tasking, paging and memory allocation - that are typically provided by today's modern operating systems. As known in the art, the operating system services 48 are typically used by clients 14, 39 to perform basic computing tasks such as providing a desktop and web browser. applications that allow clients 14, 39 to connect to the web servers 28. The operating system services 48 provide the clients 14, 39 and servers 22, 26, 28 of the netcentric computing system 12 with underlying basic computing services. Where necessary, an additional layer of APIs may be provided to gain either operating system independence or a higher level of abstraction for application programmers. Those skilled in the art would recognize that various operating system services 48 exist and may be used in the preferred environment services architecture 10 to provide basic underlying computing capabilities to the netcentric computing system 12.
While the invention has been described in its currently best known modes of operation and embodiments, other modes and embodiments of the invention will be apparent to those skilled in the art and are contemplated. For other features, advantages and combinations of the present invention refer to U.S. Provisional Application Serial No: 60/156,962, entitled NETCENTRIC AND CLIENT/SERVER COMPUTING, which is herein incorporated by reference, in its entirety.

Claims

What is claimed is;
1. An environment services architecture for a netcentric computing system, comprising: runtime services for converting non-compiled computer languages into machine code during the execution of an application on said netcentric computing system; system services for performing system-level functions that may be selected from the group consisting of system security services, profile management services, task and memory management services and environment verification services; application services for performing common functions in said netcentric computing system, wherein said common functions may be selected from the group consisting of application security services, error handling/logging services, state management services, code table services, active help services, application integration services and common services; a component framework service for providing components of said netcentric computing system with a standard infrastructure for allowing an application running on components to communicate within and across applications in said netcentric computing system; and operating system services for providing said netcentric computing system with underlying basic computing services.
2. The environment services architecture of claim 1, wherein said runtime services include language interpreter services and virtual machine services.
3. The environment services architecture of claim 2, wherein said language interpreter services decompose a scripting language into machine code at runtime.
4. The environment services architecture of claim 2, wherein said virtual machine services include at least one virtual machine.
5. The environment services architecture of claim 1, wherein said system security services provide applications with the ability to interact with native security mechanisms that are used by an operating system on said netcentric computing system.
6. The environment services architecture of claim 1, wherein said profile management services are used to access and update a plurality of user or application profiles.
7. The environment services architecture of claim 1, wherein said environment verification services monitor, identify and validate application integrity before said application is executed on said netcentric computing system.
8. The environment services architecture of claim 1, wherein said task and memory management services allow applications or events to control individual computing tasks or processes and manage memory resources in said netcentric computing system.
9. The environment services architecture of claim 1, wherein said application security services may be selected from the group consisting of user access services, data access services and function access services.
10. The environment services architecture of claim 1, wherein said error handling/logging services present users of said netcentric computing system with an explanation of errors and logs error events in a database.
11. The environment services architecture of claim 1, wherein said state management services enable information to be shared between windows, web pages and applications in said netcentric computing system.
12. The environment services architecture of claim 1, wherein said codes table services enables applications or a client to use externally stored parameters and validation rules on said netcentric computing system.
13. The environment services architecture of claim 1, wherein said active help services enable applications to provide assistance to a user or a client for a specific task in said netcentric computing system.
14. The environment services architecture of claim 1, wherein file services enable applications to use, manage and write to files that are located in said netcentric computing system.
15. The environment services architecture of claim 1, wherein said application integration interface services provide a gateway for passing context and control of information to an external application.
16. The environment services architecture of claim 1, wherein said common services provide a plurality of reusable routines that may be used across a set of applications in said netcentric computing systems.
17. A method of providing an environment services architecture for a netcentric computing system, comprising the steps of: converting non-compiled computer languages into machine code during the execution of an application on said netcentric computing system with at least one runtime service located on a client and a server; performing system-level functions on said netcentric computing system with at least one system service located on said client and said server, wherein said system services may be selected from the group consisting of system security services, profile management services, task and memory management services and environment verification; performing common functions in said netcentric computing system with at least one common service located on said client and said server, wherein said common services may be selected from the group consisting of application security services, error handling/logging services, state management services, code table services, active help services, application integration services and common services; using component framework services located on said client and said server for providing a standard infrastructure for components to communicate within and across applications in said netcentric computing system; and providing basic computing system services to said client and said server with operating system services.
18. The method of claim 17, wherein said runtime services include language interpreter services and virtual machine services.
19. The method of claim 18, wherein said language interpreter services decompose a scripting language into machine code at runtime.
20. The method of claim 18, wherein said virtual machine services include at least one virtual machine.
21. The method of claim 17, wherein said system security services provide applications with the ability to interact with native security mechanisms that are used by an operating system on said netcentric computing system.
22. The method of claim 17, wherein said profile management services are used to access and update a plurality of user or application profiles.
23. The method of claim 17, wherein said environment verification services monitor, identify and validate application integrity before an application is executed on said netcentric computing system.
24. The method of claim 17, wherein said task and memory management services allow applications or events to control individual computing tasks or processes and manage memory resources in said netcentric computing system.
25. The method of claim 17, wherein said application security services may be selected from the group consisting of user access services, data access services and function access services.
26. The method of claim 17, wherein said error handling/logging services present users of said netcentric computing system with an explanation of errors and logs error events in a database.
27. The method of claim 17, wherein said state management services enable information to be shared between windows, web pages and applications in said netcentric computing system.
28. The method of claim 17, wherein said codes table services enables applications or a client to use externally stored parameters and validation rules on said netcentric computing system.
29. The method of claim 17, wherein said active help services enable applications to provide assistance to a user or a client for a specific task in said netcentric computing system.
30. The method of claim 17, wherein file services enable applications to use, manage and write to files that are located in said netcentric computing system.
31. The method of claim 17, wherein said application integration interface services provide a gateway for passing context and control of information to an external application.
32. The method of claim 17, wherein said common services provide a plurality of reusable routines that may be used across a set of applications in said netcentric computing system.
33. An environment services architecture for a netcentric computing system, comprising: at least one web server connected with a remote client; wherein said client and said web server include runtime services, system services, application services, a component framework service and operating system services.
34. The environment services architecture of claim 33, wherein said runtime services convert non-compiled computer languages into machine code during the execution of an application on said netcentric computing system.
35. The environment services architecture of claim 33, wherein said system services perform system-level functions that may be selected from the group consisting of system security services, profile management services, task and memory management services and environment verification services on said netcentric computing system.
36. The environment services architecture of claim 33, wherein said application services perform common functions in said netcentric computing system, wherein said common functions may be selected from the group consisting of application security services, error handling/logging services, state management services, code table services, active help services, application integration services and common services.
37. The environment services architecture of claim 33, wherein said component framework service provides components of said netcentric computing system with a standard infrastructure for allowing an application running on components to communicate within and across applications in said netcentric computing system.
38. The environment services architecture of claim 33, wherein said operating system services provide said netcentric computing system with underlying basic computing services.
PCT/US2000/026914 1999-10-01 2000-09-29 Environment service architectures for netcentric computing systems WO2001025917A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU76242/00A AU7624200A (en) 1999-10-01 2000-09-29 Environment service architectures for netcentric computing systems

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15696299P 1999-10-01 1999-10-01
US60/156,962 1999-10-01

Publications (2)

Publication Number Publication Date
WO2001025917A2 true WO2001025917A2 (en) 2001-04-12
WO2001025917A3 WO2001025917A3 (en) 2001-11-29

Family

ID=22561807

Family Applications (10)

Application Number Title Priority Date Filing Date
PCT/US2000/026941 WO2001025965A2 (en) 1999-10-01 2000-09-29 Data management for netcentric computing systems
PCT/US2000/027036 WO2001025908A2 (en) 1999-10-01 2000-09-29 Presentation service architectures for netcentric computing systems
PCT/US2000/027066 WO2001025918A2 (en) 1999-10-01 2000-09-29 Frameworks for methods and systems of providing netcentric computing
PCT/US2000/026917 WO2001025964A2 (en) 1999-10-01 2000-09-29 Base service architectures for netcentric computing systems
PCT/US2000/027173 WO2001025919A2 (en) 1999-10-01 2000-09-29 Architectures for netcentric computing systems
PCT/US2000/026692 WO2001025914A2 (en) 1999-10-01 2000-09-29 Operations architectures for netcentric computing systems
PCT/US2000/026987 WO2001025954A2 (en) 1999-10-01 2000-09-29 Information service architectures for netcentric computing systems
PCT/US2000/026914 WO2001025917A2 (en) 1999-10-01 2000-09-29 Environment service architectures for netcentric computing systems
PCT/US2000/026693 WO2001026321A2 (en) 1999-10-01 2000-09-29 Communication service architectures for netcentric computing systems
PCT/US2000/027123 WO2001025909A2 (en) 1999-10-01 2000-10-02 Development architectures for netcentric computing systems

Family Applications Before (7)

Application Number Title Priority Date Filing Date
PCT/US2000/026941 WO2001025965A2 (en) 1999-10-01 2000-09-29 Data management for netcentric computing systems
PCT/US2000/027036 WO2001025908A2 (en) 1999-10-01 2000-09-29 Presentation service architectures for netcentric computing systems
PCT/US2000/027066 WO2001025918A2 (en) 1999-10-01 2000-09-29 Frameworks for methods and systems of providing netcentric computing
PCT/US2000/026917 WO2001025964A2 (en) 1999-10-01 2000-09-29 Base service architectures for netcentric computing systems
PCT/US2000/027173 WO2001025919A2 (en) 1999-10-01 2000-09-29 Architectures for netcentric computing systems
PCT/US2000/026692 WO2001025914A2 (en) 1999-10-01 2000-09-29 Operations architectures for netcentric computing systems
PCT/US2000/026987 WO2001025954A2 (en) 1999-10-01 2000-09-29 Information service architectures for netcentric computing systems

Family Applications After (2)

Application Number Title Priority Date Filing Date
PCT/US2000/026693 WO2001026321A2 (en) 1999-10-01 2000-09-29 Communication service architectures for netcentric computing systems
PCT/US2000/027123 WO2001025909A2 (en) 1999-10-01 2000-10-02 Development architectures for netcentric computing systems

Country Status (3)

Country Link
US (3) US7415509B1 (en)
AU (10) AU7837300A (en)
WO (10) WO2001025965A2 (en)

Families Citing this family (113)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7814198B2 (en) 2007-10-26 2010-10-12 Microsoft Corporation Model-driven, repository-based application monitoring system
US6636857B2 (en) 2001-12-18 2003-10-21 Bluecurrent, Inc. Method and system for web-based asset management
KR20030066942A (en) * 2002-02-06 2003-08-14 (주) 자이오넥스 System Integration And Communication Method On The Network
US7286999B2 (en) * 2002-05-09 2007-10-23 International Business Machines Corporation Integrated project management and development environment for determining the time expended on project tasks
GB0211644D0 (en) 2002-05-21 2002-07-03 Wesby Philip B System and method for remote asset management
BR0215761A (en) * 2002-06-18 2006-11-28 Computer Ass Think Inc methods and systems for managing enterprise resources
US7340508B1 (en) * 2002-09-18 2008-03-04 Open Invention Network, Llc Exposing process flows and choreography controllers as web services
US20040098483A1 (en) * 2002-11-14 2004-05-20 Engel Glenn R. Triggering communication from devices that self-initiate communication
CA2431454A1 (en) * 2003-06-06 2004-12-06 Wrapped Apps Corporation Method and system for managing online applications
GB0314800D0 (en) * 2003-06-25 2003-07-30 Hyfinity Ltd System and associated methods for software assembly
WO2005010650A2 (en) * 2003-07-03 2005-02-03 Ebay Inc. Method and system for managing data transaction requests
US8453196B2 (en) 2003-10-14 2013-05-28 Salesforce.Com, Inc. Policy management in an interoperability network
US20050091346A1 (en) * 2003-10-23 2005-04-28 Brijesh Krishnaswami Settings management infrastructure
US7831703B2 (en) * 2004-01-07 2010-11-09 Intellinx Ltd. Apparatus and method for monitoring and auditing activity of a legacy environment
US7818387B1 (en) * 2004-02-09 2010-10-19 Oracle America, Inc. Switch
US7457874B2 (en) * 2004-02-20 2008-11-25 Microsoft Corporation Architecture for controlling access to a service by concurrent clients
US7523088B2 (en) * 2004-03-31 2009-04-21 International Business Machines Corporation Method for increasing system resource availability in database management systems
JP4286736B2 (en) * 2004-07-12 2009-07-01 富士通株式会社 Internet protocol telephone number guidance system
US7627328B2 (en) * 2004-08-03 2009-12-01 At&T Mobility Ii Llc Auditing of wireless network node databases
JP2006072432A (en) * 2004-08-31 2006-03-16 Onkyo Corp Peer-to-peer type content delivery system
EP1647898A1 (en) * 2004-10-12 2006-04-19 IMS Innovation Management Services GmbH Serverless replication of databases
US20060168230A1 (en) * 2005-01-27 2006-07-27 Caccavale Frank S Estimating a required number of servers from user classifications
US8745199B1 (en) * 2005-06-01 2014-06-03 Netapp, Inc. Method and apparatus for management and troubleshooting of a processing system
US8340077B2 (en) 2005-06-15 2012-12-25 At&T Intellectual Property I, Lp Providing operation services for networks via operations service servers
US7788401B2 (en) * 2005-06-15 2010-08-31 At&T Intellectual Property I, L.P. Operations switches and systems for providing operations service for networks
US7752437B1 (en) 2006-01-19 2010-07-06 Sprint Communications Company L.P. Classification of data in data flows in a data storage infrastructure for a communication network
US7895295B1 (en) 2006-01-19 2011-02-22 Sprint Communications Company L.P. Scoring data flow characteristics to assign data flows to storage systems in a data storage infrastructure for a communication network
US7797395B1 (en) 2006-01-19 2010-09-14 Sprint Communications Company L.P. Assignment of data flows to storage systems in a data storage infrastructure for a communication network
US7801973B1 (en) 2006-01-19 2010-09-21 Sprint Communications Company L.P. Classification of information in data flows in a data storage infrastructure for a communication network
US7788302B1 (en) 2006-01-19 2010-08-31 Sprint Communications Company L.P. Interactive display of a data storage infrastructure for a communication network
US10180809B2 (en) * 2006-05-17 2019-01-15 Richard Fetik Secure application acceleration system, methods and apparatus
US20080005115A1 (en) * 2006-06-30 2008-01-03 International Business Machines Corporation Methods and apparatus for scoped role-based access control
US8326296B1 (en) 2006-07-12 2012-12-04 At&T Intellectual Property I, L.P. Pico-cell extension for cellular network
US8122111B2 (en) * 2006-07-25 2012-02-21 Network Appliance, Inc. System and method for server configuration control and management
US8156082B2 (en) * 2006-10-06 2012-04-10 Sybase, Inc. System and methods for temporary data management in shared disk cluster
CN101192227B (en) * 2006-11-30 2011-05-25 阿里巴巴集团控股有限公司 Log file analytical method and system based on distributed type computing network
US8108413B2 (en) * 2007-02-15 2012-01-31 International Business Machines Corporation Method and apparatus for automatically discovering features in free form heterogeneous data
US8996587B2 (en) 2007-02-15 2015-03-31 International Business Machines Corporation Method and apparatus for automatically structuring free form hetergeneous data
US20080215664A1 (en) * 2007-03-01 2008-09-04 Microsoft Corporation Occasionally connected edge application architecture
US8352450B1 (en) * 2007-04-19 2013-01-08 Owl Computing Technologies, Inc. Database update through a one-way data link
US8024396B2 (en) 2007-04-26 2011-09-20 Microsoft Corporation Distributed behavior controlled execution of modeled applications
US7768944B2 (en) * 2007-05-18 2010-08-03 International Business Machines Corporation Technique for defining and dynamically enabling service level requirements in a service oriented architecture
US7970892B2 (en) 2007-06-29 2011-06-28 Microsoft Corporation Tuning and optimizing distributed systems with declarative models
US8239505B2 (en) 2007-06-29 2012-08-07 Microsoft Corporation Progressively implementing declarative models in distributed systems
WO2009051877A1 (en) * 2007-07-30 2009-04-23 Air Routing International, L.P. Air travel coordination, communication and documentation system, method and computer program
US8230386B2 (en) 2007-08-23 2012-07-24 Microsoft Corporation Monitoring distributed applications
WO2009053955A2 (en) * 2007-10-25 2009-04-30 Markport Limited Modification of service delivery infrastructure in communication networks
US7926070B2 (en) 2007-10-26 2011-04-12 Microsoft Corporation Performing requested commands for model-based applications
US8181151B2 (en) 2007-10-26 2012-05-15 Microsoft Corporation Modeling and managing heterogeneous applications
US8099720B2 (en) 2007-10-26 2012-01-17 Microsoft Corporation Translating declarative models
US7974939B2 (en) 2007-10-26 2011-07-05 Microsoft Corporation Processing model-based commands for distributed applications
US8225308B2 (en) 2007-10-26 2012-07-17 Microsoft Corporation Managing software lifecycle
US8375073B1 (en) * 2007-11-12 2013-02-12 Google Inc. Identification and ranking of news stories of interest
US8700574B2 (en) * 2008-03-21 2014-04-15 Omnitracs, Llc Pourover journaling
US8626223B2 (en) 2008-05-07 2014-01-07 At&T Mobility Ii Llc Femto cell signaling gating
US8179847B2 (en) 2008-05-13 2012-05-15 At&T Mobility Ii Llc Interactive white list prompting to share content and services associated with a femtocell
US8719420B2 (en) 2008-05-13 2014-05-06 At&T Mobility Ii Llc Administration of access lists for femtocell service
US8504032B2 (en) 2008-06-12 2013-08-06 At&T Intellectual Property I, L.P. Femtocell service registration, activation, and provisioning
US8243913B2 (en) * 2008-08-29 2012-08-14 8×8, Inc. Limiting contact in a networked contact center environment
US8275116B2 (en) 2008-08-29 2012-09-25 8X8, Inc. Networked contact center
CN101686251A (en) * 2008-09-26 2010-03-31 中国银联股份有限公司 Centralized standby system of remote isomorphism real-time system and standby method
US7822853B2 (en) * 2008-09-30 2010-10-26 Microsoft Corporation Stabilization of distributed systems
GB0906004D0 (en) * 2009-04-07 2009-05-20 Omnifone Ltd MusicStation desktop
US20140222758A1 (en) * 2009-08-14 2014-08-07 Ic Manage, Inc. Coherent File State Maintained Among Confederated Repositories By Distributed Workspace Apparatuses Backed Up By a File State Ledgerdemain Store
US8271434B2 (en) * 2009-10-01 2012-09-18 Verizon Patent And Licensing Inc. Central data store process configuration
US8510801B2 (en) 2009-10-15 2013-08-13 At&T Intellectual Property I, L.P. Management of access to service in an access point
US20110202909A1 (en) * 2010-02-12 2011-08-18 Microsoft Corporation Tier splitting for occasionally connected distributed applications
US8380889B2 (en) 2010-03-31 2013-02-19 Oki Data Americas, Inc. Distributed peripheral device management system
US9589253B2 (en) * 2010-06-15 2017-03-07 Microsoft Technology Licensing, Llc Workflow authoring environment and runtime
TWI420339B (en) 2010-11-10 2013-12-21 Ind Tech Res Inst Software authorization system and method
JP5800685B2 (en) * 2010-11-26 2015-10-28 キヤノン株式会社 Information processing apparatus and server, control method, program, and recording medium
US9710344B1 (en) 2010-12-13 2017-07-18 Amazon Technologies, Inc. Locality based quorum eligibility
US8473775B1 (en) * 2010-12-14 2013-06-25 Amazon Technologies, Inc. Locality based quorums
US9081520B2 (en) * 2010-12-22 2015-07-14 Owl Computing Technologies, Inc. Remote print file transfer and spooling application for use with a one-way data link
US8458348B2 (en) * 2011-04-22 2013-06-04 Oracle International Corporation Multiprocessing of data sets
US9454543B1 (en) * 2011-05-05 2016-09-27 Jason Bryan Rollag Systems and methods for database records management
US10078755B2 (en) 2011-05-27 2018-09-18 Apple Inc. Private and public applications
US9965614B2 (en) * 2011-09-29 2018-05-08 Oracle International Corporation Mobile application, resource management advice
EP2788869A4 (en) * 2011-12-09 2015-07-08 Kubisys Inc Hybrid virtual computing environments
JP6284489B2 (en) * 2012-01-10 2018-02-28 ユニコム・システムズ,インコーポレーテッド Cloud-based distributed data system
US9100330B1 (en) * 2012-07-13 2015-08-04 Emc Corporation Introduction of read delay or write delay in servers of a geographically distributed data processing system so that clients read up-to-date data
US8943198B2 (en) * 2012-11-13 2015-01-27 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Automatically addressing performance issues in a distributed database
CN103455556B (en) * 2013-08-08 2017-06-23 成都市欧冠信息技术有限责任公司 Memory cell data method of cutting out
US9621424B2 (en) 2013-10-04 2017-04-11 Microsoft Technologies Licensing, LLC Providing a common interface for accessing and presenting component configuration settings
US20150336005A1 (en) * 2014-05-20 2015-11-26 Cadillac Jack Electronic gaming system with central game licensing
US9087012B1 (en) * 2014-06-04 2015-07-21 Pure Storage, Inc. Disaster recovery at high reliability in a storage cluster
US9575987B2 (en) 2014-06-23 2017-02-21 Owl Computing Technologies, Inc. System and method for providing assured database updates via a one-way data link
US9811677B2 (en) 2014-07-03 2017-11-07 Pure Storage, Inc. Secure data replication in a storage grid
US10462249B2 (en) * 2014-08-25 2019-10-29 Super Micro Computer, Inc. Globally distributed virtual cache for worldwide real-time data access
US11762989B2 (en) 2015-06-05 2023-09-19 Bottomline Technologies Inc. Securing electronic data by automatically destroying misdirected transmissions
US9734000B2 (en) 2015-06-18 2017-08-15 Microsoft Technology Licensing, Llc Seamless transitions between applications and devices
US10454943B2 (en) * 2015-08-17 2019-10-22 The Toronto-Dominion Bank Augmented and virtual reality based process oversight
KR102317716B1 (en) * 2015-11-09 2021-10-26 에스케이텔레콤 주식회사 Method and apparatus for scheduling deployment of software based on resource usages
US20170163664A1 (en) 2015-12-04 2017-06-08 Bottomline Technologies (De) Inc. Method to secure protected content on a mobile device
US10540340B2 (en) 2016-02-09 2020-01-21 International Business Machines Corporation Performing conflict analysis of replicated changes among nodes in a network
CA3019434C (en) * 2016-03-31 2023-06-20 Cae Inc. Method and systems for removing the most extraneous data record from a remote repository
US9734184B1 (en) 2016-03-31 2017-08-15 Cae Inc. Method and systems for removing the most extraneous data record from a remote repository
US20170286575A1 (en) 2016-03-31 2017-10-05 Cae Inc. Method and systems for anticipatorily updating a remote repository
WO2017165944A1 (en) * 2016-03-31 2017-10-05 Cae Inc. Method and systems for updating a remote repository based on data-types
US10115320B2 (en) 2016-03-31 2018-10-30 Cae Inc. Method and systems for updating a remote repository based on data-types
WO2017165945A1 (en) * 2016-03-31 2017-10-05 Cae Inc. Method and systems for anticipatorily updating a remote repository
US11163955B2 (en) 2016-06-03 2021-11-02 Bottomline Technologies, Inc. Identifying non-exactly matching text
GB2556924A (en) * 2016-11-25 2018-06-13 Infosum Ltd Accessing databases
US10339931B2 (en) 2017-10-04 2019-07-02 The Toronto-Dominion Bank Persona-based conversational interface personalization using social network preferences
US10460748B2 (en) 2017-10-04 2019-10-29 The Toronto-Dominion Bank Conversational interface determining lexical personality score for response generation with synonym replacement
CN108696588B (en) * 2018-05-14 2021-06-25 平安科技(深圳)有限公司 Information sending method and equipment
US11416713B1 (en) 2019-03-18 2022-08-16 Bottomline Technologies, Inc. Distributed predictive analytics data set
US11042555B1 (en) 2019-06-28 2021-06-22 Bottomline Technologies, Inc. Two step algorithm for non-exact matching of large datasets
US11269841B1 (en) 2019-10-17 2022-03-08 Bottomline Technologies, Inc. Method and apparatus for non-exact matching of addresses
US11449870B2 (en) 2020-08-05 2022-09-20 Bottomline Technologies Ltd. Fraud detection rule optimization
US11544798B1 (en) 2021-08-27 2023-01-03 Bottomline Technologies, Inc. Interactive animated user interface of a step-wise visual path of circles across a line for invoice management
US11694276B1 (en) 2021-08-27 2023-07-04 Bottomline Technologies, Inc. Process for automatically matching datasets
US20230254301A1 (en) * 2022-02-07 2023-08-10 Elasticsearch B.V. Auto-Configuration of Security Features in Distributed System with Minimal User Interaction

Family Cites Families (129)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4809170A (en) 1987-04-22 1989-02-28 Apollo Computer, Inc. Computer device for aiding in the development of software system
US5495610A (en) 1989-11-30 1996-02-27 Seer Technologies, Inc. Software distribution system to build and distribute a software release
JP2797698B2 (en) 1990-11-14 1998-09-17 株式会社日立製作所 Software reuse support method
DE69228350T2 (en) * 1991-05-08 1999-09-23 Digital Equipment Corp ADMINISTRATIVE INTERFACE AND FORMAT FOR LICENSE MANAGEMENT SYSTEM
US5311424A (en) * 1991-06-28 1994-05-10 International Business Machines Corporation Method and system for product configuration definition and tracking
JP3408548B2 (en) 1991-08-21 2003-05-19 株式会社日立製作所 Specification creation process control device
US5619716A (en) 1991-11-05 1997-04-08 Hitachi, Ltd. Information processing system having a configuration management system for managing the software of the information processing system
CA2101864A1 (en) 1992-08-27 1994-02-28 Claudia Carpenter Customizable program control interface for a computer system
US5860012A (en) 1993-09-30 1999-01-12 Intel Corporation Installation of application software through a network from a source computer system on to a target computer system
US5999916A (en) * 1994-02-28 1999-12-07 Teleflex Information Systems, Inc. No-reset option in a batch billing system
US5564002A (en) * 1994-08-01 1996-10-08 International Business Machines Corporation Method and apparatus for implementing a virtual desktop through window positioning
US5922054A (en) * 1994-08-19 1999-07-13 Canon Kabushiki Kaisha System for managing external applications and files
JP3946275B2 (en) 1995-01-10 2007-07-18 富士通株式会社 Remote installation system and method
US5745753A (en) * 1995-01-24 1998-04-28 Tandem Computers, Inc. Remote duplicate database facility with database replication support for online DDL operations
US5933582A (en) 1995-02-24 1999-08-03 Ricoh Company, Ltd. Printing manager method and system for a copying machine in a network
US5742829A (en) 1995-03-10 1998-04-21 Microsoft Corporation Automatic software installation on heterogeneous networked client computer systems
US6154753A (en) * 1995-09-15 2000-11-28 Cable & Wireless, Inc. Document management system and method for business quality modeling
US5758150A (en) 1995-10-06 1998-05-26 Tele-Communications, Inc. System and method for database synchronization
US5805889A (en) * 1995-10-20 1998-09-08 Sun Microsystems, Inc. System and method for integrating editing and versioning in data repositories
US5737533A (en) 1995-10-26 1998-04-07 Wegener Internet Projects Bv System for generating a virtual reality scene in response to a database search
US5956479A (en) 1995-11-13 1999-09-21 Object Technology Licensing Corporation Demand based generation of symbolic information
US5799297A (en) 1995-12-15 1998-08-25 Ncr Corporation Task workflow management system and method including an external program execution feature
US5710915A (en) * 1995-12-21 1998-01-20 Electronic Data Systems Corporation Method for accelerating access to a database clustered partitioning
WO1997027553A1 (en) 1996-01-29 1997-07-31 Futuretense, Inc. Distributed electronic publishing system
US5805785A (en) 1996-02-27 1998-09-08 International Business Machines Corporation Method for monitoring and recovery of subsystems in a distributed/clustered system
CA2248911C (en) 1996-03-15 2002-01-22 At&T Corp. System and method for locating resources on a network using resource evaluations derived from electronic messages
US6018748A (en) * 1996-05-28 2000-01-25 Sun Microsystems, Inc. Dynamic linkable labels in a network browser page
US5781732A (en) 1996-06-20 1998-07-14 Object Technology Licensing Corp. Framework for constructing shared documents that can be collaboratively accessed by multiple users
US6115712A (en) * 1996-07-12 2000-09-05 International Business Machines Corporation Mechanism for combining data analysis algorithms with databases on the internet
US5956400A (en) 1996-07-19 1999-09-21 Digicash Incorporated Partitioned information storage systems with controlled retrieval
US5761071A (en) 1996-07-27 1998-06-02 Lexitech, Inc. Browser kiosk system
JP2968733B2 (en) * 1996-09-13 1999-11-02 日本電気アイシーマイコンシステム株式会社 Serial bus controller
US5911071A (en) 1996-09-13 1999-06-08 Sun Microsystems, Inc. Persistent programming system and method for deploying self-containing executable applications
US5892909A (en) 1996-09-27 1999-04-06 Diffusion, Inc. Intranet-based system with methods for co-active delivery of information to multiple users
US6067577A (en) 1996-09-30 2000-05-23 Apple Computer, Inc. Dynamic method resolution for native methods in a dynamic object-oriented programming language
US5870759A (en) 1996-10-09 1999-02-09 Oracle Corporation System for synchronizing data between computers using a before-image of data
US5835090A (en) 1996-10-16 1998-11-10 Etma, Inc. Desktop manager for graphical user interface based system with enhanced desktop
US5930512A (en) 1996-10-18 1999-07-27 International Business Machines Corporation Method and apparatus for building and running workflow process models using a hypertext markup language
US6385655B1 (en) 1996-10-24 2002-05-07 Tumbleweed Communications Corp. Method and apparatus for delivering documents over an electronic network
US5923885A (en) * 1996-10-31 1999-07-13 Sun Microsystems, Inc. Acquisition and operation of remotely loaded software using applet modification of browser software
US6023698A (en) 1996-12-05 2000-02-08 International Business Machines Corporation System and method for transparently registering and updating information over the internet
US6061695A (en) 1996-12-06 2000-05-09 Microsoft Corporation Operating system shell having a windowing graphical user interface with a desktop displayed as a hypertext multimedia document
US5892905A (en) 1996-12-23 1999-04-06 International Business Machines Corporation Computer apparatus and method for providing a common user interface for software applications accessed via the world-wide web
US5877759A (en) 1997-03-26 1999-03-02 Netscape Communications Corporation Interface for user/agent interaction
US6026500A (en) * 1997-05-13 2000-02-15 Electronic Data Systems Corporation Method and system for managing computer systems
WO1998053396A1 (en) * 1997-05-19 1998-11-26 Electronic Data Systems Corporation Distributed help desk system and method
US6157706A (en) 1997-05-19 2000-12-05 E-Centric, Incorporated Method and apparatus for enabling a facsimile machine to be an e-mail client
US6038560A (en) 1997-05-21 2000-03-14 Oracle Corporation Concept knowledge base search and retrieval system
SE9702015L (en) * 1997-05-28 1998-11-29 Ericsson Telefon Ab L M Method for distributed database, as well as a system adapted to operate according to the method
AU8065698A (en) * 1997-06-13 1998-12-30 True Software, Inc. Systems and methods for scanning and modeling dependencies in software applications
US5905868A (en) 1997-07-22 1999-05-18 Ncr Corporation Client/server distribution of performance monitoring data
US6006171A (en) 1997-07-28 1999-12-21 Vines; Caroline J. Dynamic maintenance management system
US6112304A (en) 1997-08-27 2000-08-29 Zipsoft, Inc. Distributed computing architecture
US6574661B1 (en) 1997-09-26 2003-06-03 Mci Communications Corporation Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client
US5924096A (en) 1997-10-15 1999-07-13 Novell, Inc. Distributed database using indexed into tags to tracks events according to type, update cache, create virtual update log on demand
US5999931A (en) 1997-10-17 1999-12-07 Lucent Technologies Inc. Concurrency control protocols for management of replicated data items in a distributed database system
EP0915422B1 (en) * 1997-11-06 2006-03-01 Hewlett-Packard Company Expert system
US6457066B1 (en) 1997-11-10 2002-09-24 Microsoft Corporation Simple object access protocol
US5960406A (en) * 1998-01-22 1999-09-28 Ecal, Corp. Scheduling system for use between users on the web
US6401097B1 (en) 1998-01-23 2002-06-04 Mccotter Thomas M. System and method for integrated document management and related transmission and access
US6366912B1 (en) 1998-04-06 2002-04-02 Microsoft Corporation Network security zones
US6185573B1 (en) 1998-04-22 2001-02-06 Millenium Integrated Systems, Inc. Method and system for the integrated storage and dynamic selective retrieval of text, audio and video data
US6144975A (en) 1998-05-05 2000-11-07 Fmr Corporation Computer system for intelligent document management
US6321263B1 (en) 1998-05-11 2001-11-20 International Business Machines Corporation Client-based application availability
US6598046B1 (en) 1998-09-29 2003-07-22 Qwest Communications International Inc. System and method for retrieving documents responsive to a given user's role and scenario
US6584466B1 (en) 1999-04-07 2003-06-24 Critical Path, Inc. Internet document management system and methods
US6721713B1 (en) 1999-05-27 2004-04-13 Andersen Consulting Llp Business alliance identification in a web architecture framework
US6442547B1 (en) 1999-06-02 2002-08-27 Andersen Consulting System, method and article of manufacture for information service management in a hybrid communication system
US6426948B1 (en) 1999-06-02 2002-07-30 Accenture Llp Video conferencing fault management in a hybrid network
US6195697B1 (en) 1999-06-02 2001-02-27 Ac Properties B.V. System, method and article of manufacture for providing a customer interface in a hybrid network
US6704303B1 (en) 1999-06-02 2004-03-09 Accenture Llp IP/telephony user interface for a hybrid communication system
US6449588B1 (en) 1999-06-02 2002-09-10 Accenture Llp Customer-driven QOS in hybrid communication system
US6707812B1 (en) 1999-06-02 2004-03-16 Accenture Llp System, method and article of manufacture for element management in a hybrid communication system
US6081518A (en) 1999-06-02 2000-06-27 Anderson Consulting System, method and article of manufacture for cross-location registration in a communication system architecture
US6556659B1 (en) 1999-06-02 2003-04-29 Accenture Llp Service level management in a hybrid network architecture
US6147975A (en) 1999-06-02 2000-11-14 Ac Properties B.V. System, method and article of manufacture of a proactive threhold manager in a hybrid communication system architecture
US6542593B1 (en) 1999-06-02 2003-04-01 Accenture Llp Rules database server in a hybrid communication system architecture
US6122630A (en) * 1999-06-08 2000-09-19 Iti, Inc. Bidirectional database replication scheme for controlling ping-ponging
US6418430B1 (en) 1999-06-10 2002-07-09 Oracle International Corporation System for efficient content-based retrieval of images
US6523027B1 (en) 1999-07-30 2003-02-18 Accenture Llp Interfacing servers in a Java based e-commerce architecture
US6601234B1 (en) 1999-08-31 2003-07-29 Accenture Llp Attribute dictionary in a business logic services environment
US6662357B1 (en) 1999-08-31 2003-12-09 Accenture Llp Managing information in an integrated development architecture framework
US6640244B1 (en) 1999-08-31 2003-10-28 Accenture Llp Request batcher in a transaction services patterns environment
US6549949B1 (en) 1999-08-31 2003-04-15 Accenture Llp Fixed format stream in a communication services patterns environment
US6636242B2 (en) 1999-08-31 2003-10-21 Accenture Llp View configurer in a presentation services patterns environment
US6477580B1 (en) 1999-08-31 2002-11-05 Accenture Llp Self-described stream in a communication services patterns environment
US6578068B1 (en) 1999-08-31 2003-06-10 Accenture Llp Load balancer in environment services patterns
US6615199B1 (en) 1999-08-31 2003-09-02 Accenture, Llp Abstraction factory in a base services pattern environment
US6289382B1 (en) 1999-08-31 2001-09-11 Andersen Consulting, Llp System, method and article of manufacture for a globally addressable interface in a communication services patterns environment
US6742015B1 (en) 1999-08-31 2004-05-25 Accenture Llp Base services patterns in a netcentric environment
US6697824B1 (en) 1999-08-31 2004-02-24 Accenture Llp Relationship management in an E-commerce application framework
US6370573B1 (en) 1999-08-31 2002-04-09 Accenture Llp System, method and article of manufacture for managing an environment of a development architecture framework
US6502213B1 (en) 1999-08-31 2002-12-31 Accenture Llp System, method, and article of manufacture for a polymorphic exception handler in environment services patterns
US6324647B1 (en) 1999-08-31 2001-11-27 Michel K. Bowman-Amuah System, method and article of manufacture for security management in a development architecture framework
US6339832B1 (en) 1999-08-31 2002-01-15 Accenture Llp Exception response table in environment services patterns
US6715145B1 (en) 1999-08-31 2004-03-30 Accenture Llp Processing pipeline in a base services pattern environment
US6434628B1 (en) 1999-08-31 2002-08-13 Accenture Llp Common interface for handling exception interface name with additional prefix and suffix for handling exceptions in environment services patterns
US6529948B1 (en) 1999-08-31 2003-03-04 Accenture Llp Multi-object fetch component
US6405364B1 (en) 1999-08-31 2002-06-11 Accenture Llp Building techniques in a development architecture framework
US7139999B2 (en) * 1999-08-31 2006-11-21 Accenture Llp Development architecture framework
US6640238B1 (en) 1999-08-31 2003-10-28 Accenture Llp Activity component in a presentation services patterns environment
US6640249B1 (en) 1999-08-31 2003-10-28 Accenture Llp Presentation services patterns in a netcentric environment
US6427132B1 (en) 1999-08-31 2002-07-30 Accenture Llp System, method and article of manufacture for demonstrating E-commerce capabilities via a simulation on a network
US6571282B1 (en) 1999-08-31 2003-05-27 Accenture Llp Block-based communication in a communication services patterns environment
US6442748B1 (en) 1999-08-31 2002-08-27 Accenture Llp System, method and article of manufacture for a persistent state and persistent object separator in an information services patterns environment
US6345239B1 (en) 1999-08-31 2002-02-05 Accenture Llp Remote demonstration of business capabilities in an e-commerce environment
US6256773B1 (en) 1999-08-31 2001-07-03 Accenture Llp System, method and article of manufacture for configuration management in a development architecture framework
US6550057B1 (en) 1999-08-31 2003-04-15 Accenture Llp Piecemeal retrieval in an information services patterns environment
US6539396B1 (en) 1999-08-31 2003-03-25 Accenture Llp Multi-object identifier system and method for information service pattern environment
US6438594B1 (en) 1999-08-31 2002-08-20 Accenture Llp Delivering service to a client via a locally addressable interface
US6434568B1 (en) 1999-08-31 2002-08-13 Accenture Llp Information services patterns in a netcentric environment
US6477665B1 (en) 1999-08-31 2002-11-05 Accenture Llp System, method, and article of manufacture for environment services patterns in a netcentic environment
US6529909B1 (en) 1999-08-31 2003-03-04 Accenture Llp Method for translating an object attribute converter in an information services patterns environment
US6601192B1 (en) 1999-08-31 2003-07-29 Accenture Llp Assertion component in environment services patterns
US6615253B1 (en) 1999-08-31 2003-09-02 Accenture Llp Efficient server side data retrieval for execution of client side applications
US6496850B1 (en) 1999-08-31 2002-12-17 Accenture Llp Clean-up of orphaned server contexts
US6611867B1 (en) 1999-08-31 2003-08-26 Accenture Llp System, method and article of manufacture for implementing a hybrid network
US6606660B1 (en) 1999-08-31 2003-08-12 Accenture Llp Stream-based communication in a communication services patterns environment
US6332163B1 (en) 1999-09-01 2001-12-18 Accenture, Llp Method for providing communication services over a computer network system
US7068680B1 (en) 1999-10-01 2006-06-27 Accenture Llp Communication service architectures for netcentric computing systems
US6988249B1 (en) 1999-10-01 2006-01-17 Accenture Llp Presentation service architectures for netcentric computing systems
US7020697B1 (en) 1999-10-01 2006-03-28 Accenture Llp Architectures for netcentric computing systems
US6874010B1 (en) 1999-10-01 2005-03-29 Accenture Llp Base service architectures for netcentric computing systems
US6606744B1 (en) 1999-11-22 2003-08-12 Accenture, Llp Providing collaborative installation management in a network-based supply chain environment
US7899721B2 (en) 2001-02-27 2011-03-01 Accenture Global Services Gmbh E-commerce system, method and computer program product
US6745209B2 (en) * 2001-08-15 2004-06-01 Iti, Inc. Synchronization of plural databases in a database replication system
US7734793B2 (en) 2001-11-27 2010-06-08 Accenture Global Services Gmbh Service control framework for seamless transfer of a multimedia conference over different media
AU2002352955A1 (en) 2001-11-27 2003-06-10 Accenture Llp Context sensitive advertisement delivery framework
EP1461688A4 (en) 2001-11-27 2006-02-08 Accenture Llp Service control architecture

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
BANK J. A.: "JAVA SECURITY" , 8 December 1995 (1995-12-08), pages 1-13, XP002092325 *
BORSOOK P.: "SEEKING SECURITY. MAINFRAME TECHNIQUES DEFINE SYSTEM SECURITY. SOON, THEY'LL BE ADAPTED TO DISTRIBUTED CLIENT/SERVER SYSTEMS" BYTE, MCGRAW-HILL INC., ST PETERBOROUGH, US, vol. 18, no. 6, 1 May 1993 (1993-05-01), pages 119-122,124,12, XP000359327 ISSN: 0360-5280 *
BURKE M. G., CHOI J.-D., FINK S., GROVE D., HIND M., SARKAR V., SERRANO M. J., SREEDHAR V. C., SRINIVASAN H.: "THE JALAPEÑO DYNAMIC OPTIMIZING COMPILER FOR JAVA" JAVA'99, SAN FRANCISCO, CA, US, ACM, 12 June 1999 (1999-06-12), pages 129-141, XP002134655 *
CRAMER T., FRIEDMAN R., MILLER T., SEBERGER D., WILSON R., WOLCZKO M.: "COMPILING JAVA JUST IN TIME" IEEE MICRO, IEEE INC., NEW YORK, US, vol. 17, no. 3, 1 May 1997 (1997-05-01), pages 36-43, XP000656035 ISSN: 0272-1732 *
KOVED L., NADALIN A. J., NEAL D., LAWSON T.: "THE EVOLUTION OF JAVA SECURITY" IBM, THE ULTIMATE RESOURCE FOR JAVA DEVELOPERS, 1998, pages 1-14, XP002144222 *
ORFALI R., HARKEY D., EDWARDS J.: "INTERGALACTIC CLIENT/SERVER COMPUTING" BYTE, MCGRAW-HILL INC., ST PETERBOROUGH,US, vol. 20, no. 4, 1 April 1995 (1995-04-01), pages 108-110,114,11, XP000501823 ISSN: 0360-5280 *
PLEAS K.: "OLE'S MISSING LINKS" BYTE, MCGRAW-HILL INC., ST PETERBOROUGH, US, vol. 21, no. 4, 1 April 1996 (1996-04-01), pages 99-102, XP000586036 ISSN: 0360-5280 *

Also Published As

Publication number Publication date
WO2001025954A2 (en) 2001-04-12
WO2001025964A3 (en) 2001-11-29
WO2001025964A2 (en) 2001-04-12
WO2001026321A3 (en) 2001-11-01
AU7624200A (en) 2001-05-10
WO2001025909A2 (en) 2001-04-12
WO2001025914A2 (en) 2001-04-12
AU7848200A (en) 2001-05-10
WO2001025919A2 (en) 2001-04-12
US20050283518A1 (en) 2005-12-22
WO2001025909A3 (en) 2002-01-10
WO2001025965A3 (en) 2002-03-07
AU7837400A (en) 2001-05-10
US7415509B1 (en) 2008-08-19
AU7740300A (en) 2001-05-10
WO2001025965A2 (en) 2001-04-12
WO2001025914A3 (en) 2002-01-17
AU7746300A (en) 2001-05-10
US7403946B1 (en) 2008-07-22
US7734687B2 (en) 2010-06-08
AU7837300A (en) 2001-05-10
WO2001025908A2 (en) 2001-04-12
WO2001026321A2 (en) 2001-04-12
AU7743600A (en) 2001-05-10
AU7843900A (en) 2001-05-10
WO2001025918A3 (en) 2002-03-07
AU7841100A (en) 2001-05-10
WO2001025908A3 (en) 2002-03-14
WO2001025918A2 (en) 2001-04-12
WO2001025917A3 (en) 2001-11-29
AU7742000A (en) 2001-05-10
WO2001025919A3 (en) 2002-01-17
WO2001025954A3 (en) 2002-01-10

Similar Documents

Publication Publication Date Title
US7734687B2 (en) Environment service architectures for netcentric computing systems
Bernstein Middleware: a model for distributed system services
JP3405666B2 (en) Method and computer workstation for running applet over non-IP network
US6954220B1 (en) User context component in environment services patterns
US5899990A (en) Java-to-Database Connectivity Server
US7516440B2 (en) System and method for providing a java interface to an application view component
US6718331B2 (en) Method and apparatus for locating inter-enterprise resources using text-based strings
US6978461B2 (en) System and method for accessing functionality of a backend system from an application server
US6615253B1 (en) Efficient server side data retrieval for execution of client side applications
WO2001016729A2 (en) System, method, and article of manufacture for distributed garbage collection in environment services patterns
WO2001009752A2 (en) A system, method and article of manufacture for a host framework design in an e-commerce architecture
AU2002318249A1 (en) System and method for transaction processing with transaction property feature
WO2003009127A1 (en) System and method for transaction processing with transaction property feature
JP2002528813A (en) Automated web interface generation for software coded applications
US7363377B1 (en) Method for protecting the program environment of a microsoft component object model (COM) client
Goodwill Pure JSP--Java Server Pages: A Code-Intensive Premium Reference
US7603675B2 (en) Object in, object out technique
Bai Developing Java Web Services to Access Databases
Depledge et al. An open, distributable, three-tier client-server architecture with transaction semantics
Chen et al. Middleware Components for E-commerce Infrastructure: An Analytical Review.
Sadtler et al. Patterns for E-business: User-to-business Patterns for Topology 1 and 2 Using WebSphere Advance Edition
Silva et al. A survey of web information systems
WO2001009794A2 (en) A system, method and article of manufacture for an e-commerce based architecture
Benns et al. What's in the Middle?
Nusbaum et al. WebSphere Application Servers: Standard and Advanced Editions

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
AK Designated states

Kind code of ref document: A3

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A3

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP