|Publication number||USRE42808 E1|
|Application number||US 12/315,061|
|Publication date||Oct 4, 2011|
|Filing date||Nov 26, 2008|
|Priority date||Dec 27, 2001|
|Also published as||US7143080, US20030126114|
|Publication number||12315061, 315061, US RE42808 E1, US RE42808E1, US-E1-RE42808, USRE42808 E1, USRE42808E1|
|Inventors||Michael A. Tedesco|
|Original Assignee||Harrison Agate, Llc|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (14), Non-Patent Citations (1), Classifications (9), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is related to U.S. patent application Ser. No. 10/034,885 entitled “METHOD AND APPARATUS FOR SCREENING DATABASE QUERIES PRIOR TO SUBMISSION TO A DATABASE” filed on Dec. 26, 2001 in the name of Michael Tedesco, the entirety of which is incorporated herein by reference.
The present invention relates generally to database management and, more particularly, to methods and apparatuses for accessing data from an established database using an alternate database engine.
Businesses employing such database engines typically find that it is difficult to convert to or incorporate an alternate database engine that is produced by another database manufacturer or that employs a differing data format. This problem, known as entrenchment, arises due to costs that arise from conversion between competing database products. These costs are due largely to the nature of existing computer software, in that differing data standards, command structures, and file formats are typically used by competing database manufacturers. For example, conversion of any data stored by an established database engine to a format supported by the new database engine may be labor-intensive, and therefore, expensive. In addition, new data commands corresponding to the new database engine must be learned by users in order to interact efficiently with them. The process of learning new commands temporarily reduces the user's efficiency, thereby impacting his or her efficiency. Businesses then may determine that the costs associated with conversion would prevent them from selecting a new database engine, if when it would provide new or more desirable functionality.
A business or other entity is thus largely wedded to a particular established database system once it has been selected and implemented. Over time, entrenchment may result in additional unwanted costs. For example, a database manufacturer may require its customers to purchase software upgrades periodically, in order to maintain service contracts and the like for the established database engine, even when such upgrades do not provide any additional functionality that is specifically beneficial to the business.
In another example, a business may wish to expand database services to users by providing additional database servers on the computer network, particularly where large amounts of data are maintained or large numbers of users are provided with access. In such a case, the business would be forced to purchase another license for the established database engine to run on a new server, even when less costly database engines may be available.
Various solutions to the entrenchment problem have been attempted. A first example involves certain database engines that periodically copy or replicate data stored by an established database engine and provide it to further users. However, this solution is not ideal in the case of temporally-sensitive data that changes on a continuing basis, such as a historical stock price data. There is inherently some delay associated between conversion of the data between the established and the new database engines. Also, there is a delay associated with data transfer between the two database engines. This may result in inaccurate result sets being generated and returned to users accessing such database engines.
A second example is a class of software products known as middleware applications, such as ODBC produced by MICROSOFT, and JDBC by SUN MICROSYSTEMS. In such applications, the network connectivity layers of the middleware and the established database system are still tied together. Thus, database commands submitted to the middleware application must be processed by a command software layer of the established database system. In a case where the new database engine is implemented to relieve some of the processing performed by the established database engine, system usage resources and other costs, including financial costs, associated with the established database engine are still negatively-impacted.
A final example is a class of software products commonly known as database gateway products. These products provide a command gateway between competing database engines of differing data formats, allowing users to submit one command to interact with two or more such separate, supported, database engines. Examples of such gateway products include TRANSPARENT GATEWAY by ORACLE, MICROKERNEL by PERVASIVE, OMNISQL by SYBASE, STARNET and STARGATE produced by POWERHOUSE and DB INTEGRATOR by DIGITAL EQUIPMENT CORPORATION. However, these gateway products generally require continuous maintenance and customization. For example, data mapping in a metadata mapping layer must be continuously changed with every change to the separate supported database engines. Furthermore, the command layer of each separate database engine is accessed by such gateway products in order to process database commands, thus impacting system resources of each server that maintains a database engine. Again, the desired purpose of having a separate database engine may be to relieve some processing from an established database engine. In such a case, this final example is not an optimal solution since system resources of both database engines are impacted.
Accordingly, there is a need for a method and apparatus for implementing and using an alternate database engine with an existing database engine that addresses certain problems of existing technologies.
The present application is directed to particular features of a system for implementing and using an alternate database engine with an existing database engine in which queries directed to an existing database are intercepted and executed by an alternate database engine.
According to a first embodiment, a method for processing a database command commences when a database command is received from a user that requires data from an established database engine. The established database engine has a command layer for processing database commands. However, in order to preserve system resources and the like of the established database server, the database command may be processed by accessing data from the established database engine using only a command layer of an alternate database engine without accessing the command layer of the established database engine.
In a second embodiment, a method for implementing and using an alternate database engine in conjunction with an established database engine commences when a plurality of users are given access to an established database engine that has a command layer for processing database commands. An alternate database engine is then established on the same computing system. A database command is received from one of the plurality of users, where the database command is directed to data stored by the established database engine. The command is processed using only the alternate database engine without accessing the command layer of the first database engine. In addition, the alternate database engine may maintain a second database file including second data which is accessible to the user and queried through the command layer of the alternate database engine as well.
The computing system is contemplated in various embodiments to include one or more of a local area network, a wide area network, an intranet, an extranet, a wireless network and the Internet.
In further embodiments, the command may be evaluated to determine its impact on available system resources or to determine whether the query can be optimized.
In additional embodiments, the alternate database engine determines whether the command requires accessing the temporally sensitive data of the established database engine, and if so, accesses a transaction log of the first database engine without interacting with the command layer of the established database engine.
Results of the query obtained by the alternate database engine may be provided to the user in a format associated with the established database engine.
The methods and apparatuses of the present invention may be used with enterprise database systems, or any other scale database system.
Further aspects of the present invention will be more readily appreciated upon review of the detailed description of the various embodiments provided below when taken in conjunction with the accompanying drawings, of which:
FIGS. 7A-7F3 are a flowchart depicting an exemplary general process for implementing an alternate database engine according to certain embodiments of the present invention; and
Various embodiments of the present invention involve a computer network having one or more servers that maintain an established database engine and an alternate database engine. The established database engine maintains legacy data that is accessible by a plurality of users having user terminals on the network. The alternate database engine may maintain further data that is stored after the alternate database engine is incorporated into the system. In some embodiments, the established database engine may also store some or all such further data.
Various database commands, that may require result data from the established database engine, may be selectively intercepted, evaluated, optimized and processed by the alternate database engine. The alternate database engine may translate the query, when necessary, to a recognizable format and process the same directly with the database file maintained by the established database engine, without interacting with the command layer of the established database engine. In such manner, the system resources of the server maintaining the established database engine are not overly impacted. Furthermore, the database commands may be submitted to the alternate database engine in the format of the established database engine, which in turn translates such commands to a native format, thereby allowing users to operate in a command environment with which they are already familiar.
A database command may be evaluated by the alternate database engine to determine system resources that will be impacted by a database command. For example, in a case where the database command is a query, the parameters of the query may be compared to historical or estimated performance data related to similar queries in order to estimate the impact on system usage. Particular parameters used for such evaluation are provided in exemplary fashion further below.
In a particular example, it may be desired to selectively intercept queries and process them through an available alternate database engine, rather than an overly-impacted established database engine. Where a database command is found to be read-intensive, write-intensive, or read-write-intensive, the database command may be intercepted and processed by an alternate database engine having available system resources. Other, less-intensive database commands may be passed to the established database engine when desired.
The database command may be further evaluated by the alternate database engine to determine whether temporally-sensitive data is requested from an established database engine. If so, the alternate database engine may access transaction logs of the established database engine to determine whether further data responsive to a database command has been submitted to the first database engine. Access of the transaction log may be performed without interacting with the command layer of the established database engine. Certain data from the transaction log may then be provided to the user in response to the database command, thereby ensuring accuracy of such generated results.
The alternate database engine of the present invention is contemplated to be fully compatible with, and may incorporate, the query optimization systems described in the applicant's co-pending U.S. patent application Ser. No. 10/034,885 entitled “METHOD AND APPARATUS FOR SCREENING DATABASE QUERIES PRIOR TO SUBMISSION TO A DATABASE” filed on Dec. 26, 2001, the entirety of which is incorporated herein by reference. The query optimization may be used in conjunction with the processes 700 and 800 described below with respect to
Referring now to
Turning now to
Computer network 100 may be an Internet-based network such as the World Wide Web, a local area network (LAN), a wide-area network (WAN), an intranet environment, an extranet environment, a fiber optic network, or any other type of wired, wireless, or hybrid computer networks.
User terminals 110-114 may each be any type of computing device, such as a personal computer, a workstation, a network terminal, a hand-held remote access device, a personal digital assistant (PDA) or any other device that can accomplish two-way electronic communication over the network 100. Users may run a web browser or the like on user terminal 110-114 to communicate with the server 102 over the Internet. The alternate database engine may be a maintained on a single server or group of distributed servers. The established database engine may be maintained on server 104 in conjunction with a network listening device 106 for receiving submitted queries. In a UNIX environment, the server 104 may be in further communication with other UNIX processing devices 108 that maintain database files and the like utilized by the server 104. The server 104 may store database management software, relational database tables for stored databases, index files for stored databases, and the like, the functions of which are readily known to one of ordinary skill in the art.
Further specific functions and operations of user terminals 110-114, alternate database server 102, and established database server 104 are discussed further below.
A query optimization system of the present invention is operative to intercept an individual query containing search parameters and logical arguments, and dynamically process the same on a query-by-query basis to determine its projected impact on system resources of a database engine that will process the query. Groups of such queries may be intercepted and evaluated in this manner. The resources to be evaluated may include: (i) a number of relational databases to be utilized in fulfilling the query, (ii) a size of the data fields and number of rows and/or columns to be searched for the query, (iii) an availability of hardware resources (such as processing time, memory, input/output transfer rates and disk space usage) of a system maintaining the database, (iv) a number of relational database tables to be employed for the query, (v) a limitation to be imposed on a size of a query result set, a number of rows and/or columns of data to be returned in a query result set, (vi) a cost of a previously-stored query with similar parameters and (vii) a number of function calls employed by the query.
Individual query parameters may be evaluated during the screening process performed by the present system. For example, query parameters, such as search terms and logical arguments, may be in a structured query language (SQL) format, or other similar database query formats. The query parameters may be optimized by available third-party query optimization tools known to those of ordinary skill in the art. When multiple tools are available, the system of the present invention may select one of such tools for performing query optimization, based on historical performance of the tools or by intended performance improvements of the tools.
The user rights of the user submitting the query may also be evaluated by the present system. The user rights may include an assigned accessibility right of a user, based on a class or category of a user. In addition, user rights may be based on historical system resource requirements of the user's previous queries, and further, upon the historical scores of the user's previously evaluated queries.
In various embodiments of the present invention, all such evaluations described above must take place prior to submission of the query to the database engine. In some embodiments, the query is submitted by a user terminal to a database engine, and intercepted and analyzed by a separate screening server prior to receipt by the database engine. In this manner, the screening server may save utilization of the system resources of the database engine by first evaluating the query.
Queries that are intercepted and screened in any or all of these manners may be assigned a final impact rating. The rating may be determined, for example, by identifying the various system resources that may be impacted impacted, assigning a weight to each impacted resource, and generating a score reflective of the results. Other useful weighted computational models may also be used. The generated rating is then compared to one or more threshold values set by a database administrator, determined by an analysis of available system resources, or the like.
If the rating surpasses the threshold value, the query may be rejected. Alternatively, the screening server may negotiate or assign a limited result set to be provided in response to the query. This limitation is then communicated to the database engine upon submission of the query. If, on the other hand, the rating does not surpass the threshold value, the query may be submitted to the database engine for processing. The result sets generated by the database engine in response to the query may then be communicated to the user by either the database engine or the screening server. In the latter case, the query parameters may nonetheless be optimized by the previously described third-party optimization tools prior to submission to the database engine.
In various embodiments, the system of the present invention can optionally prioritize and queue queries for the database engine based on the priority of the query or the user submitting the query. The system may further pause processing of lower priority queries so that higher priority queries may be processed and/or completed first.
Other operative network configurations for network 100 are readily contemplated to be employed by the present invention.
Turning now to
The primary component of the alternate database server 102 is a central processing unit (CPU) or microprocessor 500, which may be any commonly available microprocessor, such as the SunSPARC family of processors manufactured by SUN MICROSYSTEMS. The CPU 500 may be operatively connected to further exemplary components, such as random access memory (RAM) 502, read-only memory (ROM) 504, a clock 506, input/output devices such as communication port(s) 508, and a memory 510. The memory 510, in turn, may store one or more application and operating system programs, such as user rights assessment processing instructions 512, system performance measurement processing instructions 514, command interpretation processing instructions 516 and alternate database engine process instructions 518.
The memory 510 may further store various system-based database files, used by the server 104 to evaluate and process data commands. Such database files include a user rights table 520 for storing database access rights of a plurality of users, a system performance management table 522 for determining database command impact against parameters stored therein, a language command reference table 524 for converting database commands between various supported formats, a data format parameters table 526 for storing format parameters of stored data and a user command override parameter table 528 used to store any user-specific customizations to language translation processing.
The CPU 500 operates in conjunction with RAM 502 and ROM 504 in a manner well known in the art. The RAM 502 may be a suitable number of Single In-line Memory Module (SIMM) chips having a storage capacity (typically measured in kilobytes or megabytes) sufficient to store and transfer, inter alia, processing instructions utilized by the CPU 500, that in turn may be may be received from the application programs 512-518. The ROM 504 may be any permanent, non-rewritable memory medium capable of storing and transferring, inter alia, processing instructions performed by the CPU 500 during a start-up routine of the alternate database server 102.
The clock 506 may be an on-board component of the CPU 50 which dictates a clock speed (typically measured in MHz) at which the CPU 500 performs and synchronizes, inter alia, communication between the internal components of the alternate database server 102.
The communication port(s) 508 may be one or more commonly known devices used for receiving system operator inputs, network data, and the like and transmitting outputs resulting therefrom. Accordingly, exemplary input devices may include a keyboard, a mouse, a voice recognition unit and the like for receiving inputs from an operator of the alternate database server 102. Additionally, output devices may include any commonly known devices used to present data to an operator of the alternate database server 102 or to transmit data over the computer network 100, described further below. Accordingly, suitable output devices may include a display, a printer and a voice synthesizer connected to a speaker. Other output devices may include a telephonic or network connection device, such as a communication port, a telephone modem, a cable modem, a T-1, T-2 or T-3 connection, a digital subscriber line or a network card, or any other device for communicating data to and from other computing devices over the computer network 100. In an environment in which high numbers of users are involved, it is preferred that the communications devices used as communication ports 508 have capacity to handle high bandwidth traffic in order to accommodate communications with a large number of users.
The memory 510 may be an internal or external large capacity device for storing computer processing instructions, computer-readable data, and the like. The storage capacity of the memory 510 is typically measured in megabytes or gigabytes. Accordingly, the memory 510 may be one or more hard disk drives and/or any other computer readable medium that may be encoded with processing instructions in a read-only or read-write format. Further functions of and available devices for memory 510 will be apparent.
In any type of network environment, the application programs may also include a database management program, of the type commonly manufactured by ORACLE CORP. to store and maintain various databases as described below at the alternate database server 102. For example, the database programs may be used to maintain the user rights table 520, the system performance management table 522, the language command reference table 524, the data format parameters table 526 and the user command override parameter table 528. Further or fewer databases may be used in certain embodiments of the present invention. It should be readily appreciated that any number of database files presented herein may be configured into any number of relational databases. In addition, configurations other than database formats may be used to store the data maintained in these exemplary databases.
Turning now to
Other software layers, such as network communication layers and the like (not shown), may also readily be employed to implement the present invention.
FIGS. 7A-7F3 depict a general process 700 for intercepting and executing database commands performed by the alternate database engine 500 of
The alternate database engine receives an identification of the user and accesses the user rights table 520 to determine the user privileges of the user (step 703). The user rights table may store, for example, an identification of the user and user access rights. In various embodiments, it is possible to allow or disallow access to users who are not listed in the user rights table 520.
Based on the user rights table information for the user, the alternate database engine then determines the user's threshold values for query processing (step 703), further determines whether any time of day restrictions apply to the user (step 704), and also determine the user's query rights (step 705).
The alternate database engine then determines whether the user is an administrator (step 706). If so, the process continues to step 707 where the alternate database engine sets an administrator flag, otherwise, the process 700 continues to step 708 below.
At step 708, the alternate database engine determines whether the user is operating with statement-level exceptions or any command-level overrides intended to alter processing beyond default processing rules established by an administrator or the like. (step 708), If, so, step 709 is performed. Otherwise, the process 700 continues to step 710 below, described with respect to
The alternate database engine next sets a statement level exception flag (step 709). The alternate database engine then may set additional appropriate flags which are used later in the process to determine whether to reject, allow or edit a query submitted by the user, based on query parameters. This information may be determined from the access of the user rights table 520 described previously above, or in any other known manner.
Continuing now to
Continuing to step 713, the alternate database engine then scans the functional command tokens to identify impacted components of the alternate database server 102. Alternatively or in addition thereto, impacted components of the established database server 104 may be determined and analyzed in this process 700. The alternate database engine then determines a total number of relevant system components to measure (step 714) and further determines whether performance has been measured for all relevant components (step 715). If so, the process 700 continues to step 720 of
The alternate database engine, at step 716, retrieves a next relevant component to measure and determines whether a third-party tool is required to measure the next system component (step 717). If so, the process 700 continues to step 718. Otherwise, the process 700 continues to step 719 below.
At step 718, the alternate database server measures the current operating performance of system component using third party tools, after which the process returns to step 715 above.
At step 719, the alternate database engine measures the current operating performance of system component using native system (step 719), after which the process 700 returns to step 715 above.
Continuing now to
At step 722, the alternate database engine determines whether any such limits are relevant to the input command by comparing tokens to the stored limit parameters (step 722). If the limits are relevant, the process continues to step 723. Otherwise, the process 700 continues to step 724 further below.
The alternate database engine may then set limit and threshold flags for the relevant resources in accordance with the limits set by the administrator (step 723). The alternate database engine next retrieves the operating parameters from user rights table 520 (step 724).
The alternate database engine next determines if the administrator set limits on operating parameters for the user submitting the query based on the stored user rights (step 725). If so, the process 700 continues to step 726. If not, the process continues to step 728 further below.
At step 726, the alternate database engine determines whether the established limits are relevant to the particular query. If so, the process 700 continues to step 727. if not, the process 700 continues from step 728 below.
The alternate database then set limit and threshold flags as appropriate (step 727). At step 728, the alternate database engine determines whether the established limits prevent use of the alternate database engine to process the query. If so, the process continues to step 729. If not, the process 700 continues to step 730 described further below with respect to
At step 729, the alternate database engine processes the query conventionally by passing it to the established database engine, due to the impact the query would have on the resources of the alternate database server 102.
At step 732, in order to determine if the given user has customized how the alternate database engine should handle specific language commands, the alternate database engine composes a string of directly supported command functions corresponding to the query, and looks up the command in the user command override table 528 (step 733). If a user override command is set for the query (step 734), the process 700 continues to step 735. Otherwise, the process 700 continues to step 736 of
At step 735, the query is processed conventionally by passing it to the command layer of the established database engine, after which process 700 ends.
Continuing now to FIGS. 7F1-7F3, the alternate database engine determines whether the query is a SQL select (or functionally equivalent) statement (step 742) If so, the process 700 continues to step 743. Otherwise, the process 700 continues to step 749 further below.
At step 743, a read only flag is set by the alternate database engine. Tokens are parsed from the select statement (step 744) and the alternate database engine then determines whether the query calls for temporally sensitive data by, for example, comparing the tokens to a list of heavily updated data tables (step 745). If the query is temporally-sensitive (step 746), the process 700 continues to step 747. Otherwise, the process 700 continues on to step 748 described further below.
At step 747, the alternate database engine sets a transaction log access flag, decomposes the query to a file access sequence (step 748) and initiates the binary file access and translation process 800, described below with respect to
Write commands may unduly impact system performance of the alternate or established database servers. Accordingly, any write commands, such as insert commands and delete commands are evaluated.
At step 749, the alternate database engine next determines if the query includes an insert statement. If so, the process continues to step 752. If not, the process continues at step 750 further below.
At step 750, the alternate database engine next determines if the query includes a delete statement. If so, the process continues to step 752. If not, the process continues at step 751 below.
At step 751, the alternate database engine next determines if the query includes an update statement. If so, the process 700 continues to step 752. If not, the process continues at step 755, described further below.
At step 752, the alternate database engine sets a read-write flag and determines whether the alternate database engine can obtain read-write control over data filein step 753. If so, the process continues to step 754. Otherwise, the process continues to step 756 below.
At step 754, the alternate database engine decomposes the query to a file access sequence, after which the binary file access process 800, described with respect to
Returning to 755, the alternate database engine determines whether the query is a proprietary data-definition language command (for example, a “create table” command, or an “alter table” command). If so, the process 700 continues to step 756, and if not, the process 700 ends.
At step 756, the alternate database engine determines whether a corresponding translated query is available in the alternate database engine. If so, the alternate database engine initiates the binary file access process 800 of
The process 800 begins by determining whether a read-only flag is set (step 802). If so, the process 800 continues to step 804. Otherwise, the process continues to step 809, described further below.
Next, the alternate database engine determines whether a temporally-sensitive data flag has been set (step 804). If so, the process 800 continues to step 806 below. If not, the process 800 continues on to step 808.
The alternate database engine opens transaction log files of the established database server for read only access (step 806) and further opens data and index files for the established database engine for read only access (step 808). The data files are then scanned (step 810) to interpret the data schema of stored data, the alternate database engine further scans index files and interprets data statistics based on the same (step 812). From this information, a file access sequence is processed (step 814).
Continuing now to
At step 818 a query plan is prepared. At step 820, the query plan may be optimized using the methods described previously, after which the process 800 continues to step 826, described below with respect to
At step 822, a transactional transformation plan is prepared, whereby data that is intended to be determined to be written to the data file is condensed to a series of specific Insert/Update/or Delete command steps. These Insert/Update/or Delete command steps are then first stored in a transaction log file (and then later applied transactionally) to help ensure data integrity. The alternate database server next updates its transactional log through alternate database transaction log 614 (step 824).
From either step 820 or 824 above, the process 800 continues to step 826 where the alternate database engine determines whether a result set can be generated and outputted to the user in response to the query. If so, the process continues to step 828. Otherwise, the process continues to step 834 described further below.
At step 828, the alternate database engine looks up data format parameters from the alternate database transaction log 614, formats the results in a manner similar to results output by the alternate database engine (step 830), and transmits the results to user (step 832).
If a result can not be generated, due to an error in the query or the lack of responsive data in the established database engine, the alternate database engine determines whether a message regarding the failed query is to be output (step 834), if not, the process 800 ends. Otherwise, the process 800 continues to step 836 where the alternate database engine retrieves the message format employed by the established database engine. The message is placed in the appropriate format (step 838) and which is then transmitted to the to the user (step 840), the process 800 then ends.
While the processes 700 and 800 have been described above with respect to a single user terminal, a single alternate database server and a single established database engine, it is contemplated that any number of such servers may be employed in an operative embodiment of the present invention, as particularly illustrated in the exemplary network configurations of
While the data command submitted by a user has been described herein as a database query, other database commands, such as write commands, read/write commands, indexing commands and the like may readily be employed and processed by the system of the present invention.
Although the invention has been described in detail in the foregoing embodiments, it is to be understood that the descriptions have been provided for purposes of illustration only and that other variations both in form and detail can be made thereupon by those skilled in the art without departing from the spirit and scope of the invention, which is defined solely by the appended claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US6032143 *||Dec 4, 1998||Feb 29, 2000||International Business Machines Corporation||Evaluation of existential and universal subquery in a relational database management system for increased efficiency|
|US6128279||Oct 1, 1998||Oct 3, 2000||Web Balance, Inc.||System for balancing loads among network servers|
|US6151601||Nov 12, 1997||Nov 21, 2000||Ncr Corporation||Computer architecture and method for collecting, analyzing and/or transforming internet and/or electronic commerce data for storage into a data storage area|
|US6226649 *||Sep 3, 1999||May 1, 2001||Oracle Corporation||Apparatus and method for transparent access of foreign databases in a heterogeneous database system|
|US6438741 *||Mar 31, 1999||Aug 20, 2002||Compaq Computer Corporation||System and method for eliminating compile time explosion in a top down rule based system using selective sampling|
|US6567806||Sep 20, 2000||May 20, 2003||Hitachi, Ltd.||System and method for implementing hash-based load-balancing query processing in a multiprocessor database system|
|US6820073||Mar 20, 2002||Nov 16, 2004||Microstrategy Inc.||System and method for multiple pass cooperative processing|
|US6886035||May 13, 2002||Apr 26, 2005||Hewlett-Packard Development Company, L.P.||Dynamic load balancing of a network of client and server computer|
|US20020116457||Feb 21, 2002||Aug 22, 2002||John Eshleman||Systems and methods for managing distributed database resources|
|US20020184219||May 31, 2001||Dec 5, 2002||International Business Machines Corporation||System, method, and computer program product for reformatting non-XML data for use with internet based systems|
|US20030065648||Oct 3, 2001||Apr 3, 2003||International Business Machines Corporation||Reduce database monitor workload by employing predictive query threshold|
|US20030101238||Jun 15, 2001||May 29, 2003||Vertical Computer Systems, Inc.||Web-based collaborative data collection system|
|US20030182276||Feb 24, 2003||Sep 25, 2003||International Business Machines Corporation||Method, system, and program for performance tuning a database query|
|US20050114352||Dec 27, 2004||May 26, 2005||Microsoft Corporation||Method and system for detecting a dead server|
|1||Hongjun Lu and Kian-Lee Tan, Dynamic and Load-Balanced Task-Oriented Database Query Processing in Parallel Systems, Dept. of Information Systems and Computer Science, National University of Singapore, ACM, 1992, pp. 357-372.|
|U.S. Classification||707/758, 707/770|
|Cooperative Classification||Y10S707/99932, Y10S707/99933, G06F17/30477, G06F17/30427|
|European Classification||G06F17/30S4P2, G06F17/30S4P4|
|Dec 22, 2010||AS||Assignment|
Owner name: HARRISON AGATE, LLC, NEVADA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OMNYSCIENT TECHNOLOGY LLC;REEL/FRAME:025550/0159
Effective date: 20060213
|Apr 17, 2012||CC||Certificate of correction|
|Jul 5, 2013||AS||Assignment|
Owner name: INTELLECTUAL VENTURES I LLC, DELAWARE
Effective date: 20130705
Free format text: MERGER;ASSIGNOR:HARRISON AGATE LLC;REEL/FRAME:030744/0370
|Apr 24, 2014||FPAY||Fee payment|
Year of fee payment: 8