US20030004774A1 - Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services - Google Patents

Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services Download PDF

Info

Publication number
US20030004774A1
US20030004774A1 US10/113,662 US11366202A US2003004774A1 US 20030004774 A1 US20030004774 A1 US 20030004774A1 US 11366202 A US11366202 A US 11366202A US 2003004774 A1 US2003004774 A1 US 2003004774A1
Authority
US
United States
Prior art keywords
service
enterprise
avatar
services
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/113,662
Inventor
William Greene
Matthew Pierret
Christine Coffey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
EKMK LLC
Original Assignee
Worldcom Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Worldcom Inc filed Critical Worldcom Inc
Priority to US10/113,691 priority Critical patent/US7401131B2/en
Priority to US10/113,662 priority patent/US20030004774A1/en
Priority to US10/112,373 priority patent/US6868441B2/en
Assigned to WORLDCOM, INC. reassignment WORLDCOM, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: COFFEY, CHRISTINE, GREENE, WILLIAM S., PIERRET, MATTHEW C.
Publication of US20030004774A1 publication Critical patent/US20030004774A1/en
Assigned to MCI, INC. reassignment MCI, INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: WORLDCOM, INC.
Assigned to MCI, LLC reassignment MCI, LLC MERGER (SEE DOCUMENT FOR DETAILS). Assignors: MCI, INC.
Assigned to VERIZON BUSINESS GLOBAL LLC reassignment VERIZON BUSINESS GLOBAL LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: MCI, LLC
Priority to US13/100,624 priority patent/US8843386B2/en
Assigned to VERIZON PATENT AND LICENSING INC. reassignment VERIZON PATENT AND LICENSING INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VERIZON BUSINESS GLOBAL LLC
Assigned to EKMK LIMITED LIABILITY COMPANY reassignment EKMK LIMITED LIABILITY COMPANY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VERIZON PATENT AND LICENSING INC.
Priority to US15/040,700 priority patent/US20160241565A1/en
Assigned to VERIZON PATENT AND LICENSING INC. reassignment VERIZON PATENT AND LICENSING INC. CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE PREVIOUSLY RECORDED AT REEL: 032734 FRAME: 0502. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT. Assignors: VERIZON BUSINESS GLOBAL LLC
Granted legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group
    • G06Q10/063112Skill-based matching of a person or a group to a task
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06314Calendaring for a resource
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06398Performance of employee with respect to a job function
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/1093Calendar-based scheduling for persons or groups
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0894Policy-based network configuration management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5058Service discovery by the service manager
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4553Object oriented directories, e.g. common object request broker architecture [CORBA] name server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0233Object-oriented techniques, for representation of network management data, e.g. common object request broker architecture [CORBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0659Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities
    • H04L41/0661Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities by reconfiguring faulty entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0843Configuration by using pre-existing information, e.g. using templates or copying from other elements based on generic templates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/085Retrieval of network configuration; Tracking network configuration history
    • H04L41/0853Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
    • H04L41/0856Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information by backing up or archiving configuration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5041Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing

Definitions

  • the present invention relates to providing ubiquitous access to data resources even where such data resources are maintained in separate stores and by entirely separate processes.
  • the operation of a modern large business enterprise relies heavily upon the processing, storing, communicating and manipulation of vast amounts of information. This is particularly true of a large service company, such as a global telecommunications company.
  • the types of information vary widely and may include, for example, customer data, employee data, account information, traffic and revenue statistics, and engineering data such as network topology and provisioning data.
  • the vital information that supports a large enterprise may even include the software instructions that drive various elements and systems in a telecommunications network.
  • Some information is relatively static, such as the name or address of a customer, whereas other forms of information, such as the momentary operational status of a network element, can change abruptly and must be communicated as quickly as possible to points where the information is needed.
  • a caching approach can be used wherein local data stores are used to partially duplicate only those portions of the overall data that are needed locally.
  • the local cache selectively downloads data only on an as-needed basis.
  • the cache will accumulate a self-forming subset of the overall data. Once loaded, a particular data item in the local cache may be held indefinitely or may be discarded after a time according to a caching algorithm.
  • Schemes have also been deployed for ensuring that data in the cache is kept current as changes occur in the corresponding data in the master data store.
  • the present invention is directed to a method and system whereby data entities, even in a highly distributed and partitioned environment, may be readily accessed by client applications across an enterprise.
  • a new approach is required in the context of a partitioned body of data wherein separate data stores are maintained by separate computing processes and separate business functions and are usually physically separated.
  • data resides in a single space, such as data tables in a relational database, it is easy to represent relationships among data elements.
  • a first table may contain employee information and each record might have as separate fields, an employee number, a social security number, a hire date, and a salary grade.
  • a third table may have social security numbers mapped to an employee's name and home address.
  • associations among data entities may also be formed and maintained externally without the associations being imbedded in the objects themselves.
  • Externalized associations have been proposed whereby a first data object and a second data object may be associated by an external entity which maintains a reference to both objects and has a description of how the objects are related. This implies the use of an external association engine which must be involved whenever a computing task involves cooperation between the first data object and the second data object.
  • the first and second objects need not “know” about one another nor contain any provisions for pointing to one another. Indeed, the association among the first and second data objects may occur well after the objects have been designed and implemented. Associations may later be formed as needed, as in response to requirements that were not apparent at the time the data objects were initially implemented. Of course, this enables tremendous flexibility in the growth of a distributed computing environment.
  • data objects may be highly partitioned.
  • an application may need to draw upon data and functionality from many sources that are separately maintained and often logically or geographically remote from one another.
  • a single data object offering some particular useful functionality or a particular view of the global data, may itself be partitioned and distributed among many sources.
  • highly-partitioned data there is a desire to support the creation of such composite objects which transcend being located in any one data store.
  • an externalized association engine may at first be contemplated to fulfill this need, the aforementioned problems with centralization make the externalized association engine impractical for large scale implementations.
  • the externalized association engine must support the interaction among objects, including the assembly of composite partitioned objects, for the entire computing environment. It is foreseen that even attempts to moderately distribute the function of a unified, externalized association engine will introduce difficulties and invite the potential for catastrophic failures.
  • a further advantage of the present invention is that, due to the manner in which associations are made and data objects are found, associations may transcend simple object-object linkages. Associations may be defined by “fuzzy” criteria and may cause useful information to be retrieved beyond what a requesting application would have known to explicitly ask for.
  • association forming entities are a) maintained as objects in a like manner to the data objects being associated, and are b) themselves partitioned objects comprising two or more association fragments, each association fragment being mostly concerned with the interfaces to a particular data object participating in the association.
  • each association fragment affiliated with a particular data object is stored in a location that enhances the ease of interaction between the association fragment and the data object. For example, where a first data object and second data object are maintained in data stores at some distance from one another, physically or logically, then a first association fragment will be located with or near to the first data object and a second association fragment will be located with or near the second data object, at least within the same partition. This arrangement may be preferable because the volume of interaction between a data object and its respective association fragment may far outweigh the interaction needed among the two association fragments.
  • This arrangement may also be preferable as the volume of interaction between a client application and both the data object and respective association fragment may exceed the interaction needed among the two association fragments. Some interactions will employ only one of the association fragments with the net result being a reduction in communications requirements and an improvement in performance.
  • the present invention further provides for defining logical domains which are arbitrary and entirely orthogonal to partitions.
  • FIG. 1A depicts a point-to-point architecture where applications message one another directly according to prior art messaging techniques
  • FIG. 2 is a representative diagram of an application
  • FIG. 3 is a logical diagram of an enterprise network containing CORBA-enabled processes distributed in both domain 1 and domain 2 ;
  • FIG. 4 is a diagram representing independent systems' stovepipe relationships as might be expected in a telecommunications enterprise according to the prior art
  • FIG. 5 is a diagram of the NewWave network management concept in accordance with an exemplary embodiment of the present invention.
  • FIG. 6 is a diagram illustrating the concept of many, small generic servers in many geographic locations distributed for enterprise use in accordance with an exemplary embodiment of the present invention
  • FIG. 7 is a diagram illustrating various typical configurations of the small servers running various operating systems in which VM containers are running on host servers in accordance with an exemplary embodiment of the present invention
  • FIG. 8 is a conceptual diagram of distributive concepts for managing an ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention.
  • FIG. 9 is a diagram of service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention.
  • FIG. 10A is a diagram depicting launching and registering service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention
  • FIG. 10B is a diagram depicting finding and implementing a local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention
  • FIG. 10C is a diagram depicting finding and implementing a non-local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention
  • FIG. 11A is a flowchart depicting a process for launching and registering service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention
  • FIG. 11B is a flowchart depicting a process for finding and implementing a local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention
  • FIG. 11C is a flowchart depicting a process for finding and implementing a non-local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention
  • FIG. 12A is a flowchart depicting the process employed by the registrar for registering services in accordance with an exemplary embodiment of the present invention
  • FIG. 12B is a flowchart depicting the process for enterprise leasing in accordance with an exemplary embodiment of the present invention.
  • FIG. 12C is a flowchart depicting a process employed by the registrar for looking up a service in accordance with an exemplary embodiment of the present invention
  • FIGS. 13 A- 13 B are flowcharts depicting the transaction process employed by the transaction manager is illustrated in accordance with a preferred embodiment of the present invention.
  • FIG. 14 is a diagram depicting a service failure and re-homing the service to a different server and further depicting self-healing a proxy reference using a smart proxy in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention, and further illustrates self-healing a proxy reference using a smart proxy;
  • FIG. 15A is a flowchart depicting a service restarting process in a global ecosystem of interrelated services in accordance with the present invention
  • FIG. 15B is a flowchart depicting a process se for self-healing stale references using a smart proxy in accordance with the present invention
  • FIG. 16 is a diagram depicting a conceptual realization of the DataBus two-tier infrastructure concept for mediating data transactions and an enterprise-wide data persistence layer which allows clients to access shared enterprise data in accordance with an exemplary embodiment of the present invention
  • FIG. 17A is a traditional representation of an E-R diagram
  • FIG. 17B is a representation of nodes and arcs of the E-R diagram being mapped onto entity engine processes and association engine processes;
  • FIG. 18 is a diagram illustrating three entities, entity A 1802 , entity B 1804 and entity C 1806 partitioned in accordance with an exemplary embodiment of the present invention
  • FIG. 19 is a diagram illustrating three container-database partition pair in accordance with an exemplary embodiment of the present invention.
  • FIG. 20 is a diagram depicting DataBus components necessary for creating an entity instance in accordance with an exemplary embodiment of the present invention.
  • FIG. 21 is a flowchart depicting a process for creating an entity instance in accordance with an exemplary embodiment of the present invention.
  • FIG. 22 is a diagram showing a read/write copy of the entity instance being streamed directly to the client in accordance with an exemplary embodiment of the present invention
  • FIG. 23 show the cache server approach where a copy of the entity instance is streamed to a cache server rather than the copy being directly steamed to the client in accordance with an exemplary embodiment of the present invention
  • FIG. 24 is a diagram showing the event notification approach where the client is using only read-only copies of the entity instance and receiving change notifications whenever an update is received in accordance with an exemplary embodiment of the present invention
  • FIG. 25 depicts the client using a read/write copy that must stay in sync with a master copy in order for updates to be accepted in accordance with an exemplary embodiment of the present invention
  • FIG. 26 is a diagram depicting DataBus components necessary for performing the multi-hop find process in accordance with an exemplary embodiment of the present invention.
  • FIG. 27 is a flowchart depicting a multi-hop find process in accordance with exemplary of the present invention.
  • FIG. 28 is a diagram representing a logical domain boundary defined from partitions in each of several entities in accordance with one embodiment of the present invention.
  • FIG. 29 is a diagram of NW service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention.
  • FIG. 30 is a flowchart depicting a process for finding entity instances that are associated with an instance in accordance with exemplary of the present invention
  • FIG. 31 is a diagram showing external central association engine 3102 which consists of a plurality of link records which describe associative relationships between Customer entity instances and Account entity instances;
  • FIG. 32 is a diagram of NW service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention.
  • FIG. 33 is a flowchart depicting a process for getting all accounts instances that are associated with an identified customer instance in accordance with an exemplary embodiment of the present invention.
  • FIG. 34 is a flowchart depicting a process for getting all accounts instances that are associated with an identified customer instance using smart proxies in accordance with an exemplary embodiment of the present invention
  • FIG. 35 is a diagram of the MOC and associated NewWave service necessary for collecting events into policy-based work documents, and then directly routing work to the best currently available operations staff that is automatically assembled based on the individual staff members' aptitude for particular tasks in a process flow in accordance with an exemplary embodiment of the present invention
  • FIG. 36 is a functional diagram of the MOC depicting interactions between key MOC components interact in accordance with an exemplary embodiment of the present invention
  • FIG. 37 is a diagram of an assessor for assessing events based on organizational rules in accordance with an exemplary embodiment of the present invention.
  • FIG. 38 is a diagram illustrating a basic design of an aggregator in accordance with an exemplary embodiment of the present invention.
  • FIG. 39 is a diagram of a simplified version of a state machine in accordance with an exemplary embodiment of the present invention.
  • FIG. 40 which depicts a user avatar lookup in accordance with an exemplary embodiment of the present invention.
  • the present invention relates to data processing. More particularly, the present invention relates to the management of information technologies.
  • An enterprise answer, or a solution to an enterprise level problem might require that an enterprise user access several, or even all departmental stovepipe applications for the departmental perspective view in order to get a “piece” of the entire enterprise level solution. It would then be left to the user to coalesce the departmental answers from the respective stovepipe applications into a unified enterprise level solution by integrating the disparate departmental perspective answers into an enterprise level solution.
  • umbra stovepipe applications include inventory control applications and sales tracking applications that exist within a sales organization; reservoir management applications, downhole logging applications and production and field control applications that exist within an oil production company; admissions and discharge applications, medical record keeping applications and laboratory applications that exist within a healthcare provider; and even legal instrument-drafting applications, docketing applications and litigation toolkit applications that exist within a law firm.
  • These applications came about when traditional mainframe systems failed to solve individual departmental problems or, more likely, were not flexible enough to solve the problems in a timely fashion. Because of this failure, a “departmentalized” solution ensued and critical, mission-critical departments implemented their own systems. These systems owned, maintained and protected the applications, hardware and resources necessary to efficiently perform their missions, resulting in an enterprise made up of independent “islands” of special purpose applications, hardware and resources.
  • Traditional systems are applications that exist as stovepipes, such as departmental or vendor stovepipes, in a centralized enterprise environment.
  • Mainframe-based systems make up a majority of traditional systems, while minicomputers and large UNIX-based systems might also be correctly referred to as traditional systems.
  • the characteristics that define the traditional system include centralized processing, unshared resources and terminal-based access.
  • Traditional systems typically support a large user and processing load on both database and business processes that exist together within the same environment. While these systems may support thousands of users concurrently accessing the same application, sharing processes and resources between applications is uncommon. Moreover, sharing processes and resources to applications outside the system is unheard of; however, simultaneous access to an application across a single platform is a powerful incentive for businesses.
  • applications serve two primary purposes: (1) they perform routine business processes that support a business function; and (2) they access, process, and/or display data.
  • applications can be organized by the functions they perform and the data they process.
  • EAI in its most idealistic form, involves the unrestricted sharing of business processes throughout an enterprise's networked applications or data sources.
  • Software programs in areas such as inventory control, human resources, sales automation and database management which were custom built in the technology of the day were designed to run independently for addressing a specific need and do not share. Many times the applications were implemented as proprietary systems, with no interaction between the systems and thus did not share.
  • EAI's popularity can be attributed, in part, to the need for maintaining the older stovepipe applications, while simultaneously integrating them within a new enterprise application infrastructure.
  • enterprises grow and recognize the need for their information and applications to have the ability to be transferred across and shared between systems, companies invest in EAI in order to streamline processes and keep all the elements of the enterprise interconnected.
  • EAI The focus of EAI is primarily directed into four major categories: database linking, application linking, data warehousing and virtual systems approach.
  • Database linking involves implementing EAIs between departmental databases for sharing information with each other and duplicating information as needed based on a set of rules.
  • Application linking involves the enterprise sharing business processes and data between two or more applications.
  • Data warehousing involves data being extracted from a variety of resources (data sources) and compiled in a specific database for analysis. This unified collection of data better supports management decision making by allowing enterprise users to view resource data from a variety of stovepipes from an enterprise perspective.
  • Data warehouses contain a wide variety of data that present a coherent picture of business conditions for the enterprise at a single point in time.
  • the final category of EAI is a common virtual system which involves using EAI in all aspects of enterprise computing, tying applications, resources and data together so that they appear as a unified application to a client.
  • EAI is often referred to as “middleware” because EAI software functions as a conversion or translation layer. It is also a consolidator and integrator. Custom-programmed middleware solutions have been developed for decades to enable one application to communicate with another that either runs on a different platform or comes from a different vendor or both. Middleware is software that translates commands or data between different software programs.
  • EAI exists in two popular architectures, point-to-point and hub and spoke.
  • point-to-point architectures are referred to as messaging EAIs
  • hub and spoke architectures are referred to as middleware EAIs.
  • Both variants allow existing enterprise applications to supply existing business processes and resources to other enterprise applications.
  • point-to-point applications directly access data and resource data from other applications.
  • FIG. 1A depicts a point-to-point architecture where applications 102 - 116 message one another directly.
  • Each enterprise application must be modified with a messaging agent, a queue and a relationship application table for listing other enterprise applications and the data and resources that they own.
  • Java applications may require further modification with a multi-valued attribute, a “codebase,” for storing the location of the object's class definition.
  • An application interacts with the messaging agent whenever the application determines that it needs access to data or resources that it does not own.
  • the messaging agent accesses the relationship table for the location of an application that owns the needed resource.
  • An initial request message is sent to the application that owns the resource for specific resource data.
  • the requestor application e.g., temporary use of the resource, updating the resource, etc.
  • the resource owner application might be busy at the time the request is received, so the request is queued until the application is free to process the request.
  • the recipient application might also be too busy to process the incoming message thread.
  • the resource data in the response is also queued in anticipation of a processor freeing up and the process thread needing the resource being executed.
  • the thread is executed in accordance with the application's processes.
  • the messaging agent is responsible for the message and data integrity that it sends and/or receives, so if the transaction is not completed, the messaging agent must repeat the transaction.
  • each application requires significant modifications for point-to-point EAI to be effective. If an enterprise application is upgraded, modified or even migrated to a different physical location, it and any application that it relies on, or that relies on it, must also be modified for subsequent point-to-point messaging transactions to be successful. In addition, each individual enterprise stovepipe application is a potential bottleneck as the individual applications are usually not scalable for messaging responses. Finally, inter-application messages can either be in the form of some proprietary messaging protocol or may, instead, take advantage of existing messaging protocols and messaging specification. If the enterprise utilizes proprietary messaging protocols, the protocol specification must be formalized within the enterprise and maintained and a corresponding message transport devised. If, on the other hand, existing protocols are to be used, then the enterprise's existing message transports that utilize those protocols will be called on for handling the added burden of the point-to-point messages.
  • the second EAI architecture improves on existing point-to-point middleware by utilizing a message broker that manages communications among all enterprise stovepipe applications.
  • the message broker communicates directly with each participating application and thus forms the “hub” of a hub and spoke messaging architecture.
  • Message-broker processing is a mixture of schema and content transformation, rules processing, message splitting and combining, as well as message routing. Once the processing is complete, the information is sent to any target system that needs to receive that information using whatever native format the target application can understand (e.g., eXtensible Markup Language (XML), IDoc, Java Message Service (JMS) message, proprietary, etc.).
  • XML eXtensible Markup Language
  • IDoc IDoc
  • JMS Java Message Service
  • FIG. 1B depicts a hub and spoke messaging architecture wherein messaging middleware 140 serves as a central point of communication between enterprise applications 122 - 136 for transferring messages between applications.
  • Hub and spoke architecture has the advantage that the participating applications require somewhat less custom programming because messaging middleware 140 acts as a messaging broker for providing an interface between stovepipe applications, thus allowing them to asynchronously send data back and forth to each other. Data sent by one application is stored in a middleware queue and then forwarded to a receiving application when that application becomes available to process it.
  • the messaging broker provides stovepipe applications with distribution rules for forwarding messages and formatting rules for reformatting data from a sending application's format to a receiving application's format.
  • a rules engine analyzes incoming messages and makes routing decisions, while a formatting engine converts the data into the structure required by the receiving application.
  • the messaging broker provides disparate stovepipe applications with a common message transport and queuing system, thereby relieving applications from the responsibility of ensuring that the data sent is properly received.
  • a messaging broker can be either a complete messaging system or software that works with existing messaging transports in order to add routing intelligence and data conversion capabilities.
  • the hub and spoke architecture represents a significant advancement over independent stovepipes and an improvement over point-to-point messaging
  • the hub-and-spoke EAI solution is resource-constrained because all the processing takes place on a single server.
  • the number of connected systems and the information traffic will saturate the available resources of the integration server (memory, processor, and disk) resulting in reduced performance. Bottlenecks can and do occur and scheduling can become problematic for enterprise applications.
  • the messaging broker may be busy and thus unavailable to pass the necessary resource data to the requesting application prior to the receiving application timing out. In that case, the application thread is held up waiting for the resource data to arrive and might in fact timeout prior to the messaging broker responding to the application. If a timeout occurs, the resource data remains queued until the application is again freed up.
  • Overloads on the messaging broker have led to the development of a “federated architecture” wherein the applications connect to a single integration server or hub statically and are able to exchange information with each other. This means that all information produced or consumed from a particular application is available only for processing within a particular hub.
  • each hub appears to the other hubs as connected applications, thus producing and consuming messages.
  • messages produced from a single application may process only on a single hub because they are statically bound to that hub.
  • This architecture does not allow hubs to share the message-processing load, or nor does it allow other hubs to process messages from applications that are not directly connected.
  • applications serve two primary purposes: (1) they perform routine business functions that support a business process; and (2) they access, process, and/or display data. At the highest level of abstraction, applications can then be organized by the functions they perform and the data they process.
  • a representative diagram of an application is depicted on FIG. 2 as any of applications 202 A- 202 N. Since an application is the building block of an information system, it can be expressed as a collection of software programs that execute user interface 204 A, business rules 206 A, and data access operations 208 A, all of which are necessary to execute a business process.
  • application 202 A consists of a plurality of services that perform these operations.
  • Services are any predefined, specialized results which are produced from specific software programs designed to perform explicit data processing operations when called upon. Services might be considered as either business logic services or infrastructure services.
  • Business application services are designed and developed to provide specific computational, input/output, or data access operations when called upon at execution time, while infrastructure services provide computer platform operating systems, database management systems, or network platforms for supporting business applications.
  • application 202 A uses business rules 206 A as a logical specification for the business' requirements.
  • Business rules 206 A define computational algorithms and operations to perform explicit data processing operations that are necessary to implement a business process.
  • FIG. 2 is a logical representation of another prior art mechanism utilizing the aforementioned messaging architecture for handling stovepipe applications.
  • Stovepipe applications 202 A-N are the defined logical layers that provide practical boundaries for physically segmenting the application into smaller, more manageable program segments. The interactions between logical layers of an application can be accomplished through messaging and middleware services as described above.
  • the logical layers of an application are defined as a user interface layer, a business logic layer and a data access layer.
  • the user interface layer of an application interacts directly with end-user input/output devices (e.g., Windows workstations or a printer/fax device).
  • end-user input/output devices e.g., Windows workstations or a printer/fax device.
  • the user interface layer is the most visible aspect of the business process supporting the end user. It encompasses a variety of operations, such as window or screen management, keyboard and mouse handling, end-user help functions, general input editing and data type validation, or formatting data for output to a laser printer or plotter device.
  • the business process (logic) layer of an application implements the particular requirements of a business process based on a set of business rules.
  • the business rules may be no more than developer guidelines, but more often are generic algorithms that can be tailored to a business' needs by the user selection of values for parametric constraint variables.
  • Typical operations at this layer consist of controlling the logical flow of interaction between the end user (via the user interface layer), access and manipulation of data or information (via the data access layer), and specific computational algorithms to be performed (via the business logic layer).
  • the data access of an application includes the operations needed to store, access and maintain data or information necessary to support a business process.
  • the data accessed within this layer can include both structured and unstructured formats, depending upon the application requirements.
  • a commercial relational database management (RDBMS), or proprietary file access system provides the services performed within this layer.
  • CORBA-enabled processes can be placed and run on the same machine or on any machine in a network enterprise differing from messaging middleware in that they cause processes (components/objects) to be executed in real-time rather than sending data.
  • Examples of these CORBA applications and other similar distributed object systems include System Object Model (SOM) and Distributed System Object Model (DSOM) from IBM Corporation, One New Orchard Road, Armonk, N.Y. 10504; or Component Object Model (COM) and Distributed Component Object Model (DCOM) from Microsoft Corporation, One Microsoft Way, Redmond, Wash. 98052.
  • SOM System Object Model
  • DSOM Distributed System Object Model
  • COM Component Object Model
  • DCOM Distributed Component Object Model
  • CORBA provides a way to execute programs (objects) written in different programming languages running on different platforms no matter where they reside in the network using an “object bus” or “software bus,” a software-based communications interface through which objects are located and accessed.
  • objects reside on various machines throughout the distributed environment and are tasked with performing duties defined by their implementation.
  • FIG. 3 is a logical diagram of an enterprise network containing CORBA-enabled processes distributed in both domain 1 and domain 2 .
  • CORBA objects are defined by an Interface Definition Language (IDL) that describes the processing (methods) the object performs and the format of the data sent and returned.
  • IDL definitions are stored in an interface repository (not shown) which can be queried by client application 312 to determine what objects are available on the bus.
  • client application 312 can be queried by client application 312 to determine what objects are available on the bus.
  • objects have the ability to move around if needed.
  • a client communicates with an object through an object reference. This is a pointer to the object that allows requests for operations and data access to be sent from the client to the server via an object request broker (ORB).
  • ORB object request broker
  • ORB is depicted as client ORB 316 and server ORB 322 , but could be conceptually represented as an ORB bus between client 310 and server 320 and connected to a plurality of objects (or object implementation).
  • CORBA client 310 makes requests to remote CORBA object 328 via an ORB 316 .
  • ORB 316 provides a proxy object in the client's address space which creates the illusion that remote object 328 is a local service or process.
  • ORBs 316 and 322 manage the interactions between client 310 and object implementation 328 .
  • Client 310 issues a request and invokes methods of object implementations.
  • Client 310 and server 320 communicate by exchanging messages defined by the General Inter-ORB Protocol (GIOP).
  • GIOP General Inter-ORB Protocol
  • the client-side architecture provides client 310 with interfaces to ORB 316 and object implementations.
  • a dynamic invocation (not shown) allows for the specification of requests at runtime whenever the object interface is not known at runtime and utilizes the interface repository.
  • Each CORBA implementation comes with one or more IDL compilers (not shown) that know the language mapping for the language in which they were designed (i.e., that used by client application 312 ). It is the IDL compiler's job to turn the IDL into stub and skeleton files 314 and 326 , respectively. These files are used in distributed applications to make object communication almost transparent.
  • IDL stub 314 is used in client processes to communicate with server 320 .
  • Stub files 214 consists of functions generated by the IDL interface definitions and linked into client application 312 for a mapping between client application 312 and ORB 316 .
  • Client application 312 uses stub 314 to make calls to the server objects. Functions needed by client 312 are called just as if they were local objects. However, stub object acts only as a proxy that forwards requests to and responses from a CORBA process on a remote server.
  • the implementation-side interface consists of server ORB 322 , IDL skeleton files 326 and object adapter 324 .
  • Skeleton files 326 are the converse of stub files 312 . They are what the server-side applications use to seamlessly receive distributed requests. It is the skeleton's job to receive requests from ORB 322 , call the proper implementation, which in this case is object implementation 328 , and return the results.
  • ORB 322 calls method skeletons to invoke the methods that were requested from client application 312 .
  • Object adapter 324 provides the means by which object implementation 328 accesses most ORB services. Object adapter 324 isolates object implementation 328 from ORB 322 .
  • a server may have a variety of object adapter types, each providing specific services.
  • client application 312 connects directly to ORB 316 through its stub 314 .
  • Object implementation 328 on server 320 connects directly to object adapter 324 through skeleton files 326 .
  • Object adapter 324 then connects to server ORB 322 .
  • a request from client application 312 is next sent through client stub 314 , across ORBs 316 and 322 to the proper object adapter and through server 320 's object adapter 324 and skeleton files 326 , eventually reaching implementation 328 .
  • the return value of the implementation follows the same route in reverse.
  • Every object on the ORB has an Interoperable Object Reference (IOR) which is a global identifier string that identifies the machine on which its associated object is located and the interface that the object supports. It has encapsulated the IP, PID and other values required by the client to connect.
  • Client 310 can use IOR for an object and standard function calls on ORB 316 to find an object reference.
  • Client ORB 316 uses the IOR to determine what type of object is being referenced and the identity of the server for routing requests.
  • the client can write its own IOR to a file and get all server objects on the ORB since the ORB stays within the domain of the client machine. The client could then read the IOR from this file and have the ORB resolve it into an object reference.
  • server 320 when the server object is in a different domain from that of the client machine, the client must receive a reference to the object from an independent service. Usually, this is accomplished by writing server 320 's IOR to a Server IOR File and placing it in a well-known location, using http, shared file system or ftp. At start up, client 310 merely accesses the file system for the server's IOR. This method for bootstrapping, although simple to understand and test, has several disadvantages, notably the need for the client and the server to share access to a file system.
  • Naming service 302 uses a standard CORBA object which contains operations that bind, resolve, and unbind human-readable names with an IOR.
  • a service object When a service object is created, it binds its IOR with a name in naming service 302 .
  • Client application 312 needing a connection to server 320 , merely retrieves a reference to naming service 302 and accesses server 320 's IOR by the server's name. Then, server 320 's IOR is resolved into the identity of the server for routing requests.
  • a stovepipe application is a stand-alone program. It implies an application that does not integrate with or share data or resources with other applications. Many current systems have been built as “stovepipe” applications, meaning that they do not communicate easily with other enterprise systems. Moreover, these stovepipe applications form their own system “islands” with their own hardware platforms, development languages, protocols and resources (e.g., rules, databases, etc.) Corporations are demanding new systems changes at an astonishing rate, and unfortunately, these old legacy systems do not adapt well to change. A telecommunications company, for example, might have had separate systems for plain-old telephone service (POTS) customers, inter-exchange carrier (IXC) customers and wireless customers.
  • POTS plain-old telephone service
  • IXC inter-exchange carrier
  • FIG. 4 is a diagram representing independent systems' stovepipe relationships as might be expected in a telecommunications enterprise according to the prior art.
  • Current day “independent systems'” stovepipes are represented in the Figure as stovepipes A-N.
  • Telecommunications enterprises implement specific telecommunications systems in a effort to provide their customers with profit-generating services.
  • the telecommunications services provided to the enterprise's customers are represented in the Figure as Digital Subscriber Line service (DSL 410 A), Asynchronous Transfer Mode network services (ATM 410 B 1 and 410 B 2 ), Synchronous Optical NETwork (SONET) fiber-optic transmission system services (vendor “A” 410 C and vendor “B” 410 D), and Internet Protocol services (IP).
  • DSL 410 A Digital Subscriber Line service
  • ATM 410 B 1 and 410 B 2 Asynchronous Transfer Mode network services
  • SONET Synchronous Optical NETwork
  • IP Internet Protocol services
  • each of the enterprise's services 410 A- 410 N must be managed by its own specialized management applications, represented in the Figure as management applications 408 A to 408 N.
  • the combination of the services and management applications define the enterprise's profit centers. While many of the management applications 408 A to 408 N may own services and/or resources identical to those owned by any of the other management applications in the enterprise, the enterprise's management applications are tightly coupled and therefore do not share services and resources. As discussed above, this happens because a particular management application, for instance management application 408 A, is developed for a unique enterprise service, which in this case is DSL 410 A, without any thought of sharing the application's resources and services with any other management application within the enterprise. Other enterprise management applications were developed for enterprise systems in a similar ad hoc fashion.
  • Each of management applications 408 A- 408 N performs specific management tasks associated with a corresponding service provided by the enterprise to its customers; however, rarely does a management application provide the services necessary to cost center applications (i.e., tracking and billing customers and accounts for the service usage). Therefore, in addition to developing a management application 408 A for specific enterprise services, it was often necessary for an enterprise to stovepipe a business application, represented in the Figure by business application 406 A, to the management application for providing cost center services and functionality not provided by the profit center application. The combination of corresponding independent cost center applications and profit center applications form independent systems' stovepipe applications. Events and information are communicated between individual management and business application stovepipe systems using point-to-point messaging architectures as described above.
  • management application 408 B handles a synchronous transfer mode routers through ATMs 410 B 1 and 410 B 2
  • management application 408 C manages a particular vendor's version of synchronous optical networks (SONET)
  • management application 408 E handles a second vendor's SONET 410 E.
  • the enterprise is able to consolidate business applications from three independent stovepipe business applications to only two, 406 B and 406 C.
  • the enterprises achieved processing and storage efficiency by handling only two independent stovepipes for the three management applications. Notice, however, that true resource integration has not been accomplished.
  • any of management applications 408 A to 408 N may have duplicative services from any of the other management applications, as none of the management applications communicate with one another, and instead communicate only along their own independent stovepipe lines. Those services would be under-utilized with respect to the enterprise and require that more enterprise resources be devoted for housing those services. The same is true of resources needed for the execution of the services within management applications 408 A to 408 N. While it is true that the various enterprise services 410 A to 410 N may require different resources be available to the management applications, it may also be true that various resources may be common among the various management applications. Network elements compound the stovepipe issue by requiring multiple control interfaces at the element.
  • Juniper routers require both Simple Network Management Protocol (SNMP) and XML to perform a full suite of network management functions. Therefore, the enterprise must again house and manage duplicative management resources only because the independent stovepipe systems' own services, resources and data do not share with one another.
  • SNMP Simple Network Management Protocol
  • XML XML
  • NW NewWave
  • NW fuses virtual machine spontaneous networking, mobile code, directories, rules engines, and eXtended transAction (XA) transaction standards to deliver a fine-grained set of services on which management applications are re-engineered.
  • NW leverages leading edge technologies for achieving a cross-domain technology management system which separates applications from technology.
  • the individual stovepipe systems that evolved for network equipment, hosts and servers, and applications can all be integrated into a coherent management regime.
  • FIG. 5 is a diagram of the NW network management concept in accordance with an exemplary embodiment of the present invention.
  • NW might be analogized to a schema for presenting services to a service user, such as client 550 .
  • client will be understood to represent any consumer or user of a service, notably, many clients or other services, but may instead be any application, software module or tool that utilizes the processes of a service.
  • NW network management service platform 500 (NewWave NM) is comprised of Global Information Bus 510 (GIB) is necessary to make services (along with the resources needed by the services) available to client 550 .
  • GOB Global Information Bus 510
  • DataBus 520 is a mechanism for decoupling data from the applications that have historically owned the data and make the data available to all authorized users, such as making all data in an enterprise owned by the enterprise and then available to all (authorized) enterprise uses.
  • Management Operations Center 530 utilizes service provided by both GIB 510 and DataBus 520 for monitoring and operating a network.
  • NewWave NM service platform 500 itself consists of a group of NW infrastructure services and procedures necessary to support NW services.
  • GIB 510 is best described as a global ecosystem of interrelated services.
  • the GIB architecture is an infrastructure for deploying and managing individual services on a global scale.
  • GIB 510 provides an infrastructure on which to build services that can run on many platforms.
  • the physical infrastructure is high scalable allowing for new capacity to be easily added, almost invisibly, with a low cost-per-capacity.
  • GIB 510 deployment infrastructure enables software distribution and service configuration and deployment to be accomplished without direct access to the physical servers within the enterprise. Distribution, configuration and deployment are centralized operations, but the effect to consumers is distributed.
  • GIB 510 also utilizes a runtime infrastructure for distributed computing, including discovery of services, distributed transaction management and self-healing and also incorporates a management infrastructure for keeping the state of the ecosystem stable.
  • GIB 510 includes a distributed communication infrastructure which supports multiple types of interaction between services. These interactions may be totally decoupled, message-based communication in which sender and receiver are unaware of the existence of the other, slightly coupled, wherein message-based communication in which the sender and receiver are aware of each other, but never gain direct access to each other. Also, GIB 510 distributed communication infrastructure supports generic coupling, event-based communication in which the receiver registers interest in certain events with the sender (the sender is physically coupled to the receiver, but does not know anything specific about it) and fully coupled, remote-procedure call communication in which the sender must find the receiver to make the call (GIB 510 also supports methodologies for finding each other).
  • DataBus 520 is a data management architecture for NW service platform 500 . It presents an architecture for creating a consistent, enterprise-wide data persistence layer which allows clients to access shared enterprise data. DataBus 520 achieves this enterprise-wide look by decoupling shared enterprise data from specific applications (breaking down the stovepipes) and opening up the data layer to across-the-enterprise access (given proper authorization). DataBus 520 architecture is designed from the ground up for global scalability and accommodation of evolving business data models in a highly-distributed physical deployment. Scaling is realized predominantly through the partitioning, while individual partitions are mapped to logical data domains that are defined along more relevant dimensions than entity-type dimensions (e.g, geography, line of business, etc.), and cut across traditional entity boundaries.
  • entity-type dimensions e.g, geography, line of business, etc.
  • MOC 530 is a set of NW-enabled services intended to provide support for addressing problems similar to those handled in a Network Operations Center (NOC), but not limited to only network problems. As such, it is intended to support problem management in many forms, including those typically handled by customer support centers and tactical assistance centers. MOC 530 represents a tool that assumes a fundamental re-engineering of the processes and tools used in these environments. MOC 530 is an example of the NW approach to designing and managing applications. Rather than building monolithic stovepipe application systems, the “application” is a collaboration of many smaller services acting on common objects, possibly without knowledge of each other, but with their actions affecting each other. MOC 530 makes extensive use of rules external to code executed by rules engines.
  • NOC Network Operations Center
  • NewWave NM service platform 500 largely through the use of GIB infrastructure services 510 , spawns many small components (services and resources) that act largely independently of each other rather than a single monolithic application. These services may directly interact with shared resources by, for example, registering for notification of updates to shared resources.
  • the small services find each other and communicate by using GIB infrastructure services 510 , (specifically registration and lookup services) and may also publish messages using the GIB's publish/subscribe services.
  • GIB infrastructure services 510 specifically registration and lookup services
  • publish messages using the GIB's publish/subscribe services.
  • the overall behavior of any NW-supported architecture can be changed by adding new components. Sometimes this will be a whole new framework service, at other times a specialization of a common service with specific behavior and scope.
  • new services such as services 540
  • new services 540 can be added to NewWave NM service platform 500 from outside vendors and entrepreneurs.
  • new added services 540 may unknowingly invoke existing enterprise cost center services, such as customer tracking and billing, vendor-supplied services provide a rich source of revenue for an enterprise without adding infrastructure normally associated with traditional stovepipe systems.
  • the NW network management service platform relies on the ability to deploy services on many different platforms that run on many different server types.
  • Java a trademark of and available from Sun Micro Systems, Inc., Palo Alto, Calif.
  • Java 2 platform JDK 1.2
  • JDK 1.2 Java 2 platform
  • the NewWave architecture exists separate and apart from the Information Technology used to build the architecture.
  • the architecture and design predate the selection of deployment technology.
  • the reference application uses Java language and Jini distributed applications infrastructure, both Sun technology. There are many reasons why this technology is especially adapted to the NewWave architecture and its reliance on “plug and play” and code mobility.
  • other systems can implement this architecture and several have been used in the Worldcom Lab including Sun JMX, IBM Aglets, IBM WebSphere EJB, and Objectstream Voyager products. Nevertheless, there are real and distinct synergies between design and the target implementation technology. Many aspects of NewWave would be much more laborious to achieve on technologies other than Java and Jini. Further, we expect application infrastructures to evolve and in a few years, better implementations technologies will arrive. NewWave anticipates these and expects to deploy on each successive wave of distributed computing that achieves product status.
  • the NW network management service platform is deployed on large numbers of small, rack-mounted servers of varying platforms.
  • Some exemplary platforms include Solaris for Netra (available from Sun Microsystems, Inc.), IBM AIX (available from International Business Machines Corporation), HP UX all of which are UNIX-based platforms.
  • UNIX is a trademark of the American Telephone and Brass Company Corporation of New York, N.Y. NT and Linix systems are also in use.
  • the NW network management service platform could be deployed on larger servers as well. However, the cost of scale may go up with larger servers, as those physical boxes are on an entirely different cost curve.
  • the NW physical environment consists of thousands of these small to medium size servers deployed throughout the physical boundaries of an enterprise. These servers could, in the case of a telecommunications enterprise, be deployed on the edges of the network in Point of Presence connections (POPs) as close to the user as possible and even on user premises in user enterprise domains. Data centers and major network hub intersections are also used in the physical deployment model.
  • a NW-enabled server is configured with one of a small number of standard configurations. Standard configurations include generic servers with no special features, and resident application servers with Commercial Off the Shelf Technology (COTS). Resident servers in use include, but are not limited to: database servers with specific database products installed, directory servers with directory applications installed, security servers with security applications and rules servers with a rules engine installed. Basically, native services are relocatable and can migrate to any generic container. Integration with resident applications (each fixed to a specific server or servers) is achieved by representing the interface to the service a NewWave service.
  • FIG. 6 is a diagram illustrating the NW concept of many, small generic servers in many geographic locations distributed for enterprise use. For example, an exemplary territory is exhibited in the state of Virginia where three sites have been designated for the distribution of physical hardware denoted hereon in the Figure as geographic sites A, B and C. Each geographic site contains racks of physical hardware, racks 1 - n , including various servers 604 A-C available from a variety of original equipment manufacturers (OEMs).
  • OEMs original equipment manufacturers
  • servers 604 A-C are not larger multi-processor servers, but instead are smaller rack-mounted servers which may support various platforms such as Solaris, IBMAIX, Windows NT, Linux, etc.
  • racks 1 - n , 602 A contain a plurality of servers 604 A.
  • servers 604 A may be from a single vendor or instead might be from multiple vendors.
  • Associated with one or more of servers 640 A are particular resources managed by that particular server.
  • databases 610 A are particular vendor's databases
  • database 612 A is another vendor's database, each of which are managed by a server in a rack at location A.
  • Another resource which will be discussed in more detail below, is a rules engine 614 A which may also be managed by one or more servers 604 A.
  • racks 602 B at geographic location B and 602 C at geographic location C are similarly configured as those at geographic location A, thereby having large numbers of small generic servers 604 B and 604 C, respectively.
  • servers 604 B and 604 C may host various vendor's data resources 610 B, 610 C or 612 B, along with the rules engines 614 B and 614 C.
  • the importance of this concept is that any server in any geographic location can process any service needed by any client in any other geographic area.
  • NewWave releases the application and the data from the physical server and also from the bounds of that single location.
  • NewWave produces a global scale computing system where the telecommunications data network replaces the traditional computer backplane and the individual server and the containers on it substitute for each of the chips in a multi-processor enterprise system. Immense scalability is archived at greatly improved efficiency for organizations that require large scope business activities.
  • each physical server is not used directly in the NW operating environment. Instead, each server must have the capability of running a platform-independent programming language virtual machine (VM) on top of the operating system that converts Java bytecode into machine language and executes it.
  • VM platform-independent programming language virtual machine
  • JAM Java Virtual Machine
  • Microsoft Virtual Machine available from Microsoft Corporation in Redmond, Wash.
  • Java interpreter is also a Java interpreter.
  • a VM is a multi-threaded processing environment that encapsulates all access to the underlying computing platform.
  • a Solaris Netra looks the same as a Windows NT to a process being executed by the VM.
  • a VM is, in fact, a single computing process, but it supports the running of many “mini” processes (threads) within.
  • the NW operating environment is actually thousands of VMS deployed on small physical server machines throughout the world.
  • the NW service platform includes a container technology for providing a runtime operating environment for services.
  • a container technology for providing a runtime operating environment for services.
  • a generic service container a CPU process into which arbitrary software services may be homed to a host server at runtime.
  • Each VM runs a small set of code which identifies it as a VM container and makes the VM container able to be found and communicated with remotely.
  • VM containers are realized as VM heavy-weight processes which are launched from boot scripts as the server is booted.
  • VM service containers are the multi-threaded servers that provide a place in which multiple-service instances reside, each executing its own thread or threads of execution.
  • a VM container is also a service itself. More correctly, a VM container may be thought of as a “service container service running on a VM.”
  • the service provided by a VM container is the launching of other services within itself. It behaves much like the services it contains in the way it can be found remotely and communicated with.
  • a VM container must register itself with a domain registrar and/or enterprise repository to be visible in its home domain and with the enterprise repository to be visible to services across the enterprise. The registration and finding of services will be discussed in greater specificity below.
  • the salient point is that, like services, VM containers can be found remotely from anywhere in the world and requests can be programmatically made of them. VM containers report their own statistics and can be asked to shut down.
  • VM container The main difference between a VM container and all other services supported by the NW service platform is in how a VM container, or more properly, the container service, is launched.
  • a VM container is launched from the operating system and not from within another container. It cannot be launched from a remote location programmatically according to the NW conventions.
  • containers are not intended to be launched by NW clients. Rather, conceptually it could be considered as an integral part of the operating environment and launched by one of the following means:
  • RMI Remote Method Invocation
  • a VM container Once running, a VM container must register itself to be visible to clients, services and administrators in the enterprise that may need the VM container for running a service.
  • a VM container runs a small set of code in which the VM container can designate itself as a particular type of container.
  • Some containers might designate themselves for running essential NW infrastructure services or other enterprise services such as GIB, DataBus or MOC services, or perhaps the container designation may relate to the type of host server running the VM container.
  • Designating a container as being of a particular type might also be based on the server resources available in a logical domain. Depending upon the total quantity of VM containers in a domain, their reliability and domain loading factors, an administrator can designate a pre-defined number of containers as being NW infrastructure-type, GIB infrastructure-type, and so on.
  • VM container-type designations are based on the priority of the hosting center and intended to assure that VM containers are always available for crucial enterprise objectives, such as re-homing services that are essential to the enterprise. Therefore, key services, while they may run in a generic-type VM container, do not depend on a generic-type VM container being available for self-healing of dead or dying services because other VM containers have been pre-designated for restarting those services. Thus, in the case of an essential infrastructure service, or any service for that matter, a predetermined quantity of VM containers can be pre-designated for running only those essential infrastructure services (self-healing capabilities will be discussed in greater detail below).
  • a key technical aspect is the storage of the configuration of the system and the container off board of the system and the container. In NW systems, this occurs in the registry. This is implemented in this generation via Jini Lookup and Directory (LDAP) services. However, any abstract and external service can implement the off board registration. By being separate from the container, all or part of the configuration can be transferred efficiently to another container as needed. Enterprise wide operations can occur on the configuration, without reference to the physical/server location it describes.
  • LDAP Jini Lookup and Directory
  • a management domain is generally defined from servers that are physically located at a physical hosting facility.
  • a logical network domain is based on the transmission topology of a network defined around, for instance, a unicast or multicast routing table and may not be physically located at a single facility.
  • some self-healing services use service lookup services that utilize management domains, while others use service lookup services that utilize network domains.
  • the VM container must ensure that it is listed in the lookup service being used by the particular self-healing service monitoring the services to be run by the VM container.
  • a VM container can designate itself as a particular type of container based on the resources available from the host server running the container. Services must be run in a container, but some services need additional resources aside from the container, such as a particular type of database, rules engine, etc. A service provider must be apprised of the resources available at a server host before attempting to launch a service on a host that is not equipped to run the provider's service.
  • a VM service container amounts to a heavyweight CPU process. Allowing service threads belonging to different service suppliers to coexist in the same process space is an open invitation to adverse interactions (e.g., modification of a non-final static variable used by both services).
  • each VM container is uniquely owned by a single service supplier business entity. While APIs might be used by a customer who supplies services to lease a service container, the container may also designate itself as a container type to be used by a particular supplier. In that way, only services supplied by a single-service supplier business entity will be able to run in a particular container. Thus, a VM container can be designated to services supplied by a particular supplier.
  • domain registrar and/or enterprise registry are not the only means for finding a handle to a service container.
  • Another option is to register the service containers within RMI registry.
  • the URL address for connecting to a specific service container e.g., “rmi://lambic.wcomnet.corn/serviceContainer13/” is stored within the inventory database.
  • a service supplier would query the inventory database for the URL address and then perform a conventional RMI lookup against that URL address.
  • FIG. 7 is a diagram illustrating various typical configurations of the small servers running various operating systems in which VM containers are running on host servers in accordance with an exemplary embodiment of the present invention.
  • four servers 702 A, B, C and N are shown, each having a unique operating system platform such as operating systems A, B, C and N.
  • Running on each of servers 702 A to N are one or more generic VM containers 704 . Every CPU host in an enterprise hosting facility will run at least one VM container processes such as servers 702 N and 702 A).
  • Service deployers may inject the code for their services at any one of the VM containers.
  • each server platform 7021 A-N may run multiple VM containers 712 .
  • GEB General Information Bus
  • GEB 802 can be conceptually described as an information bus containing NW-enabled services and mobile applications available for use by clients as needed.
  • the GIB is a set of specific, yet extensible, Framework Services, implemented on a scoped (local, regional, global) distributed computing infrastructure.
  • GIB 802 The heart of GIB 802 is the manner in which it allows deployment of services into the operating environment in a very flexible and easy-to-administer manner.
  • GIB 802 is a series of services that may change from one execution to another, finding and collaborating with other services dynamically. This system of collaborating services starts to resemble an ecosystem, and the job of the GIB architecture is to maintain the interconnectedness and stability of this ecosystem as it continually changes. Almost all GIB components are implemented as services, even if they support no externally-available requests because all components must support certain administrative requests mandated by the NW. The administration and management of the ecosystem depends upon this capability. Although the component is acting as a service in the traditional sense of the word, it is deployed as a service. For this reason, even though GIB components come in many different flavors, at one level they all appear as services and follow many of the same conventions. The different flavors include the following and are depicted in the Figure below:
  • services that act as agents representing external entities such as devices, gateways to external (non-GIB) systems and even people, or are built directly into devices.
  • a service should register with a proxy which can handle simple loss of connection to the service, re-finding the service and continuing processing without interruption;
  • a service must implement certain management-related requests, including ping( ), healthCheck( ), shutdown( ), quiesce( ), reset( ); and
  • a service must accept requests for notification of events, and notify listeners, at a minimum, of certain administrative events; additionally, the service could define other types of events.
  • a service must be mobile, which is the single most important characteristic of a service. This is to say that there are as few restrictions as possible to the deployment of a service on any machine anywhere as quickly as possible without human intervention.
  • the limitations of this goal are primarily the provisioning of a service by:
  • NW services must be able to be launched on a server without any code specific to the service and without any configuration information being pre-installed on the server. All resources used by the service, if possible, must be able to be remotely accessed and not depend upon the resource being present on the local machine. Databases used by NW services must be able to be created on the fly by the service. So, while a service might depend on the existence of a local database server, it cannot depend on that database having been configured to have certain tables. It must be able to create the tables from a schema which is remotely loadable and to populate the database from remote sources. If the data cannot be remotely loaded, then the database must have a mirror copy which the service can re-home to.
  • a NW service must be able to be launched on a server without a human logging onto the server to initiate the launch and, in the event of a failure, a service must be able to be re-homed at runtime from one server to another without human intervention.
  • the NW infrastructure provides an operating environment for services which is similar to the public Internet or an intranet. Instead of many client machines, the NW service platform is deployed on large numbers of small, rack-mounted servers. Instead of web browsers running Virtual Machines, there are VM containers, and instead of running applets in the web browser VM, there are services running in container VMs.
  • an applet When an applet is launched from a web page, it has a “codebase” identifying the location of the class files (server) that need to be loaded before the applet can run.
  • each service has a codebase identifying from where its class files should be loaded from.
  • the NW service platform deploys many HyperText Transport Protocol (HTTP) servers in place to serve up code, that is, Java class files and resources.
  • HTTP HyperText Transport Protocol
  • the class files and resources are installed on the HTTP servers.
  • An HTTP server which is employed to serve up code is called a “code server.”
  • the container When a service is launched in a VM container, the container is provided with certain configuration information, including the service's codebase.
  • the codebase contains the address(es) (usually URL(s), but it could be URI(s)) of the code servers which are able to serve up the service's code. So, when the service is launched, its code is loaded from a remotely-located code server. As services are generally long-running, code located remotely, even if it is a large amount of code, is a reasonable cost. Additionally, caching techniques are used to locally store the class files, checking each time to ensure that they have not been modified on the code server. In this way, installing a new version of a service's classes does not involve any type of software distribution technique involving the servers on which the services will run. Instead, it involves only pushing the new software out to the HTTP servers, which is a much more manageable task.
  • the proxy which is used to access the service.
  • the proxy is referred to herein as a client proxy, proxy object and service object alternatively and will be more fully described below.
  • the proxy is the Achilles' heel to software distribution.
  • the proxy is also remotely downloaded.
  • the Java Jini proxy is used with specific semantics and augmentation for NewWave service inter-working.
  • a client must have initially loaded an “interface” for interacting with the proxy. This code also must be consistent with the interface presented by the service.
  • One solution is to launch client applications that use NW services with a similar remote loading approach. Specifically, an “Application Launcher” that launches an application using a specified remote codebase.
  • Application Launcher is Web Start (available from Sun Microsystems, Inc.).
  • a service must be mobile from the point of view of class and resource files, as well as from the point of view of configuration information.
  • Configuration information like class and resource files, cannot be tied to a specific machine.
  • configuration information is made available at the enterprise level, thus NW services can be launched using configuration information that is not local to the service.
  • all configuration information is stored in an enterprise level repository (the enterprise repository) and then replicated to identical repositories throughout the geographic extent of the enterprise.
  • Application launchers access the configuration information in the repository, and then forward the configuration information to the VM container selected for running the service.
  • the information includes both configuration information needed by the container to launch the service and information needed by the service itself.
  • the NW infrastructure provides for remotely-located resources.
  • Reference files and other resources used by a service are remotely loaded at runtime using the same techniques described above used for class loading.
  • These resources may include EXtensible Markup Language (XML) files, properties files, images and the like.
  • XML EXtensible Markup Language
  • These resources are installed on the HTTP code servers in a similar manner as the class files.
  • some services that use a resource require a local resource to be local, therefore the local resource must be provisioned automatically to accommodate the reference files and other resources that will be loaded remotely at runtime.
  • a service that uses a database locally must be able to start with a completely empty database, and then add the necessary database tables, remotely and on the fly.
  • the local resource must be prepared for the remotely-loaded tables with suitable database definitions for the structure and the type of contents that each data element that the local resource can contain (i.e., the database schema).
  • An HTTP server could be used for storing schema information in a similar fashion as the resources and code files.
  • Another solution is to use an enterprise level directory that is visible to all services. The schema information can then be remotely loaded from the enterprise directory, after which the source data for populating the newly-defined tables is loaded from a remotely-located HTTP server.
  • GIB 802 requires certain services to be available for all other services. These services are generally referred to as GIB infrastructure services including registrar, enterprise repository and lookup services 804 ; distributed transaction services and semantics 806 ; policy rule services 808 ; messaging and publication subscription services 814 ; rendezvous services 812 ; and self-management services 812 .
  • the GIB is designed to be extensible, and additional framework services are continuously being defined; these incorporate seamlessly.
  • Enterprise repository and lookup services 804 provide a means for client to locate a needed service without knowing where that service is currently running. Whenever a service is launched in a container, that service registers itself with its domain registrar in order to make itself visible to the client in its own domain.
  • a service registered with a domain registrar is visible only in the domain the service is running, so in order for a service to be visible to all clients in the enterprise, a service must register with an enterprise level registry, the enterprise repository. Clients needing a particular service do not need to know where the service is running or even if the service is available in the client's own domain. Instead the client merely looks the service up with the registrar. If the needed service is not listed in the registrar, the client can be directed to a enterprise repository lookup for the location of an enterprise repository within the enterprise.
  • Registrar, enterprise repository and lookup services 804 also manage VM container leases. These and other functions of registrar, enterprise repository and lookup services 804 will be described in more detail below.
  • Distributed transaction services and semantics 806 manage transactions between the NW services running in the enterprise, with distributed transaction coordination and without the heavy, monolithic character of traditional Transaction Processing (TP) monitors.
  • Distributed transaction services and semantics 806 ensure that processes which need transactional atomicity (several operations complete in their entirety or not at all) can get it.
  • the transaction manager oversees a two-phase commit protocol to coordinate the commit of all containers and association engines that joined the transaction.
  • Policy rule services 808 are employed by GIB 802 for applying policy outside of the normal flow of processing logic to interactions between services. This is accomplished through the use of rules engines that allow the specification of policy-based rules outside of the processing logic. This allows organizations knowledgeable of operations support, instead of programming organizations, to be in control of the behaviors implementing operations support policy.
  • NW messaging and publication subscription services 814 provide NW components the means for communicating between NW services. There is no single answer as to how services should communicate. There are different levels of coupling between services desired, depending on the type of service. Services publish events, subscribe to event topics and receive events to which they have subscribed for notification of various events which may need service. Generally, the communication service is dynamic with run-time announcements of producer and consumer registrations, including topics. (Traditionally, these communications' channels were fixed by the logical, initial configuration and physical deployment of a distributed system.)
  • Rendezvous services 812 recognize and combine patterns of events which may require further service. One important factor when processing events is to know if the event is already being handled. Rendezvous services 812 recognize that events are being handled, thus preventing an event which has gone directly to a state machine from also creating a new state machine. Event patterns are also recognized which allows work documents already started to be merged together.
  • GIB 802 also employs a group of self-management services 816 for monitoring the state of essential NW infrastructure services, or any services for that matter, on their separate servers.
  • Notification of a dead service to a re-homing service (“arch-angel” service) is primarily a function of the leasing service provided by the domain registrar.
  • the re-homing service then re-launches the dead service in another container, possibly on another server.
  • Clients using a dead or dying service are left in the lurch as they cannot then complete processing even though the dead service might have been restarted in another container.
  • the solution involves the use of self-healing proxy references that look to the registrar whenever a request to a service results in a stale exception.
  • each of the GIB infrastructure services will be discussed in greater detail with respect to the Figures below.
  • One feature of the present invention involves separating data and resources that have been traditionally tied or owned by a particular application, from that application, thus breaking down the stovepipe.
  • These resources are managed by persistent services 818 , particularly DataBus services, and may be used by clients and enterprise users via GIB 802 .
  • persistent services 818 make enterprise data directly available to the enterprise users, depending on authorizations, and not from a data-owning application.
  • Data can be organized by broad business domains such as the classification based on “tiles” or the TeleManagement Forum's BAC/SIM classification. However, any organization principle can be used.
  • Current implementation uses the DMTF CIM/DEN information model. Deployment of data is generally “holographic” and randomly distributed within a named domain. [But policy-based distribution and resource capacity is also used] Domain names are based on geography, technology, and line-of-business; yet, any number of domain dimensions can be created allowing business extensibility.
  • each kind of data is a service.
  • finding data is somewhat more complex that finding a running service, the method is similar to the two-hop method employed with services.
  • the present invention achieves enormous scalability via a high degree of partitioning where data is flexibly mapped to a persistence layer of hundreds of mixed vendor databases and occasionally to other persistence technologies such as directories and tuple spaces.
  • File storage is also supported via integration of Jiro (Sun product) or other Jini enabled disks. This provides for development of remote storage products such as NSPs and similar services within the NW infrastructure.
  • enterprise devices and heritage systems are provided access to NW services and resources via heritage system gateway 820 which translates heritage services into NW services. This is accomplished by implementing NW services acting as agents which represent external entities enterprise devices to other NW services.
  • NW services acting as agents which represent external entities enterprise devices to other NW services.
  • a similar mechanism is used for enterprise network elements. Enterprise network elements access NW services on GIB 802 in either of two ways by: 1) being NW-enabled themselves (i.e., by incorporating NW distributive intelligence services onboard that can directly access GIB 802 ); or 2) utilizing distributed intelligent agents 822 which are similar to non-network devices described above and that interact with the resident protocol for the network elements to access NW services on GIB 802 .
  • the GIB is an ecosystem of NW services interacting in a highly-distributed fashion requiring special technologies to help services discover each other and keep the ecosystem healthy and stable. As independent stovepipe systems are deconstructed, new challenges are unearthed that are unaddressed by the prior art. Neither the EAI initiatives, the CORBA and EJB standards nor Sun's J2EE platform and Jini technology provide a holistic solution to the problems encountered in such a highly interactive-distributed environment as NW.
  • NewWave unlike prior art attempts, is a highly distributive environment based on an enterprise (or global) model and is not merely a domain level model of service distributions. Virtually every NewWave component can be embodied as a NewWave service so the NewWave principles described below apply to most, if not all NewWave components.
  • a surrogate or proxy NewWave service is created which maintains the specialized interface /communication; the marketplace of other NW services sees only another NW service interface.
  • that service finds all services with which it needs to interact and also makes itself visible to all clients (service consumers, usually other services) that need to interact with it.
  • Clients and services running in a domain are listed in all local lookup directories (directory services running in that domain). So, a newly-launched service spontaneously discovers all domain directories for registering itself to be found by services needing to interact with it, and finding services with which it needs to interact.
  • the present invention in contrast to the prior art, utilizes a “two-hop” discovery process to discover all local directory services and all enterprise level directory services.
  • a newly-launched service can discover and register with all local directories. Having discovered the local directories, the service can “find” any and all local services with which its needs to interact.
  • One service is a “find” service which is used by a newly-launched service to find non-local directories (enterprise level directories) to make itself visible to non-local service consumers.
  • the local directory and find services can be used to look up services the newly-launched service needs, locally from the local directory and globally via the find service.
  • This method is generally extensible and can be extended to three or more hop implementations if extremely large or extremely refined scope delineations are required by business circumstance or by the specifics of an alternate/future implementation technology. For instance, extension of the NewWave domain beyond a single global company to a marketplace of many global companies can be realized via an “extranet” service registrar which could be implemented as a third hop. In this manner, the NW infrastructure could be extended to a pandemic, global computing platform treating applications and data similarly to how the international financial infrastructure deals with products and money. Data in the system could be traded, deposited, withdrawn and even willed to heirs. Application services can be found via service directories (like phone numbers are today) and leased to other users. These service extensions and products are in development.
  • FIG. 9 a diagram of NW service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention. It is expected that an enterprise network is geographically widespread and serviced by a plurality of logical network domains, represented as network domains A-N. Logical domains are conceptually “local” to all services and clients within the domain. Everything not in a domain is “not local” to that domain and those services and clients.
  • Local NW components in domain A include all locally-running VM containers 918 A and other NW services 910 A, domain registrar(s) 914 A 1 - 914 AN, transaction managers(s) 912 A 1 - 912 AN and enterprise repository lookup 916 A.
  • Network domains A-N define separate multicast domains. NW components in domain A would be local to other components in domain A but non-local to NW components in any of logical domains B-N.
  • Enterprise repository(ies) 926 is non-local to all other services and resources, no matter the domain. It should be understood that the enterprise consists of a plurality of domains, local and non-local, but the present invention of the invention will be described, heretofore, with respect to NW components in logical domain A ( 902 A).
  • clients will be understood to represent any consumer or user of a service, notably, many clients are other services, especially another service that builds upon more primitive services, but may instead be any application, software module or tool that utilizes the processes of a service or might even be an end-user in the enterprise.
  • each logical domain such as domain A
  • services 910 A are deployed on a plurality of host servers, 904 A, 904 A 1 and 904 A 2 and running in a plurality of VM containers 906 (as described above with respect to FIG. 7).
  • servers 904 are loaded only with Java and the container code, these servers being “generic hosts,” depicted as server A 904 A 1 and server B 904 A 2 .
  • special resources such as database 908 and rules engines (not shown), can be locally added to generic servers that transform the generic host into a “specialized host” or server, such as that depicted server 904 A.
  • one or more services 910 may be launched and continue running while awaiting requests from clients.
  • the present invention utilizes domain registrar(s) 914 A for tracking the addresses (URL address, URI addresses or host name) of services in accordance with an exemplary embodiment of the present invention.
  • Each of domains A-N has at least one domain registrar, but as many as N registrars may be located in any one domain.
  • a domain registrar can be embodied as a service and thus launch, discover and be discovered as any other service.
  • Domain registrar 914 provides up to four primary services for the NW infrastructure: 1) a listing/lookup service for NW services running in its local domain, the services being listed and looked up in a lookup table by type and attribute, a proxy to the service is also listed that is streamed out to clients that lookup the corresponding service; 2) a leasing service for services running to lease resources in their local domain; 3) an enterprise level listing/lookup service allowing local services an client to bridge the gap to the enterprise level; and 4) a replicating service to replicate its tables or merely change in its tables to other registrars, or in fact to any service that has a need for registration or leasing information, for example, re-start services, trawling services, find services, enterprise level listing/lookup service, and other registrars in the local domain.
  • service 910 A when service 910 A is launched, it spontaneously “discovers” all nearby registrars 914 A 1 - 914 AN (i.e., all domain registrars in its local domain). The newly-launched service 910 A then registers itself with the all newly-discovered domain registrars 914 A 1 - 914 AN.
  • the NW infrastructure uses multicast packets to allow both services and consumer services (clients) to spontaneously discover any of domain registrars 914 A 1 - 914 AN within a local domain defined by a multicast radius, thus bootstrapping the process of finding and registering services.
  • discovery is accomplished without obtaining any specific information about domain registrars 914 A, such as a URL address or host name.
  • the domain registrar signals its availability for registering services within the local domain by broadcasting a multicast message to all nodes in the multicast domain (this is expected because a registrar is a NW service). All services 910 A running in domain A strive to remain registered with all local domain registrars 914 A 1 - 914 AN, and so upon receiving the broadcast message, all services in the domain register with the newly-launched registrar.
  • This method utilizes Java Jini functional facilities. Other lookup methods can be supported in specific circumstances or environments.
  • One such method utilizes a mobile agent approach where an active mobile service agent deposits information in each lookup or enterprise registration facility. Circumstances which can invoke these alternate methods are generally the result of technical or logical barricades such as company boundaries, security domains, or non-IP transport networks.
  • local registration is a two-step process, providing registration information about the service and making an enterprise lease for resources needed by the service.
  • Local registration makes service 910 A visible to other NW services and clients (collectively service consumers or merely consumers) in the local domain.
  • NW services and clients collectively service consumers or merely consumers
  • a service When a service registers itself, it provides a number of attributes in the registration that makes it easier for others (potential consumers) to find. These attributes may include one or more names, domain-type information, the interfaces which the service implements (i.e., what function a service can be requested to do).
  • a client can match a service listed in registrar 914 A according to their interface type or by matching one or more attributes with which service 910 A registered itself.
  • service 910 A can also include administrative information in the registration information provided to registrar 914 A (i.e., administrative information for interacting with the service administratively, such as an icon for display or a user interface object).
  • administrative information i.e., administrative information for interacting with the service administratively, such as an icon for display or a user interface object.
  • service 910 A must provide registrars 914 A an object which is a proxy, or a service object, to service 910 A, during registration.
  • the proxy is an object (or objects) that allows clients to access a service.
  • the proxy is streamed to registrar 914 A where it is stored in serialized form.
  • a proxy contains codebase with a URL of an HTTP server, the service code (usually Java byte-code) that implements the proxy object can be served up from that HTTP server by its URL, which is located arbitrarily in or outside the geographical domain of the enterprise.
  • a proxy In its simplest form, a proxy merely forwards requests from a consumer, for instance, on to service 910 A. However, the proxy might also contain any code that could be executed in a client environment before, after or instead of forwarding the request. Such a proxy is known as a “smartproxy.” This model is in sharp contrast to CORBA, where a registry simply stores a reference (a sort of address) that allows a consumer of a CORBA service to make a connection to some remotely-deployed service process.
  • the present invention allows proxies that implement the service interface to be moved out to consumers at runtime.
  • the proxy that gets stored in domain registrar 914 A, and subsequently streamed out to clients, can be absolutely any object that is serializable.
  • a smart proxy can do anything that can be done in Java code.
  • This model of moving smart proxies and service code to clients at runtime is different from CORBA, where a stub object can only act as a proxy that forwards requests to and responses from a remote server process.
  • a smart proxy may perform computations that are purely local within the client's process space.
  • it might store state information local to the client.
  • it might interact with a remote server process (outside its local domain)—the real implementor of a service.
  • the client proxy hides code from the client, thus when the client makes a request for a NW service, a smart proxy will be returned with service interaction code that is hidden from the client.
  • the client might “think” it is interacting with the requested service, while in fact the smart proxy provides the client with a means for executing the service locally, or interacting with the requested service, or interacting with services, sequentially or concurrently, without the client being aware of the interactions.
  • the client proxy can hide any code, thus allowing the client to communicate with a remote service using any protocol or middleware or many services.
  • client proxy can hide any code allowing the client to perform all logic locally or even implement an entire client application, including GUI.
  • NewWave services become roughly equivalent to CORBA or RMI services.
  • NW services uses an RMI stub object as the proxy object that is downloaded from a domain registrar's lookup to a client. But this is simply the most common case.
  • a smart proxy encapsulates code that interacts with a remote service using any one of a variety of protocols or middleware, such as sockets, RMI, CORBA, IBM MQSeries, and the like. Or a smart proxy interacts with two or more remote services using the same or even different middleware or protocols.
  • a smart proxy interacts with zero remote processes, implementing the entire service interface locally within the client's process space.
  • a smart proxy might have an implementation that changes to a different communications protocol, unbeknownst to the client. For example, as vendors and vendor services evolve, the implementation code in the smart proxy changes to reflect new services.
  • the proxy might communicate with one or another remote server processes, depending upon the time of day, lading or other configurable factors.
  • the proxy might parasitically use the communication channel of an object that is passed to it as an argument, not using its own communication channel.
  • looking up a service means fetching the service code for the service from a code server located remotely.
  • the proxy contains a codebase that includes the address(es) (URL(s)) of code server(s) 922 A which are able to serve up the code for the proxy.
  • the proxy code is loaded remotely in the client space through its codebase. Through this proxy clients can access the service via the remotely-located service code that is streamed to the client.
  • looking up a service means fetching the service's proxy from registrar 914 and the proxy's service code is streamed out to the client from HTTP server 920 A.
  • a service that wishes to be visible to non-local passes the URL address(es) local registrar(s) to enterprise repository 926 to make itself visible to clients in non-local domains.
  • the present invention envisions multiple methods of registering with enterprise repository 926 .
  • One mechanism involves the use of enterprise repository trawler services that trawl all the registrars' lookups for services that indicate the intention to be visible non-locally.
  • the trawler service then returns the registration information, at least the service's attributes, and the registrar's URL address, to the enterprise repository(ies).
  • Another mechanism involves the service itself finding an enterprise repository lookup service.
  • the enterprise repository lookup service finds an enterprise level repository and registers the service with it by depositing registration information and the registrar's URL address, to the enterprise repository(ies).
  • enterprise repository 926 lists, at least, the service's attributes and a URL to a local registrar that contains other registration information, such as administrative information and the proxy.
  • registrars 914 track the amount of services running on threads of another service, especially container services, in the local domain. Once a threshold number of running services is reached, registrar 914 makes the service unavailable for potential consumers of the service and notifies the enterprise repository, using one of the techniques described above, that the service is no longer available to clients. Of course, this may be run on a separate service that communicates with the registrar directly. Services that need a service with the particular attributes of a service that is unavailable must either find another service with those attributes, wait for the service to free up, or initiate a process to start another instance of the service on another (or possibly the same) VM container.
  • the leasing mechanism allows enterprise resources to be reserved on behalf of a requesting client (or any consumer of the resource) in the enterprise. These enterprise resources may include services, databases, enterprise engines (rules, etc.), transaction managers, and communications (publish and subscribe, messaging, event, etc.). With respect to registrars 914 , the enterprise leasing mechanism allow services 910 to bind themselves to the registrar's directory and lookup, and then periodically renew their binding to the directories of registrars 914 . It should be understood that if the client is responsible for registering with all registrars in a domain, it is also responsible for contracting with each registrar for an enterprise lease. The act of enterprise leasing reserves registrar resources to the service that are necessary for the service to make itself visible to service consumers.
  • any time resources are reserved on behalf of some participant in the enterprise, the reservation of those resources adheres to a leasing convention, sometimes known as time-limited resource allocation.
  • the client that requests the reservation of resources may specify a lease duration, a time period over which a client-party can assume the resource reservation will be maintained.
  • the requesting client will be issued a lease object that indicates the amount of time for which the lease has been granted (a duration that might be shorter than that requested).
  • the enterprise lease duration is set at a default time period which is known to all participants in a domain.
  • cleanup includes deleting the service from the lookup table, including removing all attributes, administrative information and proxies (service objects).
  • This technique of enterprise leasing facilitates the implementation of self-healing services. If a process, on whose behalf a resource is leased, should abruptly crash, the lease will eventually expire and the system can de-allocate the resource. Things get cleaned up all by themselves. Moreover, with respect to the registrar, whenever an enterprise lease for service expires, the registrar can notify the self-healing services of the lease expiration. The self-healing services can then attempt to restart the service, either in the same or different container. In certain cases, a process might include several transactions that are dependent on one another.
  • a transaction has not been completed, the participants will be instructed by transaction manager 912 to roll back the process to a state prior to the commencement of the transaction, thus the participants are unaffected by a failure during a transaction.
  • the results of those transactions might be cached to a storage resource awaiting further processing. If the service hosting the resource fails, or even if a service fails that is crucial to the remaining transactions, it is likely that the cached data will not be recoverable.
  • the client can restart the process for the beginning and reestablish the data. In the worst case, the states of the service resources being used have been changed during the previous transactions making restarting the process impossible.
  • the solution is a mirror resource that mirrors inter-process results for a running process.
  • the client or the client proxy maintains an object for the mirror and when the self-healing services restart the service(s), the client can continue the process with the mirrored interim results.
  • individual registrars may be responsible for tracking the enterprise leases for all services listed in their respective lookups.
  • the registrars are responsible for notifying each other through replication and the like (and possibly the enterprise repository) of a lease to a expiring service.
  • specialized enterprise leasing services track individual leases for services and notify the directories (domain level and possibly enterprise level) whenever an enterprise lease expires.
  • NW service leases the main construct is to de-list any service that has failed in any directory that the service is visible to clients (i.e., domain registrars and enterprise repositories).
  • the premise is that all enterprise leases are managed in the local domain that the service is running. Some component(s) in the local domain (i. e., one or all local domain registrars or a leasing service) must recognize that a service's enterprise lease has expired. The service must then be de-listed from local directories that client can access and then re-listed in non-local directories that clients can access. Enterprise leases are managed at the domain level while the resources that they reserve might concern a service that is available to clients across the enterprise. Such is the case when a service registers itself locally, making itself visible to local clients, and then makes itself visible to non-local clients (i.e., clients in non-local domains).
  • Registering in non-local domains requires that a service list itself with enterprise repository 926 to make itself visible to clients in non-local domains. Therefore, whenever an enterprise lease expires in a local registrar, that service must be de-listed from the local registrar(s) and then the lease expiration must be communicated to enterprise level directories in order to make that service invisible to potential clients.
  • Several mechanisms are useful for this task depending on the functionality of registrar 914 .
  • the first leasing mechanism involves an individual registrar managing only the enterprise leases for service that it registered. It is expected that self-contained registrar models that operate only at the domain level, such as Jini technology registrars, will utilize this mechanism. In accordance with this mechanism, when a lease expires in a registrar, clean up is automatic and the registrar does not communicate the lease expiration to either other registrars in the local domain or to the enterprise repository. In this case, each registrar is responsible for managing its own leases as eventually the failed service's enterprise leases will expire in all of the registrars that it registered (i.e., local registrars 914 A 1 - 914 AN).
  • a scavenger daemon is a background service that compares the contents of registrar's lookup table between scheduled checks. Registrar entries for services that have been cleaned up between checks, for whatever reason (i.e., enterprise lease expiration, explicit shutdown, etc.), will be communicated to enterprise repository 926 . Enterprise repository 926 can then de-list the service from the registrar's address from its directory. If the service has only one associated URL, then the service is completely de-listed from the enterprise repository's lookup and the service will be rendered invisible to potential consumers.
  • each of registrars 914 A 1 - 914 AN communicate lease expirations from their respective directories directly to enterprise repository 926 .
  • Direct communications between registrar 914 and enterprise repository 926 is possible only if registrar 914 maintains a reference or address for enterprise repository 926 itself (or possibly for enterprise repository lookup 916 , which can then be accessed by the registrar). In that case, when a service's lease expires, registrar 914 communicates the lease expiration to enterprise repository 916 .
  • Enterprise repository 916 can then de-list the reference to the registrar from its lookup or, if only one URL address/reference is listed, enterprise repository 916 can then de-list the service completely as described immediately above.
  • registrar 914 may or may not provide clients and consumers with a reference or location information (URL) for enterprise repository 926 .
  • URL location information
  • Certain domain level registrars notably Jini technology registrars, do not themselves provide multi-tiered domain structures (i.e., a local level and non-local or enterprise level). Those domain level registrars cannot be easily modified themselves, but can be integrated with enterprise-scoped directory services to expand service visibility to enterprise range.
  • a reference to a “find” service such as enterprise repository lookup service 916 A, is held in the registrar's lookup.
  • Enterprise repository lookup service 916 A is then utilized by local clients and service for finding enterprise level directories, and finding or listing service in those directories.
  • enterprise lookup service 914 A looks up an enterprise repository and then registers the service by listing the service's attributes and the service's registrars' URLs in the enterprise repository.
  • enterprise lookup service 914 A looks up an enterprise repository and finds a service listed in enterprise repository 926 based on the attributes listed for the service.
  • Enterprise lookup service 914 A either returns the service's registrars' URLs to the client and the client accesses the registrar for the service proxy, or alternatively enterprise lookup service 914 A accesses one of the service's registrars directly and causes that registrar to pass the service's proxy to the client.
  • enterprise repository 926 is treated like any other service and a reference for enterprise repository 926 is copied directly into registrars 914 .
  • enterprise repository lookup 916 would check for enterprise repositories starting up or shutting down and list or de-list the repositories accordingly. Newly-launched services, as well as local consumers, can then discover enterprise repository 926 from the reference in the registrar without having to access a separate lookup service for the address.
  • registrars 914 A 1 - 914 AN can replicate service registration information and lease updates directly to enterprise repository 926 without the need for trawling and scavenger services.
  • Replication between registrars 914 A 1 - 914 AN is unnecessary if services are responsible for discovering all registrars in their respective local domains (e.g., registrars 914 A 1 - 914 AN in local domain A), and if the individual registrars are responsible for their own lease management. Otherwise, the separate registrars' lookups must be reconciled with one another by including one another's updates.
  • the simplest means for rectifying registration and leasing information between registrars is through a replication mechanism.
  • registrars 914 A 1 - 914 AN provide a replicating service for replicating listing changes (i.e., registrations, lease expirations, lease renewals, explicit shutdown or reset, etc.) to each of the other registrars in the domain.
  • registrar 914 may have a reference to enterprise repository 926 . If so, then the enterprise repository could also be updated from the registrar during replication. In that case, domain services 910 would then be relieved from the responsibility of registering with all of registrars 914 A 1 - 914 AN in the domain, as well as renewing leases with all registrars in the domain. A service merely discovers one registrar in the domain and registers with it. The registrar replicates the registration information throughout the domain and to enterprise repository 926 if necessary. However, if the registrar known to the client fails or becomes unresponsive to the client, the client must discover and register with another registrar prior to the enterprise lease expiring.
  • the individual services are responsible for replicating service related information throughout the local domain. Services discover all running registrar services in their local domain and then register themselves with each registrar. Additionally, services make and renews enterprise leases with the individual domain registrars. In that case, the client also registers with all newly-launched registrar services in its local domain and, through a process that will be described below, registers with enterprise repository 926 if the service desires to be visible and usable by non-local clients.
  • a series of enterprise repository services are responsible for trawling the registrars 914 for registrations and promoting any enterprise-visible service registration up to the enterprise level. Enterprise lease expirations are handled by comparing the content of the registrar's lookup between trawls.
  • NW services may make themselves visible to clients in their local domain or may intend to the visible to all enterprise clients, whether local or non-local.
  • Enterprise repository 926 provides a lookup service for clients, but at an enterprise level (non-local) rather than domain level (local) registration provided by domain registrar 914 .
  • registering a service outside its local domain is the responsibility of either the service itself, enterprise repository lookup service 916 A or a series of enterprise registrar services that trawl local registrars 914 for registrations.
  • Each of these mechanisms promote any service wishing to be visible outside its local domain the means to be enterprise-visible, through registration at the enterprise level.
  • enterprise repository 926 is a directory for clients needing a service.
  • Enterprise repository 926 provides a means for non-local clients to access services that are not available in their own domains. Therefore, the lookup for enterprise repository 926 must include, at a minimum, all attributes for listed services, along with addresses (URL addresses or host names or some other references) for the services' registrars. With that information, a potential consumer can look up a needed service by its attributes and, by using the associated URL, go to one of the service's registrars for a proxy to the service.
  • the enterprise utilizes multiple enterprise repositories 926 that are strategically located around the enterprise's geographic domain.
  • a potential service consumer might access any of enterprise repositories 926 for finding a service. Therefore, each of enterprise repositories 926 must list all running services in the enterprise that wish to be visible to clients in non-local domains (i.e., at the enterprise level).
  • enterprise repository 926 must replicate service information received from enterprise registrars with every other enterprise repository in the enterprise.
  • the Lightweight Directory Access Protocol is a protocol used to access directory listings and is supported by web browsers and e-mail programs, and the like, which can query a LDAP-compliant directory.
  • LDAP provides a common method for searching e-mail addresses on the Internet, similar to a global white pages.
  • LDAP is a sibling protocol to HTTP and FTP and uses the ldap://prefix in its URL, thus familiar to use.
  • LDAP provides good replication around the world and therefore provides the necessary level of replication needed for an enterprise repository.
  • the LDAP protocol and directory also have shortcomings which make them unsuitable for use as an enterprise repository in the present invention.
  • LDAP directories do not support all of the configuration information for a container that is necessary for launching a service in that container.
  • the LDAP directory is not able to store logical domain mappings that are defined along any relevant dimensions (e.g., geography, line-of-business, etc.). This aspect of the present invention will be discussed below with the description of the DataBus service.
  • enterprise repository 926 supports all service attributes that may be used by a client for finding a service. These attributes are available to local clients in registrars 914 A 1 - 914 AN and therefore must be available in enterprise repository 926 for a client to find a service in a non-local domain. It should be remembered that a client finds a service that it needs by comparing the type and attributes for the services running in the enterprise and are listed in a lookup to the attributes needed by the client. Service lookup is based on type and attributes and not on unique name, and therefore the enterprise repository must support service type and attribute information.
  • LDAP Another shortcoming with LDAP is that it was never intended to store database schema. Services that use a resource which must be local must be able to automatically provision that resource. For instance, if a service uses a database locally, it must be able to start with a completely empty database, adding the tables needed on the fly. To do this, database schema information is stored in enterprise repository 926 by any method, including proprietary. XML-based schemas (Extensible or XML Structure Definitions (XSD)) are popular because they can be created with any XML tools.
  • XML-based schemas Extensible or XML Structure Definitions (XSD)
  • NW service must be mobile from the point of view of machine-specific configuration information.
  • Configuration information cannot be tied to a specific machine because the service might run anywhere, and configurations cannot be redefine at runtime. It must be available from anywhere in the world, and a service must be able to be launched using configuration information that is not local to the service. To do this, all configuration information is stored in enterprise repository 926 and replicated throughout the world on other enterprise repositories. Launch scripts access enterprise repository 926 to get the configuration information and forward the configuration information to VM container 910 A where the service is launched. Therefore, in accordance with another exemplary embodiment of the present invention, enterprise repository 926 supports all configuration information needed by a VM container to launch a service and the configuration information needed by the service itself.
  • VM container services might be considered as an integral part of the operating environment.
  • NW services such as those that run inside VM containers, must be programmatically launched from a remote location according to the NW conventions.
  • the administrator In order to launch a service in a specific container, the administrator must have the configuration information for the VM container that the service will run in, as well as configuration information concerning the service itself.
  • enterprise repository 926 contains all configuration information for every VM container service currently running in the enterprise, so an administrator merely accesses the repository for all container configure information.
  • the container when a service is launched in a container, the container is provided with certain configuration information, including the service's codebase.
  • the codebase contains the URLs of the code servers which are able to serve up the service's code. Therefore, when the service is launched, its code is loaded from HTTP servers at a remote location, for instance from HTTP server 920 A.
  • enterprise data is no longer owned by an application but instead is owned by the enterprise.
  • Enterprise data is, however, stored at various locations around the enterprise in specialized resource servers called “entity” servers.
  • entity specialized resource servers
  • Separate entities will generally be housed in separate storage servers. Even a given entity is likely to be physically partitioned across many separate storages. Partitions of a given entity are often collocated at a given operations center, but the same entity might alternatively be physically partitioned across geographically distributed sites, for example, by siting one subset of customer data in the U.S. and another in Europe.
  • Logical domains are used to narrow the context of an operation to a scope that is smaller than the entire enterprise. Logical domains are, in a sense, orthogonal to the dimension of entity type or subject area, and thereby cut across different entity boundaries. These could be along geographic lines or along lines of business, or according to some other classification.
  • the multi-hop finder is used for finding any particular data object of interest. Entity instances can then be found from anywhere in the enterprise, no matter where it is physically located, by a Primary Key (PK).
  • PK Primary Key
  • a multi-stage finder strategy allows the navigation to any entity instance from anywhere in the enterprise given its primary key. This strategy, of course, requires that a primary key is mapped onto the partition number where the entity is stored. Mappings from the PKs onto respective partition numbers that uniquely identifies a relevant container where the entity is stored are then stored on the enterprise repository.
  • enterprise repository lookups 916 A-N are also included in each of domains A-N, respectively.
  • Enterprise repository lookup 916 is an alternative embodiment as its functionality may be incorporated directly into each of domain registrars 914 A 1 - 914 AN and is therefore represented in the Figure as a dashed block.
  • the sole function of enterprise repository lookup 916 is to track the location of at least one enterprise repository 926 for newly-launched services wishing to be visible outside their local domains, and for clients needing to find a service from outside their local domains.
  • N enterprise repositories are used which tends to prevent the administrative interactions and discovery/registration and find stages from becoming a bottleneck.
  • NewWave services are mobile, in other words, the services can be quickly deployed on any machine, anywhere, without human intervention.
  • NW services can be launched on a server without any code specific to the service being pre-installed on the server and without any configuration information being pre-installed on the server. All resources used by the service can be accessed remotely and are not dependent on the resource being present on the local machine. Databases can be created on the fly by a service which creates the necessary database tables from a schema that is likewise remotely loaded. Additionally, NW services can be launched on a server without an administrator logging onto the server to initiate the launch. Re-homing of services is also performed at runtime from one server to another without human intervention.
  • the NW service platform deploys many HyperText Transport Protocol (HTTP) servers in place to serve up code, that is, Java class files and resources.
  • HTTP HyperText Transport Protocol
  • a plurality of web servers 920 A to 920 D are also located in the enterprise.
  • Each HTTP web server (HTTP Daemon) 920 A- 920 C holds a plurality of mobile code 922 A- 922 C including, for example, service code 922 A, application classes 922 B and vendor code 922 C.
  • the service supplier indicates the URL address that identifies where which one of servers 920 A- 920 C service code 922 resides, which can be essentially anywhere on the Internet.
  • the API method allows a requestor to start a service executing in the service container, supplying parameters that identify the URL for the code-base of the service code, the fully-qualified class name of the Java object that is the service's root object, and initialization payload object.
  • Other methods are provided to allow a service to be abruptly shut down, allow the service to be gracefully quiesced (requested to stop accepting incoming requests, but carry to completion in-flight requests), and allow one to query whether the service is in a quiescent state.
  • a generic service container service such as VM container 918 A loads code 922 via one of HTTP web servers 920 A- 920 C and runs the service in its own thread of control.
  • transaction managers 912 A 1 - 912 AN are available for creating transactions which are used for the purpose of transacting with host servers.
  • transaction managers 912 A 1 - 912 AN are NewWave service and as such discover and register with local registrars 914 A 1 as any other service.
  • a unit-of-work is managed by transaction managers 912 A at the domain level.
  • the NW approach to transaction semantics relies on a transaction that is passed around like a football each time a service request is made.
  • transaction managers 912 A The distributed nature of transaction managers 912 A is facilitated by the highly-distributed world of the NW services. Any service, running anywhere, needs only to find a transaction manager running close by. If load is high, up to N transaction managers may be deployed across a domain thereby allowing highly-distributed services to gain access to a transaction manager and for scalability—as load increases the transaction manager does not become a bottleneck.
  • all transactions have a lease associated with them, similar to the NW services described above.
  • a transaction has a predetermined time-to-live.
  • Transaction manager 912 issues enterprise leases on newly-created transactions in much the same manner as registrar 914 issues enterprise leases on services. However, the participants in the transaction can renew the lease if the activity takes longer than expected, but absent a renewal, an uncommitted transaction will expire and roll back.
  • Any NW service which maintains state about other services or clients should implement a leasing scheme to keep its state clean.
  • resources used in the GIB that are expected to participate in transactions must be managed by resource managers exposing a two-phase commit interface, such as XA or the Jini transaction participant interface.
  • a typical resource manager is a database management system, for example, Oracle or Versant.
  • FIG. 8 enterprise network elements might be NW-enabled and thus access NW services on GIB 802 by incorporating NW distributive intelligence services 824 onboard.
  • network elements 824 plug directly into GIB 802 .
  • the network elements implement the relevant XA interfaces XAResource and XAConnection so that it could participate in the transaction as part of a transaction.
  • NW services In the NewWave environment, an application is a collection of services operating in concert with each other. These NW services may or may not know of each other, but their collective action makes up the functional whole that is an application. To work as an application, NW services “find,” communicate and function with one another.
  • NW services can be found, either locally (within a multicast domain), within a non-local domain, or anywhere in the enterprise. Services register in lookups by their respective attributes and interfaces, and thus they are found by whatever attributes with which they service registers. Locally, a service registers with all domain registrars in the service's local domain. Non-locally, a service that wishes to be visible to clients from outside the local domain registers with an enterprise level registration and lookup service, the enterprise repository. The transition from local level to enterprise level visibility is bridged by an enterprise repository lookup that provides a reference to an enterprise repository for services and clients in a local domain.
  • NewWave services communicate differently, depending on the type of service and the level of coupling between services desired.
  • a distributed intelligent agent for network elements for instance, is normally highly de-coupled, depending on little and thus able to continue processing regardless of the state of other NW services. It generally relies on highly, de-coupled forms of communication.
  • the following different forms of communication are supported in the GIB:
  • Tightly coupled The service implements a remote interface with exposed methods. Clients find the service and make specific requests of it by calling methods on the interface. The coupling is reduced by registrar lookup, thus still a code-level dependency between client and service.
  • Two-way tight coupling The client opens a session of some sort with the service.
  • the service maintains state about the client. There is then a runtime dependency that exceeds a single request.
  • a client registers with a service to be notified when certain events occur.
  • There is a direct runtime dependency as the service will hold a reference to the client (listener). However, the reference will be generic. The service will not know the actual interface of the client beyond the listening interface. This minimizes compile-time dependency, but still has runtime dependency. This essentially is a session between client and service, the service could be blocked while the notification is sent, and transaction semantics must be handled carefully. This is good is some circumstances to reduce messaging traffic by having notifications directly from the source to the listener with no intermediary.
  • Loosely coupled, peer-to-peer Messages are sent through an intermediary, but directed to a particular destination by name. In this case, client and service know about each other, but only via a destination name as they can never directly access each other.
  • Loosely coupled, publish-subscribe Messages are sent to a topic queue and are delivered to destinations that have issued subscriptions for particular kinds of messages. The sender and receiver of the message are never aware of each other at all. The only coupling is on message topic and message attributes.
  • Loosely coupled, XML Messages are sent via publish-subscribe or peer-to-peer, but contains only XML, no objects. This removes any class-level dependencies. This is good when unrelated components are involved.
  • a client or service acting as a client finds a target service via a registrar lookup or some other means, obtains a proxy to the target service, and calls methods on the proxy.
  • a proxy in accordance with the present invention, may communicate to the target service by any means.
  • One exemplary method is Java Remote Method Invocation (RMI).
  • the proxy communicates back to its service via direct sockets, IIOP, HTTP, JMS messages or any other middleware.
  • the communication method selected for these transactions must be able to be reasonably effected from the client meaning that it cannot rely on the installation of any runtime component on the client.
  • Code is remotely loaded from the codebase, but must be limited in size. It can be reasonably assumed that sockets, IIOP and HTTP would be generally available.
  • RMI provides remote loading of arguments to the method call via the codebase.
  • NW services accept requests to receive notifications from listeners and are used for certain administrative events. However, a service can use this model to extend the way in which it interacts with all clients. In this model, NW services maintain event notification registrations, and directly call each listener when an event occurs matching the event registration. Each listener must first find a service and then makes a registration. All event registrations are maintained and the service accepts lease renewals and cleans out registrations when their lease expires. Services have the proxies to the listeners loaded in their respective virtual machines, requiring the remote loading of all required classes and the services will block waiting on a reply from each listener.
  • This mode of interaction is moderately coupled because the interaction is through standard listener interfaces, rather than specific service interfaces, but it is more coupled than the loosely coupled approaches below. However, it is appropriate for some types of interactions as it is faster than the more loosely coupled approaches and useful when the client must find the service anyway.
  • Messaging involves the sending of peer-to-peer and publish-subscribe messages through an intermediary.
  • a variety of messaging services are available, including the Java Message Service (JMS) specification as the interface for messaging (available from Sun Microsystem Corporation).
  • JMS Java Message Service
  • a client could publish a message to a topic queue or send a message to a logical destination. Subscribers would receive a publication if their subscription matched the message published. Loosely coupled interactions can be made even looser by using XML as the primary message format.
  • JMS messages can include objects, but this adds a code-level dependency between sender and receiver; however, XML schemas or XML document-type definitions are not code level dependent.
  • the platform provider, the supplier of services (programs) and the consumers of services are often all the same corporate entity, residing within the same enterprise.
  • the NewWave infrastructure fills the gap left by other paradigms by providing a dynamic service deployment architecture, that is not domain bound.
  • a service provider/supplier launches its services onto host servers at their own enterprise facilities, or at a third-party facility, through the exercising of administrative APIs and/or an administrative console application.
  • This model of dynamic service deployment onto awaiting facilities is radically different from more traditional hosting arrangements that might involve extensive business negotiations.
  • a service provider deploying its services onto live hosts out on the network amounts to API calls—not phone calls to support personnel.
  • the present invention service deployment platform simply applies this software container concept to backend-hosted services. Every server in a hosting facility runs at least one of generic container processes (VM container) into which service deployers inject the code for their services.
  • VM container generic container processes
  • the actual implementation code gets served up from any ordinary web server (http daemon) located anywhere in the Internet.
  • FIGS. 10 and 11 depict launching and registering service in a local domain or the enterprise, as and well as looking up a service that is running either locally or non-locally, and then interacting with the service in accordance with an exemplary embodiment of the present invention.
  • FIGS. 10 A- 10 C at diagrams that depict the logical flow of the processes depict on corresponding flowcharts in FIGS. 11 A- 11 C.
  • FIGS. 10A and 11A are a diagram and flowchart, respectively, depicting a process for launching and registering service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention.
  • the process begins with an administrator 1004 searching enterprise repository 1026 for suitable VM container to run a service (step 1102 ).
  • a VM container is merely a service and, as such, can be defined by name or as a set of attributes under which it is registered.
  • NW services defer enterprise visibility, it is expected that due to the unique nature of VM container processes, as compared to most other NW services, containers will be registered, and thus visible, at the enterprise level for ease of interaction with service providers that need specific VM container attributes.
  • VM container For example, many services, perhaps most, run perfectly well in a generic VM container. Others, however, need a particular resource to be local to the service as it runs (e.g., as database, rules engine, etc.)
  • the administrator can, therefore, analyze all enterprise VM container services for necessary attribute and select only the VM container(s) that have attributes matching the service's requirements. Once administrator 1104 has selected a group of candidate VM containers, the administrator can further differentiate between specific VM containers by logical location based on the URL address of the containers matching the requirements.
  • administrator 1004 launches the service in the selected VM container by passing a reference (URL address or host name) for the HTTP server holding the service code to the VM container (step 1104 ). With URL, the VM container fetches the service code from the HTTP server at runtime (step 1106 ) and the service begins running in the container (step 1108 ).
  • a reference URL address or host name
  • NewWave uses multicast packets to allow service provider processes and consumer processes to spontaneously discover lookup servers within multicast radius, thus bootstrapping the process of registering and finding services.
  • Local registration involves the service broadcasting of a message to all registrars in the domain and then registering with them.
  • Enterprise registration involves service 1010 A using a “Find” service to find an enterprise level directory and then registering there. Local registration begins with registrar discovery, or service 1010 A broadcasts multicast “ping” into the multicast radius that defines the local domain, domain 1002 A (step 1110 ).
  • service 1010 A can register locally with registrar 1014 A.
  • Service 1010 A registers by passing information to registrar 1014 A that makes service 1010 A visible to clients looking for a service in domain 1002 A and information that facilitates clients' interaction with service 1010 A step 1114 .
  • Service 1010 A registers with local domain registrar 1014 A by passing registration information to registrar 1014 A, including service attributes (name(s), domain-type information and implementation interfaces). The registration information may also include administrative information such as display icons or user interface objects for an administrator to use.
  • service 1010 A must pass a serialized proxy object (Obj. in the Figure) to registrar 1014 A which will be passed to clients looking up the service.
  • the proxy includes code and a codebase for fetching service code for implementing the proxy.
  • the service code is remotely located in an HTTP server, server 1020 for example, and the codebase contains an address for that server.
  • service 1010 A is registered locally with registrar 1014 A making it visible to any clients looking in registrar 1014 A.
  • service 1010 A is not visible clients located in non-local domains. To be visible to more than just local clients, service 1010 A must register at the enterprise level in an appropriate enterprise directory—enterprise repository 1026 is such a directory.
  • enterprise repository 1026 is such a directory.
  • hopping from a local level domain to an enterprise level has been a shortcoming of the prior art that heretofore has been insurmountable. Services can discover only those services that are within their own multicast domain because the multicast message is not transmitted beyond the multicast radius. Therefore, another mechanism is necessary for “finding” non-local directories in order to make service 1010 A visible to clients which look up service in them.
  • a service wishing to be registered at the enterprise level utilizes a “find” service to find enterprise level components, such as enterprise repository 1026 , that are not in their multicast domain.
  • the “find” service is represented in the Figure as enterprise repository 1016 A and as a service running in domain 1002 A and it is listed in domain registrar 1014 A. Therefore, a service wishing to be visible to a client located outside its local domain need only look up enterprise repository lookup service 1016 A while registering with the registrar (step 1116 ). As will be described below, service 1000 A retrieves a proxy from the registrar for interacting with enterprise repository lookup service 1016 A (not shown in the Figure). Service 1000 A then requests enterprise repository lookup service 1016 A to service “finds” enterprise repository 1026 and register it with the repository (step 1118 ).
  • Service 1000 A passes its registration information, usually limited to its service attributes and also the address of all registrars with which it is registered, registrar 1014 A (URLs) to enterprise repository lookup service 1016 A.
  • Enterprise repository lookup service 1016 A finds an enterprise repository in the current example enterprise repository 1026 and registers a newly-launched service with that enterprise repository.
  • Service 1000 A is now running in domain 1002 A and registered for clients that may be located in local domain 1002 A or any non-local domain.
  • FIGS. 10B and 11B are a diagram and flowchart, respectively, depicting a process for finding and implementing a local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention.
  • client is used herein to represent any consumer or user of a service, notably, many clients or other services, especially another service that builds upon more primitive services.
  • a client may also be any application, software module or tool that utilizes the processes of a service, or alternatively, a client might refer to an end-user in the enterprise.
  • a client perceives a need to invoke a process, but in accordance with an exemplary embodiment of the present invention, the client need not identify the service by its interface, as is common in the prior art. Instead, client 1008 might identify the service process by some service attribute that is important to the client.
  • a client need not know the identity of the service it wishes to invoke or even where the service is running in the enterprise.
  • Client 1008 uses the identical multicasting processes described above with respect to FIGS. 10A and 11A to find registrar 1014 A (not shown).
  • registrar 1014 A not shown.
  • the lookup process begins with client 1008 perusing one of the local domain registrar, here domain registrar 1014 A, for a needed service (step 1122 ).
  • Client 1008 searches local domain registrar 1014 A's lookup for services with service attributes matching those needed.
  • client 1008 Once a service is identified, client 1008 has no information whatsoever about the running service (e.g., its location, its configuration information, implementing code). Therefore, client 1008 retrieves, and registrar 1014 A returns, a proxy or object (Obj. in the Figure) to use for interacting with the selected service, service 1010 A (step 1124 ).
  • the code for the proxy is loaded remotely in the client space through its codebase.
  • the proxy fetches service code at runtime from HTTP server 1020 using URL in the proxy's codebase (step 1126 ). This code in invisible to client 1008 .
  • Client 1008 uses a series of APIs to interact with the proxy, but the client actually intends to interact with a remote service (step 1128 ).
  • Client 1008 might actually be communicating client requests to remote service 1010 A as its thinks.
  • client 1008 may be interacting only with the remotely-loaded service code and the code is locally performing logic to process the client requests in the client's own space.
  • client 1008 may be communicating client requests to multiple remote services, via the service code, which may or may not be the service selected by client 1008 . This feature allows a client's requests to be processed anywhere and in any manner that is convenient to the enterprise.
  • the service may have been provided by any vendor that produces service with attributes that matches the client's needs.
  • the attributes listed with the registrar's lookup might remain constant, throughout the lifecycle of the service its functionally or resource requirements might change (i.e., a service that utilized a particular OEM's resource might switch to another's resource).
  • Loading and scope parameters can be managed by hooks implemented in the service code that interact with different services based on dynamic parameters, such as the time of day, day of week, frequency of use, bus loading, service loading, history, complexity of the application running the service.
  • FIGS. 10B and 11B illustrate a mechanism for finding and implementing a service that is local (the local hop or first hop) while FIGS. 10C and 11C illustrate a mechanism for finding and implementing a service that is not local (referred to alternatively as the non-local, enterprise or second hop) in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention.
  • service 1010 A registers itself with domain registrar 1014 A in exactly the same manner as was described with respect to FIGS. 10A and 11A, above.
  • client 1006 located in domain 1002 B, must find and implement a service.
  • the process begins with client 1006 searching local domain registrar 1014 B's lookup for a service that matches service attributes needed to accomplish some task (step 1132 ). However, rather than finding a service, local domain registrar 1014 B returns a fault.
  • client 1006 cannot see outside its local domain, so client 1006 must implement a local service for finding an enterprise level directory; that service is enterprise repository lookup 1016 B.
  • Client 1006 looks up enterprise repository lookup service 1016 B in domain registrar 1014 B's lookup and returns a proxy for enterprise repository lookup 1016 B that is used to interact with the service (step 1134 ). Client 1006 then interacts with enterprise repository lookup 1016 B, through its proxy, for finding the service it needs somewhere in the enterprise (step 1136 ).
  • enterprise repository lookup 1016 B searches for an enterprise repository from which to access its lookup and find a service (step 1138 ).
  • Enterprise repository lookup 1016 B finds enterprise repository 1026 , and then accesses its lookup for a service that matches the service attributes required by client 1006 .
  • enterprise repository lookup 1016 B returns an address (URL address, host name or some other reference) for the non-local domain registrar with which the service is registered, domain registrar 1014 A.
  • enterprise repository lookup 1016 B attempts to find a service that matches the requirements of client 1006 in domain registrar 1014 A's lookup (step 1140 ).
  • Domain registrar 1014 A returns a proxy object (Obj.
  • the proxy fetches service code at runtime from HTTP server 1020 using URL in the proxy's codebase (step 1144 ). Again, this code in invisible to client 1006 , and although client 1006 intends to interact with remote service 1010 A using APIs for the service, the code might redirect or locally process the calls (step 1146 ). Thus, while client 1006 might intend to communicate with service 1010 A, the actual computations may be performed by logic in the service code locally, in the client's own space. Alternatively, client 1006 's request might be processed by remote service 1010 A, or by some combination of remote services such as service 1010 B (that is actually local to the client).
  • FIGS. 12 A- 12 C are flowcharts depicting the methodology implemented in registrar 914 for providing the four primary NW functions in accordance with exemplary embodiments of the present invention. It should be understood that these services (domain level listing/lookup for services; resource leasing; enterprise level service listing/lookup; and replication) are available or necessary for each embodiment of to the present invention. Because some of theses service are performed simultaneously, the four registrar services are illustrated in three separate flowcharts.
  • FIG. 12A is a flowchart depicting the process employed by the registrar for registering services in accordance with an exemplary embodiment of the present invention.
  • FIG. 12B is a flowchart depicting the process for enterprise leasing in accordance with an exemplary embodiment of the present invention
  • FIG. 12C is a flowchart depicting a process employed by the registrar for looking up a service in accordance with an exemplary embodiment of the present invention.
  • the service registration process begins with the registrar in a listening state, waiting for messages to arrive on the network.
  • the signals may be generated by a service (including a container service) or a client (any consumer or user of a service) located in a local or non-local domain or in another registrar in the local domain, thus allowing for many possible permutations for incoming signals.
  • a ping( ) is handled first. If, at step 1202 , the registrar receives a ping( ), the registrar immediately returns (pong( )) its location to the service initiated the ping( ) (step 1204 ). The registrar then waits for the service to return its registration information.
  • step 1202 If, at step 1202 , no ping( ) is received, the process flows to step 1206 where a check is made to determine if registration information has been received by the registrar. If the information has not been received by the registrar, the process iteratively reverts to step 1202 until registration information is received.
  • the registrar is merely in a listening state, listening for events and messages that it must process.
  • Checks 1202 and 1206 merely represent an iterative process used to simultaneously listen for both a ping( ) and registration information from a variety of services in the domain.]
  • the process continues to step 1208 where the registrar receives registration information about the service, which may include attributes for helping clients find services such as one or more name, domain-type information, implementation interfaces (i.e., what the service does for a client or a description of the service's functions). Additionally, the registration information may contain administrative information for manually administering the service, such as a display icon or a user interface object. Finally, the registration information may contain a serialized proxy object. It is possible for there to be cases where a service registers with only a URL or host name, but as a practical matter, most clients will need a proxy to interact with the service. Clients access the service with the proxy.
  • the proxy could then contain any code which could be executed in a client environment before, after or instead of forwarding the request.
  • the type of proxy may invoke services and functionality unknown to the clients.
  • the proxy might call more than one service for concurrently executing the client's request.
  • the proxy might call for services executing ancillary functions unrelated to the client's service request (e.g., a client might intend to execute a network management function (profit center) and proxy calls billing services (cost center) to perform client and billing procedures that are ancillary to the client's request).
  • the proxy also contains a codebase which is, at least, the URL address of an HTTP server which contains the implementation code for the proxy. That URL is used when the proxy is passed to a client to load the implementation code to the client, unbeknownst to the client.
  • the registrar may check the lookup for an instance of the service (step 1210 ).
  • the domain registrar will receive registration information only from services wishing to register themselves in the registrar's domain.
  • the domain registrar will receive registration information from another registrar in the local domain through a domain level replication process.
  • the present flowchart envisions either eventuality.
  • the domain registrar of the present invention is extremely flexible.
  • a domain registrar may communicate changes in its table to any service that is listening, for instance at the local domain to other registrar, re-start services, trawling services, scavenger daemons, enterprise repository lookup services and find services.
  • the registration information is from another registrar in the local domain, it might be possible for a record of the service to already exist in the lookup table. This record might exist due to a previous replication from another third registrar, or from a re-start and re-registration where the service was not properly communicated to all of the other registrars throughout the local domain. While either of these cases is unlikely, it is good practice to continually monitor the registrar's lookup table for duplicative registrations. Therefore, if a copy of the service's registration information exists in the registrar's lookup table, it should be assumed that the service was re-started and the enterprise lease for the service should then be extended (step 1224 ).
  • enterprise leases it is possible for enterprise leases to be managed independently at each registrar in the local domain (assuming that more than one instance of a registrar exists), or managed at one registrar, typically the registrar that initially registered the service. That registrar would be expected to communicate the lookup information to all registrars throughout the domain. Thus, if the service registration information received by the current registrar is from another registrar in the domain and that registrar manages that service's enterprise lease, the process would then end without renewing the service's lease.
  • the registrar makes an entry for the service in the lookup table (step 1212 ).
  • attribute information would be listed in the registrar's lookup table for easy access when looking up services corresponding to clients' requests. Administrative information and the serialized proxy object may be stored separate from the attribute information in another location, but referenced from the attribute information for quick retrieval after a match has been found.
  • the registrar determines whether or not the registration information has been received directly from a newly-launched service or another registrar (step 1214 ). If the registration information is not directly from the service, the registrar then creates an enterprise lease for the newly-registered service, assuming that each registrar in the domain manages its own leases (step 1224 ). The process then ends.
  • step 1214 if the information has been received from the service directly, it is the responsibility of the registrar to replicate the information in each of the registrars in the domain. In that case, the registrar must update the enterprise repository with registration information from each service wishing to be locally visible in only the local domain (step 1216 ). Next, the registrar determines whether the service intends to be visible in only the local domain (step 1218 ). If so, the process reverts to step 1224 where the registrar creates an enterprise lease for the service and then the process ends.
  • the registrar passes the registration information to the enterprise repository.
  • finding the location of the enterprise registrar may be performed internally, inside the registrar, or externally via an enterprise repository lookup. If registering with the enterprise repository is handled internally, the registrar merely looks up the enterprise repository's location (step 1220 ) and passes the device's registration information to the repository step (step 1222 ). Otherwise, the registrar looks up the location of the enterprise repository lookup and passes the device's registration information to the enterprise repository lookup (step 1220 ), which in turn passes the device's registration information to the repository (step 1222 ).
  • the client can pick up the host name, or URL, for a registrar in the service's domain. From there the client can retrieve the serialized proxy in the same manner as if the client had retrieved it from a local registrar.
  • all services have an entry in the enterprise repository, even though some are not visible in non-local domains because it is expected that administrative functions will almost always be performed at the enterprise level. Administrators can then access administrative information, icons, interface and other service tools for services that are not visible in the non-local domains (enterprise) which is especially important for launching a service. Since containers are service, there might be a case where the intent is not to be visible in the enterprise, but be available for administrative use (i.e., launching a new service).
  • the registrar must create a lease for the newly-started service (step 1224 ) prior to ending the process.
  • FIG. 12B a flowchart depicts a process for managing enterprise leases in accordance with a preferred embodiment of the present invention.
  • Every service running in any of the enterprise's domains must have a lease.
  • the service must periodically renew the lease or the registrar will dispose of the registration, thus allowing the registrar to remain stable. If a service goes away or is inoperative, the lease will not be renewed and the registrar will eventually clean up its tables.
  • the principle of lease management is a fundamental principle of the NW infrastructure and is used throughout the GIB. Any GIB service which maintains state about other services or clients should implement a leasing scheme to keep its state clean.
  • Services typically run a background thread that periodically wakes up to perform the lease-renewal chore.
  • a service remains registered only so long as it keeps expressing interest via lease renewal.
  • the renewal is passed, if necessary, from the registering registrar to other local registrars or to the enterprise repository. However, the task of lease maintenance might be left to the registering registrar and renewals are replicated around the enterprise.
  • Lease maintenance is a continuous process that always reverts to an enterprise lease monitoring state (step 1230 ). Leases remain valid for a predetermined amount of time. That duration of time may be fixed or specifiable by the service making the enterprise lease. Therefore, the registrar must have a sense of time from which to make expiration determinations, for instance, from outputs from the internal CPU oscillator clock. Whenever a lease is created, a counter may be initialized that, based on the duration time of the lease, counts down to a lease expiration event. The lease expiration event may be circumvented by the service renewing the enterprise lease anytime prior to an expiration event.
  • the registrar is cognizant of lease creation or extension events and lease expiration events. If, at step 1232 , the registrar detects an enterprise leasing or renewal event, the registrar must first identify the service associated with the event (step 1234 ). Next, the registrar creates or extends the service's enterprise lease by postponing the lease expiration event for a period of time equal to the preset lease duration (step 1238 ). The process may end here or in accordance with another exemplary embodiment of the present invention, the registrar may determine if the container running the service is being fully utilized (i.e., the threshold amount of threads are currently being processed (step 1240 )).
  • a threshold number of services may be defined for a container and, whenever the number of services being run exceeds that threshold, the container service simply de-lists itself until some services' leases expire. Thus, if the threshold is not exceeded by the addition of the new enterprise lease, the process reverts to step 1230 where the registrar continues to monitor the enterprise leases.
  • the container can no longer support new services, so the registrar notifies the enterprise repository to make the container service invisible to potential clients (step 1242 ). It is expected that, in most instances, container services are discovered at the enterprise level most likely by an administrator; thus, the registration must be hidden at least the enterprise level. However, it is also possible that the container service may be discovered at the local domain level so each registration instance of the container service in the local registrars might also be hidden from view, depending upon the discovery process for containers. Once the fully-loaded container service is hidden, the process reverts to step 1230 .
  • the second type event being watched for by the registrar is a lease expiration event (step 1244 ). If one is detected, the registrar identifies the service whose enterprise lease expired (step 1246 ). Next, in accordance with an alternative exemplary embodiment of the present invention, the registrar determines if the container service is running at threshold capacity (step 1248 ). If so, the registrar notifies the enterprise repository to unhide the container service and make the container visible to enterprise clients looking for a service (step 1250 ). At this point, the registrar's listing of the container service must also be made visible if the container service was hidden in the registrar's lookup.
  • step 1252 the listing of a service whose lease expired must be removed from the lookup (step 1252 ) and that removal be replicated to the other registrars in the local domain (step 1254 ).
  • step 1256 the registrar must notify the enterprise repository that the service's lease expired and the service's registration information be removed from the enterprise repository (step 1256 ). The process then reverts to step 1230 .
  • FIG. 12C a flowchart depicts a process employed by a registrar in response to a “find” request from a client in accordance with a preferred embodiment of the present invention.
  • the present invention allows a service to register itself with a local registrar by providing service attributes in the registration to make it easier for clients to find and interact with the service. These attributes may include one or more names, domain-type information and/or the interfaces which the service implements. “Finding” a service is potentially a two-hop process for a client, a local hop; and if a suitable service is not found in the local domain, a non-local hop.
  • Registrars store all attribute information for each service running in their respective local domain for finding a service, and a proxy for each running service is passed to a requesting client to use for interacting with the service. While the registrar performs certain functionality associated with finding a service in its local domain, registrars do not provide attribute information for each service running in all non-local domains (i.e., the enterprise).
  • the enterprise repository provides a requesting client with a mechanism for finding a needed service in a non-local domain by listing all running services in the enterprise. A client needing a service that is not running in its local domain can access the enterprise repository for the location of a registrar having a running copy of the service.
  • the client can then go to that registrar for the service's proxy and interact with the service.
  • the enterprise repository also maintains a proxy for each running service in the enterprise so the client can get the proxy directly from the enterprise repository rather than going to the service's registrar.
  • the process begins with a registrar receiving a “find” request for a particular service (step 1270 ).
  • the client may be in the registrar's local domain and, in fact, with respect to the first, or local, hop the client is in the registrar's local domain.
  • the “find” request may have been referred to the present registrar by an enterprise repository.
  • the registrar then checks its lookup for service using information in the request, such as service name or any other attribute information in the request (step 1272 ).
  • the registrar decides whether or not the service is running in the local domain (i.
  • the service needed by the client may or may not be found in the local domain, and thus registered with the registrar and listed in the lookup table. It is, however, expected that administrators will attempt to locate services proximate to clients that utilize those services; therefore, in many cases the service needed by the client will be found on the first hop in the client's local domain.
  • the client may not be local to the registrar, but might have been referred to the present registrar by the enterprise repository.
  • the registrar gets the proxy object for the service from a storage location associated with the lookup table (step 1276 ) and returns the proxy to the requesting client (step 1278 ). The process then ends.
  • step 1274 if the service cannot be found by the registrar in its lookup table, then the registrar must pass the client request on to another registrar, albeit indirectly, in which the service is registered.
  • two alternate embodiments are possible. The first requires that the registrar track the location of at least one enterprise repository, while the second embodiment involves the registrar merely pointing to an enterprise repository lookup containing the location of an enterprise repository.
  • the alternate embodiments are brought about due to technologies for performing some of the registrar's functionality actually existing, and due to the varying ease in which these technologies may be transformed from a domain-type environment to an enterprise environment consisting of multiple domains.
  • next hop information may be either the location of the enterprise repository itself or might instead be the location of the enterprise repository lookup. In that case, the location of the enterprise repository must be acquired from the enterprise repository lookup. In either case, the location of the enterprise repository is found and passed to the client (step 1282 ) and the process ends.
  • the registrar passes the client's request directly to either the enterprise repository lookup or the enterprise repository to checks it records for a service that is compatible with the client's request. Once found, the client request would then be passed to the service's registrar and the present process would return to step 1270 for the new registrar.
  • FIGS. 13 A- 13 B a flowchart depicting the transaction process employed by the transaction manager is illustrated in accordance with a preferred embodiment of the present invention.
  • the process begins with the client sending a transaction request to the transaction manager (step 1302 ).
  • the transaction manager may be any of transaction managers 912 A 1 - 912 AN depicted in FIG. 9 and the client may be one of the services being run in containers 906 .
  • the transaction manager Upon receiving the request, the transaction manager creates a transaction for the client, issues an enterprise lease for the transaction, and then returns the transaction content to the client as a transaction object (TXN) (step 1304 ).
  • TXN transaction object
  • the transaction manager will manage the transaction only as long as a valid enterprise lease exists for the transaction.
  • the transaction manager will clean up the client's transaction.
  • the client need not notify the transaction manager in case of a transaction failure.
  • the transaction manager automatically cleans up after the enterprise lease expires.
  • the client can always renew the enterprise lease with the transaction manager.
  • the enterprise lease maintenance process will not be further described for the transaction manager as the process has been fully described for the registrar with respect to FIG. 11B.
  • the client requests various resources to join the transaction by passing the TXN to a resource in a request to join the transaction (step 1306 ).
  • the client may be communicating with resources via traditional resource managers or might instead be communicating with NW-enable devices and network elements that are managing a resource.
  • the process flows to step 1308 where the resource manager also passes a participant interface to the transaction manager (step 1314 ).
  • the client determines whether or not another resource is needed in the transaction (step 1316 ). If another resource is necessary, the process returns to step 1306 where the client invites another resource to join the transaction and the process continues as described immediately above.
  • the client makes a “commit” call to the transaction manager (step 1318 ).
  • the transaction manger implements the two-phase commit process which is invoked by the transaction manager on all participants joined in the current transaction (step 1318 ).
  • step 1312 should the resource manager not join the transaction, either expressly or by failing to respond to the client's request, the client may attempt to find another resource (step 1312 ).
  • the process implemented by the client for finding a resource is similar to that described above with respect to FIG. 10 for finding a service and will be discussed further with respect to the DataBus.
  • the process reverts to step 1306 and continues as described above.
  • the transaction ends. At some point, the transaction's enterprise lease expires with the transaction manager and the transaction manager cleans up itself.
  • the transaction manager After the client makes a “commit” call to the transaction manager via the TXN object, the transaction manager makes a “prepare” call to all participants (resource managers) that have joined the transaction with the client (step 1330 ). If all participants accept the “prepare” call, then the transaction manager issues a “commit” call to all participants (step 1334 ). Here again, the participant may accept the call or abort the transaction (step 1336 ). Should every participant acknowledge that it accepts the commit, the participants then perform the requested transaction and the transaction manager notifies the client that the transaction has been accomplished (step 1338 ), and the process ends.
  • step 1340 the client is notified of the failure (step 1340 ) and the transaction is rolled back at all of the participants due to the failure (step 1342 ).
  • Roll back is a mechanism for returning participants to the state in which they each were prior to the participant accepting the transaction request. Rolling the transaction back ensures that no participant has partially completed the transaction.
  • Enterprise leasing provides information to the registrar about the health of the services registered in its tables. If a lease is renewed, the registrar rightly assumes that it is alive, but not its condition. If the lease expires, the registrar assumes that the service is no longer functioning. This information is used to keep the registrar's tables clean and avoid giving out any stale references. The registrar will also notify any interested parties when a change is made to its tables.
  • Certain NewWave infrastructure services monitor the registrar and use lease expirations as information about the state of the environment. Different types of monitoring services take different actions, such as restarting services or replicating registrations outside of the domain of the registrar.
  • FIG. 14 is a diagram depicting a service failure and re-homing the service to a different server and further depicting self-healing a proxy reference using a smart proxy in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention, and further illustrates self-healing a proxy reference using a smart proxy.
  • FIG. 15A is a flowchart depicting a service restarting process in a global ecosystem of interrelated services in accordance with the present invention
  • FIG. 15B is a flowchart depicting a process for self-healing stale references using a smart proxy in accordance with the present invention.
  • a monitoring service known as an “Arch Angel” is configured with information about the services for which it has the responsibility of monitoring.
  • Arch Angel 1412 must know the identity of the services being monitored, their VM container requirements (what type of local resources, server platform, etc.), and the location of their service code (an address or reference for the remote HTTP server holding the service's code).
  • Arch Angel 1412 is charged with attempting to restart failed services, ones that die an unnatural death for any reason. However, when a service's natural life is over, it will go away gracefully, executing normal shutdown procedures. In this case, Arch Angel 1412 recognizes that the service must not be restarted.
  • One mechanism used to tell abnormal service failures from normal shutdowns is through enterprise leasing. A lease expiration is considered an abnormal event in the life of a service so if one occurs, the service must be re-started to bring the ecosystem back in balance.
  • step 1502 the process begins with Arch Angel 1412 performing an iterative check to determine if a service, service 1406 for instance, has failed (step 1502 ).
  • this check may be precipitated by a variety of events, or even combinations of events. For example, a lease expiration where registrar 1410 notifies, or publishes, a monitor service of lease expiration.
  • service 1406 might fail a healthCheck( ) request while still maintaining its lease(s). Regardless, if the service failure metric is exceeded, service 1406 must be restarted and its previous registrations cleaned up. In that case, Arch Angel 1412 identifies the service that has failed and checks its lookup for any VM container requirements required by the service (step 1504 ).
  • Arch Angel 1412 must find a suitable container for service 1406 and so it accesses domain registrar 1410 's lookup for VM service container service attributes (step 1506 ). Once a VM container is found that matches the service container attribute needs of service 1406 , Arch Angel 1412 retrieves a reference to that container (URL address, etc.). Next, Arch Angel 1412 must lookup the URL for the HTTP server with service 1404 's service code (step 1508 ). Arch Angel 1412 then re-launches service 1406 by passing the service code server's URL out to the container service using the container's URL (step 1510 ). This is exactly the process employed for manually launching a service for an administrator's console described above with respect to FIG. 11A.
  • the service can then register itself as shown above with respect to FIG. 11A for step 1106 .
  • a number of stale references might still reside in registrar 1410 as well as the enterprise repositories, assuming that service 1406 was registered globally. Therefore, once service 1406 has been successfully re-started, Arch Angel 1412 can issue a shutdown request that appears to the registrar and enterprise repository that service 1406 has executed its normal shutdown procedure.
  • registrar 1410 and the enterprise repositories can clean their respective lookups of stale references to service 1406 in its previous VM container.
  • FIG. 15B is a flowchart depicting a process using smart proxy for the self-healing of stale references in accordance with the present invention.
  • This process is performed entirely by the service's smart proxy that was passed to a client during lookup, thus the process is actually performed internal to the client (unbeknownst to the client).
  • the process begins with smart proxy 1420 performing an iterative check to determine if requests to a service, service 1406 for instance, result in a stale exception (step 1522 ). If not, the check continues to iterate through. If a stale exception is returned, then smart proxy 1420 attempts to relocate service 1460 in its new container (step 1524 ).
  • Smart proxy 1420 looks up service 14056 in registrar 1410 for an updated URL to service 1406 's location. However, merely because the service is not responding to requests from client 1408 does not necessarily mean that service 1406 has been restarted elsewhere in another VM container. If service 1406 is not listed in registrar 1410 , then smart proxy 1420 will periodically recheck registrar 1410 's lookup for service 1406 's new URL, provided the rechecking process does not timeout (step 1528 ). If the process times out prior to relocating the service, the self-healing process ends and client 1408 will be forced to roll back its operation to whatever state is necessary for finding and using a different service.
  • step 1526 once service 1406 has been looked up in registrar 1410 's lookup, smart proxy reissues the request to newly restarted service 1406 in its new VM container. Once service 1406 responds, the stale reference is healed and the process ends.
  • a second approach to data management in an enterprise recognized that new applications invariably need data from older applications, thus data was replicated between applications in a peer-to-peer fashion.
  • the peer-to-peer data transfer approach is depicted above in FIG. 1A and is often considered a type of Enterprise Application Integration (EAI).
  • EAI Enterprise Application Integration
  • each application has an opportunity to access more than its traditionally owned data, this approach facilitates a more “enterprise view” of the data; however, transferring the data from its current location to where it is needed often makes it problematic.
  • Applications using this approach often have to devote time and resources to wait for necessary data and/or caches for temporarily storing requested data during an execution cycle.
  • data replication approaches often require a spaghetti of data feeds between peers to effectively and harmoniously replicate data.
  • a final approach to data management in an enterprise involved another EAI between stovepipe applications and warehousing application data to make enterprise data centrally accessible to all enterprise clients.
  • the EAI approach to data management using a hub and spoke configuration is depicted above in FIG. 1B.
  • Application integration, using the hub and spoke configuration of feeds, is a mechanism for providing cleaner data transfer than peer-to-peer (i.e., often less spaghetti), but it still emphasizes shuttling data around the enterprise to finally end up in an enterprise data warehouse. This might be the preferred data management mechanism for integrating disparate legacy systems into an enterprise without wholesale migration to a standard enterprise system. Because the enterprise data is ultimately warehoused, the enterprise controls the data and access to it. The enterprise determines the mode of data access and handles security.
  • hub and spoke EAI approach may be the best and most widespread data management approach in use, it still suffers from having duplicative data between stovepipe applications and the enterprise warehouse and bottlenecking at the hub.
  • Improvements in the hub and spoke approach include federated architectures wherein the applications are able to statically connect to a single integration server or hub and to exchange information with each other. While the bottlenecking problem has been somewhat alleviated, data transfer is much less clean because an application can transact only with a single hub due to the constraint that each application's messages must be processed on its own hub. Thus, there is more spaghetti between hubs to get all application data to a central enterprise warehouse, a “spaghetti data warehouse.”
  • the DataBus of the present invention provides a mechanism for alleviating the shortcomings in the prior art by decoupling data from the services and applications that historically owned the data.
  • the DataBus makes enterprise data available to all authorized users without consulting with an “owner” application.
  • the DataBus is a data management architecture for the NewWave service platform that presents an architecture for creating a consistent, enterprise-wide data persistence layer which allows clients to access shared enterprise data.
  • the DataBus achieves this enterprise-wide look by decoupling shared enterprise data from specific applications (breaking down the stovepipes) and opening up the data layer to across-the-enterprise access (given proper authorization).
  • the DataBus architecture is designed from the ground up for global scalability and accommodation of evolving business data models in a highly-distributed physical deployment. Scaling is realized predominantly through the partitioning, while individual partitions are mapped to logical data domains that are defined along more relevant dimensions than entity-type dimensions (e.g., geography, line of business, etc.), thus cutting across traditional entity boundaries.
  • entity-type dimensions e.g., geography, line of business, etc.
  • FIG. 16 is a diagram depicting a conceptual realization of the DataBus two-tier infrastructure concept for mediating data transactions and an enterprise-wide data persistence layer which allows clients to access shared enterprise data in accordance with an exemplary embodiment of the present invention.
  • requests for data made by applications or components from the underlying (database) storage technology are mediated in the data mediation layer, the one, pandemic DataBus.
  • the mediation layer further provides uniform, ubiquitous access to corporately-controlled business objects, such as customer, product, service or device, by dissociating data from applications so that no service or product application controls and rations data needed by another application.
  • persistent objects and data are created and a steward entity is given the responsibility for owning and controlling the persistence objects and data.
  • the DataBus provides shared copies of data and manages updates to data with globally-guaranteed transactions.
  • FIGS. 13A and 13B describe the two-phase commitment process and roll back contingency if all parties do not successfully implement their part of the required change.
  • FIGS. 13A and 13B describe the two-phase commitment process and roll back contingency if all parties do not successfully implement their part of the required change.
  • these functions are implemented under a process model used by applications for changing data and data associations.
  • the DataBus comprises a data layer with an object-oriented interface. All interactions with data are through methods on objects. If relational technology is used for actual backing store, then this implies that the data layer is actually two distinct tiers: 1) a persistent business object layer; and 2) the underlying relational database which stores the state of these business objects. If object-oriented database technology is used, the data layer might be realized as a single tier. In any case, we assume throughout this document that a distributed object-oriented approach is applied to the entire architecture, even if the wording of this document sometimes lapses into database terminology.
  • entity types the nodes in an E-R diagram discussed in detail below
  • All access to persistent business object data is effected through remote calls to the object interface of the entity instances that are managed by the container.
  • the entity instances are simply Java objects which conform to some strict conventions and live in a container environment.
  • the entity instances themselves will interact with the backing data store, typically via Structured Query Language (SQL) calls to a Relational DataBase Management System (RDBMS).
  • SQL Structured Query Language
  • RDBMS Relational DataBase Management System
  • all application interaction with data is mediated through the instances, thus applications do not directly interact with the data store level of the DataBus.
  • All entity instances must offer both a home interface and an instance interface.
  • the home interface supports class-level functions, such as creation and initialization of new entity instances; finders allow query for existing entity instances matching specified criteria and methods for permanently deleting existing entities from persistent storage.
  • the containers should have a sophisticated model for caching entity instances in-core, managing the life-cycle of cached instances as they move in and out of cache and are created and destroyed, management of concurrent access by multiple users, and management of security (access control) and transactions.
  • the DataBus data architecture combines several main features or facets, such as partitioning, multi-hop finder strategies, externalized associations, object layer mediating access to underlying data storage, support for logical domains and transaction management. These separate facets of the architecture are briefly summarized in the following:
  • Entity Partition Containers define a model where container processes provide an environment in which business objects live. Access to business objects is obtained via remote method calls to stationary objects that are fixed to a physical container. Each partition container provides a “home” interface which can be located and used to create or access instances of the class.
  • the Data layer allows for an alternative access style where clones of business objects may be streamed out to satellite cache servers or directly into an application's process space. Any number of satellite cache servers can be deployed as needed.
  • Loosely-coupled concurrency control idioms are provided, such as optimistic concurrency control, to detect stale data when multiple applications concurrently hold local copies of the same data. This approach allows data replication to many local sites, but operates at the business objects level rather than wholesale replication of database tables. Data is maintained in volatile storage since non-master data does not need the full robustness of a database.
  • Scalability is enhanced by the ability to partition any object class or data type across multiple, independent physical stores. Both business object containers (entity partitions) and corresponding database stores can be partitioned (horizontally) and further distributed across different operations centers if desired. Partitioning is emphasized over replication as the means for scalability.
  • a central steward assigned for each entity type provides coordination and management of unique primary keys across all partitions. Most operations, other than instance creation, involve no access to the steward. Significant effort is made to prevent the steward from becoming a bottleneck. Given its primary key, a multi-stage finder strategy allows navigation to any entity instance from anywhere in the enterprise. The first stage of the finder provides a “map” from the primary key onto the physical partition where the corresponding entity instance is stored. A second stage operation can then locate the specified object within the partition.
  • the information managed by the steward can be cached within the satellite cache servers so that, in most cases, an object is obtained without consulting the central steward.
  • the data layer architecture allows logical domains, cutting across entity-type boundaries to be defined and used to scope down the context of operations to a relevant size. Domains are conceptually orthogonal to entities, and serve as a logical overlay on top of the physical partitions. For finder operations more complex than find-by-primary-key, the specification of a domain narrows the range of a search to a small number of relevant physical partitions, thereby avoiding a broad search. Create operations can specify the logical domain to link with the object.
  • Externalized associative engines allow the creation of relationships between entity types. These constitute the literal realization of the links in an E-R diagram or object diagram. Foreign keys are not embedded within entities; rather, associations are externalized as first-class persistent objects allowing for a highly de-coupled, adaptive data/object model.
  • the proposed infrastructure supports a variety of integrity constraints upon associations, such as cardinality, as needed.
  • Subject areas are used to classify entities into broad categories of data areas in the company, such as Customer, Inventory, etc. Within each subject area, there can be many subordinate entities. These subordinate entities can be expected to evolve on a faster time scale as the details of the business evolve; however, the subject area model is expected to be much more stable.
  • Each subject area is defined by a principle entity that serves as an anchor point for the remainder of the information within the grouping.
  • These standardized anchor objects represent major corporate elements.
  • Subordinate data classes can be added as needed whenever required by new products and services.
  • Subordinate object classes within a given subject area may often have the character of local data; local in a logical sense of being relevant only in the context of a particular line of business.
  • externalized associations lend a great deal of flexibility for evolving the data model as new entities and relationships are added to the model.
  • the data administrators may choose to use more conventional, tightly-coupled intra-database relational mechanisms. However, it is intended that associations across major subject areas are exclusively built using externalized associative constructs.
  • an entity-relationship (E-R) model is a data modeling technique that creates a graphical representation of entities and the relationships between entities within an information system.
  • the E-R model figures prominently into this data architecture in general.
  • FIG. 17A is a traditional representation of an E-R diagram, nodes 1700 , 1702 , 1704 , 1706 and 1708 represent entity classes for “Customers,” “Accounts,” “Account Service,” “Billing Address” and “Pending Orders,” respectively.
  • An “entity” is any person, object, place or event for which data is collected.
  • entities are business customers 1700 , the customers' addresses 1702 , orders 1708 , etc.
  • the entity is represented in a conventional entity-relationship model as a geometric shape, normally a rectangle, but in this case an ellipse labeled with a singular noun that describes the entity.
  • a relationship is defined as the interaction between the entities. For instance, customer 1700 of the aforementioned business maintains account 1702 and account 1702 lists pending order 1708 .
  • the word “maintains” defines the relationship between a customer and the account or accounts that they maintain, while the word “pending” defines the relationship between an account and the pending order or orders.
  • a relationship is normally denoted in a conventional entity-relationship diagram by either a diamond shape, or more simply, a line terminated with arrowheads which connects the entities. In either case, verbs may be used to label the relationships.
  • Cardinality defines the association between the entities in terms of numbers.
  • An entity may be optional or mandatory. For example, a sales representative could have no customers, or one or many customers, or there must be at least one product listed in an order.
  • cardinality notation but with respect to FIG. 17A, a single arrowhead represents a unit of one, while a double arrowhead represents a unit of many.
  • the three main cardinal relationships are: 1) one-to-one, expressed as 1:1, representing the relationship between customer 1700 and account 1704 ; 2) one-to-many, expressed as 1:M, representing the relationship between customer 1700 and bill address 1706 ; and 3 ) many-to-many, expressed as M:N (not shown in the Figure).
  • FIG. 17B is a representation of nodes and arcs of the E-R diagram being mapped onto entity engine processes and association engine processes.
  • Customer entity 1700 is mapped to customer entity engine 1710 ; account entity 1702 is mapped to account entity engine 1712 ; account service entity 1704 is mapped to service entity engine 1714 ; billing address entity 1706 is mapped to billing address entity engine 1716 ; and pending order entity 1708 is mapped to pending order entity engine 1708 .
  • Associations between entities can also be externalized. Externalized associative engines allow the creation of relationships between entity types.
  • each customer entity in customer entity class 1700 is associated with only a single billing address entity within bill address entity class 1706 , thus Cust/BillAddr association engine 1724 is a “1-1” association engine, whereas customer entity might be associated with several accounts.
  • Customer/AccAssociation engine 1720 is a “1-M” association engine serving associations between Acc/AccCustomer entity engine 1710 and account entity engine 1712 .
  • FIGS. 17A and 17B illustrate the E-R diagram of a business object model is directly recognized as a web of processes linked together over the network.
  • This model is similar is some aspects of the so-called “network databases,” and to the World Wide Web model where any object can have links to any other object.
  • associations are structured, follow a schema defined by the E-R model, and obey integrity constraints such as cardinality.
  • FIGS. 17A and 17B underscore the notion that associations and entities receive equal treatment as first class objects supported by deployed processes.
  • entity engines and association engines have their own backing store as well.
  • the backing store for entities will typically store records of attributes that represent the state of the various entity instances managed by a given entity engine.
  • the backing store for association engines will contain tables of link records, which are pairs of foreign references to the entities that stand in relation to each other.
  • the association storage is sometimes called a “correlation table.”
  • the lines connecting the boxes representing the various engines convey two points. First, they connote the foreign references to the entities that the association links together. Second, they correspond to interprocess communication (IPC) channels that are exercised at runtime as applications establish new links between entity instances and traverse existing relationship paths among associated entities.
  • IPC interprocess communication
  • This simplified view of the mapping of E-R diagrams onto process engines has glossed over some details that will be filled in below. In particular, the fact that each given entity class may actually have its instances partitioned horizontally across several distributed stores has been ignored. “Horizontal partitioning” is database jargon for deploying different “rows” in a table across different stores, the image being of a horizontal slice through the table, as opposed to vertical partitioning where different attributes of the same record are stored in separate physical areas.
  • the DataBus architecture relies very heavily upon data partitioning to achieve the scalability.
  • Data is deployed throughout an enterprise network in a highly decentralized, distributed manner, but at the same time, remains logically unified.
  • an enterprise user service, client or even end user
  • conventional databases are relied upon for implementing highly-independent physical data partitions which have essentially no direct knowledge of each other.
  • external navigational mechanisms such as finders and associations (described above and below), are the glue that binds these highly independent partitions together.
  • FIG. 18 is a diagram illustrating entity A 1802 , entity B 1804 and entity C 1806 which are partitioned in accordance with an exemplary embodiment of the present invention.
  • entities A-C 1802 - 1806
  • Each of entities A-C 1802 - 1806
  • Each of entities A-C is partitioned in as few as two and as many as four separate partitions; however, the diagram is merely illustrative. In practice, an entity might be partitioned in literally hundreds, and possibly thousands, of separate partitions. Note that the grouping of partitions within the entity boxes does not imply physical proximity in actual deployment. In fact, the deployment of some entities may be quite widespread across an enterprise.
  • it is expected that data which is repeatedly accessed by a client will most likely be physically located proximate to that client.
  • clients that are geographically disparate, while utilizing records or instances of the same entity will result in the entity instances being geographically divided up by partitioning the entity.
  • entity partitioning is not limited to the records of the underlying database storage media. Partitioning also includes the entity instance containers that house the object representation of the business entities. In other words, both the business objects tier and the data storage tier of the N-tier DataBus architecture are partitioned. In accordance with one embodiment of the present invention, only one object container instance is deployed for each corresponding database partition.
  • FIG. 19 is a diagram illustrating three container-database partition pair in accordance with an exemplary embodiment of the present invention.
  • VM container 1 ( 1910 - 1 ) is deployed for database 1918 - 1 ;
  • VM container 2 ( 1910 - 2 ) is deployed for database 1918 - 2 ;
  • VM container 3 ( 1910 - 3 ) is deployed for database 1918 - 3 .
  • databases 1918 - 1 - 1918 - 3 are physically partitioned, and likely to be deployed to physically distinct server hosts, deployers may often wish to locate the database and corresponding entity partition container onto the same host. For example, to co-locate container 1910 - 1 and database 1918 - 1 on the same host, etc. In fact, it is logical to pair the object instance container and its matching database store on the same processor node so as to make container to database communications very fast.
  • FIG. 20 is a diagram depicting DataBus components necessary for creating an entity instance in accordance with an exemplary embodiment of the present invention.
  • steward 2010 For each entity in an enterprise, there exists one steward service, depicted as steward 2010 . This steward is logically central, but for access, availability and latency considerations, could be physically composed of federated, cooperating components constituting a logically unified steward service.
  • satellites 2012 - 2018 Within every multicast domain, there exists a plurality of satellites, depicted as satellites 2012 - 2018 .
  • Steward 2010 provides a measure of central management to the present invention.
  • the entity manager serves as a central authority for those aspects of the entity needing to be centralized, as represented in FIG. 20 as steward 2010 .
  • the central manager comes into play. While the central manager is necessary, we go to great lengths to avoid this manager becoming a bottleneck to throughput, and avoid excessive accesses to this central steward or manager.
  • central manager 2010 One of the main roles of this central manager is to provide coordination and management of unique primary keys (PKs) across all partitions.
  • PKs unique primary keys
  • all entities follow the convention of defining a candidate primary key consisting of a unique 64-bit integer called the UID (unique identifier).
  • UID unique identifier
  • This UID provides a convenient foreign key that is used by externalized association engines to store references to entity instances, as will be further described below.
  • one of the primary responsibilities of central entity manager 2010 is to maintain a block-up counter for generating new UIDs when a new block of primary keys is called for by any of satellites 2012 - 2018 . Satellites 2012 - 2018 actually issue a primary key whenever an entity instance is created and not steward 2010 .
  • steward 2010 validates that a primary key proposed by a user for a new instance is not already in use by an existing instance. This latter sort of PK contrasts with the block-up UID generated by the central manager in that its form is dictated by the type of business object it represents.
  • the PK for a given entity might be a string or an integer, or it might be a composite key having more than one component.
  • These domain-specific PKs would often be proposed by the application, or by custom logic within the entity implementation, and checked for uniqueness by the central entity manager, using for example, a hashing or directory service.
  • steward 2010 serves as a place to keep the master data for the mapping of primary keys onto partition identifiers that indicate where each given object is stored. This is an alternative embodiment and is discussed more below with respect to multi-stage finders. However, in that case, when a cache miss is suffered out at a satellite server, the finder service faults over to the master data managed by steward 2010 to determine which partition contains the entity having a given PK. When a new entity is created, steward 2010 places a new entry in its master copy of the PK-to-partition map. This role of steward 2010 , as the master record for this mapping, assumes that the multi-hop finder is based on distributed caches.
  • enterprise repository 2030 is used for storing PK-to-partition maps, then burden for this data management shifts entirely to enterprise repository 2030 .
  • the embodiment requires steward 2010 to generate new primary keys when new instances are created, and its responsibility for recording the PK-to-partition association, then the central logic of the home interface's create operation can also be located within steward 2010 .
  • steward 2010 is responsible for finding an instance's partition container if the guidance stage of the find operation fails.
  • a find operation may consist of a guidance stance and a local find stage.
  • Steward 2010 issues parallel query to all entity partition containers if a PK-partition map is not listed in the satellite or enterprise repository for the partition holding the instance for the primary key.
  • the find-by-primary-key methods in the entity's home interface are handled by the satellite cache servers as discussed above in the section on multi-hop finders. These caches are consulted first to find the partition where a desired entity instance is located; the entity manager is consulted only whenever there is a cache miss. The hope is that most of the find operations will never need to consult the central entity manager. Association traversal and association creation (link) operations likewise never need to touch the central entity manager.
  • steward 2010 is responsible for allocating blocks of primary keys to the satellites for its entity class and for locating the partition containing an entity instance, given the instance's primary key in case of cache faults in enterprise repository 2030 and/or at satellites 2012 - 2018 .
  • steward 2010 issues parallel query to all entity partition containers only if a PK-partition map does not have a copy of its own or the PK-partition map is not listed in enterprise repository 2030 and/or satellites 2012 - 2018 . In that case, the parallel query is issued and steward 2010 retains a copy for itself prior to sending it to satellites 2012 - 2018 , possibly saving a parallel query in the future.
  • Satellites 2012 - 2018 are responsible for two class level tasks. The first is finding a suitable container for a new partition. Satellites 2012 - 2018 select a specific partition container to place the entity instance based on some algorithm, such as proximity to the creating client, partition container loading, distribution leveling or some combination of the above. Satellites 2012 - 2018 also cache the PK-partition map and may pass that information on the steward 2010 after creating an instance.
  • the local multicast domain also contains a plurality of domain registers 2032 for registering and looking up local NW services.
  • enterprise repository 2030 External to the local multicast domain is enterprise repository 2030 which maintains enterprise level service and data registration as described above with respect to the processes described in FIGS. 10A, 11C, 12 A and 12 C. Additionally, enterprise repository may contain PK-partition mapping information as described immediately above.
  • servers 2002 A- 2002 D which may be physically located in the local domain, but are more probably scattered throughout the geography of the enterprise. For instance, server 2002 A might be situated in Paris, while server 2002 B is situated in Moscow. Also depicted in FIG. 20 are arrows depicting the interaction between DataBus components. For the reader's convenience, these lines represent the correspondingly-numbered step in the flowchart depicted in FIG. 25, which will be described below.
  • FIG. 21 is a flowchart depicting a process for creating an entity instance in accordance with an exemplary embodiment of the present invention.
  • the process begins with client 1920 accessing an interface for interacting with a satellite by finding a satellite service for the entity class in domain registrar 1932 (step 2102 ).
  • Client 1920 looks up and retrieves the proxy (or a smart proxy) for satellite 1912 . It should be understood that because each local domain should have satellite services for each entity class running, it should never be necessary for the client to hop to the enterprise repository for a non-local satellite.
  • client 1920 can find enterprise repository 1930 and then look up a non-local registrar with a listing for a satellite service as described above with respect to FIG. 12C. If client 1920 already has the interface to satellites 1910 , then steps 2102 and 2104 can be omitted.
  • client 1910 requests an entity instance be created in a partition (step 2106 ). Once the request is received by satellite 2112 , it checks its cache for primary keys (step 2108 ). If satellite 1910 does not have a primary key on hand for creating a new entity instance, it requests a block of key from steward 1910 , which is forwarded to satellite 1912 (step 2110 ). Once satellite 1912 has a key, it determines the best entity container partition to create an entity instance in step 2112 . Satellite 1912 might base the decision on proximity to client 1920 , container loading or some other quantifiable factor. The partition container may also be specified explicitly by the caller. Or the caller may specify a logical domain where the new entity instance is to be located.
  • the satellite would query an enterprise mapping of logical domains onto qualifying entity partitions.
  • the steward would select from the set of qualifying partitions belonging to a domain a given partition to house the new entity instance. This selection could be random round-robin or based upon available capacity, determined by policy.
  • satellite 1912 caches the PK-partition mapping, passes it to steward 1910 and forwards the create(PK) request to the selected partition container (step 2112 ). From there, the partition container creates the entity instance and passes a proxy for the instance to client 2014 . Additionally, the newly-created data object can register itself with the enterprise, like services as described above with respect to FIG. 12A. The process then ends.
  • a multi-stage finder strategy allows the navigation to any entity instance from anywhere in the enterprise, given its primary key.
  • the basic idea is that a first stage is used to map the primary key (PK), or candidate PK, onto the partition number where the entity is stored.
  • the second stage is to invoke the “local” finder interface out at the relevant physical partition to produce the actual entity instance of interest.
  • This second stage of the find operation is implemented with a SQL select statement for backing store that uses a RDBMS.
  • the present invention envisions three distinct types of data access: 1) remote calls to fixed entities; 2) streaming copies of the data to client; and 3) moving a mobile agent into the entity's space.
  • the core strategy has all client access to business objects effected by remote method calls into stationary data locations, the containers. This mode is similar to that described above with respect to services where a client intending to interact with an entity acquires a proxy to the entity instance and uses the proxy to interact with the instance.
  • remote handles to entity instances are similar in some respects to the familiar RMI proxies or CORBA proxies from ORB computing.
  • the remote handles to entity instances are implemented with their own code which may be remotely loaded and hidden from the client in accordance with an exemplary embodiment of the present invention.
  • These handles of remotely-loaded code are the smart proxies discussed above with respect to NewWave services. Recall that a smart proxy is a local object streamed to the client's process space which may contain both local data, logic and behavior, as well as references to remote server-side objects.
  • the smart proxy that serves as a remote handle to entity instances encapsulates local state (i.e., the entity primary key), the name of the entity class or the partition number where the entity instance is actually stored. Additionally, the smart proxy will also encapsulate an RMI proxy to the container managing the entity instance.
  • FIGS. 22 and 23 are diagrams depicting both modes of streamed data copies in accordance with an exemplary embodiment of the present invention.
  • FIG. 22 is a diagram showing a read/write copy of the entity instance being streamed directly to the client, while FIG. 23 shows the cache server approach where a copy of the entity instance is streamed to a cache server rather than the copy being directly steamed to the client.
  • a copy or clone 2206 is shown streaming from container 2212 directly to client 2204 for the client's use.
  • Client 2204 issues a getClone( ) to container 2212 which obliges with clone 2206 .
  • Client 2204 can then interact with the clone of entity instance 2202 including updating the instance using a updateFromClient( ).
  • client 2204 is implemented in Java and therefore has the space to accommodate clone 2206 .
  • client 2314 does not interact directly with clone 2306 . Instead, clone 2306 is streamed to satellite 2310 rather than directly to client 2314 .
  • the cache server approach is mandatory if the client application is non-Java client 2314 . Some Java “proxy” space is needed to store the clone object on behalf of client 2314 .
  • the entities In order to support this streaming of clones out to the client, the entities must support a convention of supplying a getClone( ) method and an updateFromClone( ) method. For each entity type, there also must also be a serializable clone class defined (sometimes called a state object) which represents the thing that actually gets streamed out to the client.
  • the entity's getClone( ) method creates a ( )clone object reflecting the entity's current state, then streams the clone object out to the caller's address space.
  • the updateFromClone( ) method of the entity takes the clone instance as an argument and updates the state of the master to match the attributes of the clone object.
  • the above approach of having each entity support a getClone( ) method implies that there is one fixed type of clone object for each entity.
  • different applications may have differing needs for making up the exact internal data in a clone object (e.g., nested entities to varying levels.)
  • the DataBus architecture accommodates these varying needs by offering a factory mechanism whereby clients can stream a factory object into an entity container during the request to create a clone of an entity.
  • the entity container will ask the custom factory to create the clone, passing a reference to itself (i.e., to the entity) in order that the factory may call back the entity to extract entity state information during the construction of the clone.
  • clients can create customized copies suitable for their purposes.
  • the entity container's abilities for stamping out data copies becomes extensible, much as a computer-controlled machining tool's behavior is extensible through uploading instructions.
  • the factory can imbed, within the primary copy, any number of copies of associated entities to whatever depth of recursion the application deems desirable.
  • Clients can thereby stream into a custom factory that tailors copies to the clients' specific needs.
  • the DataBus uses the approach of streaming client code into “the system” in another context, apart from clone factories.
  • the DataBus also allows the client to provide a filter object during association traversal or find-by-criteria method calls.
  • the filter implements custom Java code that can narrow a result set. In so doing, primarily only “good” objects are returned to the client, rather than all objects that match a “find” or “get” request.
  • the “getAccountsForCustomer( )” method returns all destination objects that are associated with a given source object and that the solution requires either extra remote calls and data passing, or the client sequencing through the unfiltered array of accounts and performing its own filtering.
  • the client streams objects into DataBus that act like the SQL “where” clause to perform custom filtering inside the entity container.
  • the entity containers the partition services
  • association engines can apply filter objects to narrow results based on some preset criteria determined by the client.
  • the streaming of clones to the client mode of data access has potential problems under concurrent usage scenarios.
  • two users fetch a copy of an entity instance.
  • the first user modifies one copy and submits the changes.
  • the second user modifies another copy and submits the changes, thus eliminating the modifications made to copy by the first user.
  • the present invention solves the concurrent user problems by implementing one of two mechanisms.
  • the first approach is used in scenarios where the client is using the data copies in a read-only fashion. That approach involves notifying the user of a read-only copy that a modification has been made to the original data and notifies the user of the changes in accordance with one embodiment of the present invention.
  • the second approach is used in scenarios where the client is using the data copy in a read/write fashion.
  • the second approach involves tracking version number of clones and rejecting any updates from clones that are not current in accordance with one embodiment of the present invention.
  • FIGS. 24 and 25 are diagrams depicting both approaches for maintaining concurrency control implemented by DataBus in accordance with an exemplary embodiment of the present invention.
  • FIG. 24 is a diagram showing the event notification approach where the client is using only read-only copies of the entity instance and receiving change notifications whenever an update is received.
  • the optimistic concurrency approach in FIG. 25, depicts the client using a read/write copy that must stay in sync with a master copy in order for updates to be accepted.
  • client 2404 is using read-only clone 2406
  • client 2405 is using a second copy, clone 2406 , which is not read only.
  • event services keep the client copy reasonably in sync with the master data 2402 .
  • the system registers with the event service the interest of client 2404 in obtaining refresh events whenever the master data gets updated by anyone else.
  • a flag is also set on entity 2402 so that every time an update gets stored to the database, the system publishes a change event to the event bus so that the client is notified of the change.
  • client 2404 takes out an enterprise lease on the event service which, as described above, requires that client 2404 actively renew the lease if interested.
  • the event service publishes event notification to any service or clients wanting to subscribe and stay interested as long to the enterprise lease is current. Should client 2404 lose interest and let the lease expire, client 2404 's subscriptions of interest are purged. As discussed previously, if client 2404 disappears ungracefully, the lease is expunged from the record; however, should client 2404 eloquently shut down or decide not to take a data copy, the lease is removed gracefully. Recall from the description of FIGS. 13A and 13B that the transaction process implemented by the transaction manager is a two-step commit process.
  • the change notification to client 2404 depends on the update transaction actually being committed. Should all participants in a transaction actually commit to the transaction, as opposed to joining it, the change notification is sent to client 2404 . Conversely, should the participants only confirm that the update transaction has been received to (tentative) store back to the database, the change notification is withheld, no matter how certain the impending change looks.
  • client 2404 is using read/write clone 2408 , as is client 2405 .
  • client 2405 can update master entity instance 2402 .
  • the second approach to concurrency control is when there are clone copies in the so-called optimistic concurrency control strategy. This strategy assumes a lack of locking due to the fact that there is optimism that collisions will be infrequent.
  • optimistic concurrency-control idiom a version number (a one-up count will do) is maintained on every entity instance. Each time an update to an instance occurs, the counter is incremented. Whenever a client obtains an entity clone, the clone contains the version number among its attributes.
  • the system compares the clone's version number with the current version in the database. If there is an inconsistency, this means that some other user has performed an update since the first user originally fetched their copy. Under these conditions, the updateFromClone( ) method throws a “StaleData” exception and the update is aborted.
  • the updateFromClone( ) method throws a “StaleData” exception and the update is aborted.
  • the copy comes with a version number. It is assumed that client 2504 will be able to make any necessary modifications to clone 2508 prior to another client, for instance client 2505 , taking a clone of entity instance 2502 , and thus another version.
  • client 2504 can update instance 2502 without incident. If, however, client 2505 does take out another copy, now clone copy 2509 , then updated clone 2508 from client 2504 will not be accepted and a StaleData exception is returned because clone 2508 is not in sync with instance 2502 . In that case, client 2504 merely rolls back the entire transaction and runs internal application logic that redoes the use-case on a new version of instance 2502 . There is the possibility that the transaction cannot be successfully rolled back and client 2504 is then forced to re-key clone 2508 (i.e., create another instance with its unique primary key). It should be noted that under the optimistic idiom, one generally fetches the clone under one transaction, works with the clone under no transactional control, and then finally updates the original data store from the clone state under a second transaction.
  • One aspect of the present invention is that, despite the fact that two stages are involved in the find operation, this fact is hidden from the applications programmer.
  • the find operation appears to the user as a single seamless operation.
  • the guidance stage for example, relational database tables to correlate keys and partition identifiers. This would really be overkill for a number of reasons.
  • the system can always find out where, if anywhere, the desired object is actually stored. Moreover, directing all find queries to the same database invites bottlenecks.
  • a non-transactional guidance stage can be self-healing. Strictly speaking, the guidance stage does not even need to be persistent, but instead can take on the form of cache held in volatile memory. This is so because guidance data is, in principle, recoverable using the parallel query approach outlined above.
  • the PK-partition mapping results returned from the parallel query are replicated down to each entity class satellite. The idea is that distribution and replication of the guidance data (which allows availability and scaling to meet access volumes) is more important than transactional integrity or absolute fault tolerance.
  • One approach to building a guidance stage of the multi-hop finder is to use an enterprise level directory service, such as an LDAP-based service or the enterprise repository, to store the mapping from PK onto partition number or whatever information uniquely identifies the relevant container where the entity is stored.
  • an enterprise level directory service such as an LDAP-based service or the enterprise repository
  • This approach has the advantage of being automatic because newly-created entity objects can register themselves similar to services whenever they are started.
  • more repositories must be utilized and the PK-partition mapping replicated across all the enterprise lookups in order to guard against bottlenecking at the enterprise lookup (or LDAP-based service).
  • An alternative to the enterprise lookup approach is to incorporate a cache architecture in certain entity class components, such as the steward and/or the satellites.
  • a cache of PK-to-partitionId entries is maintained in volatile storage out in the various satellite servers that has already been configured for holding streamed object clones.
  • the guidance cache is in the form of a finite size, in-core hash table, following LRU (least recently used) chain semantics typical of caches.
  • LRU least recently used chain semantics
  • the cached guidance stages are largely self-maintaining and present one level of a multi-level faulting approach to handle cache misses.
  • a find-by-PK operation is invoked by the user, the satellite cache is checked for a match. If found, the find request is sent to the relevant entity partition container. If there is a cache miss at the satellite, the process faults over to a centralized master store of the complete set of guidance data. This store may actually be present in two locations, the enterprise repository and the steward. Thus, the enterprise repository, populated with PK-partition mapping from data object registrations, is free. The other central store of guidance data is maintained by an entity management engine (the steward).
  • the process then faults over to a brute force parallel query out to all known entity partitions to find who has the data.
  • the query takes one of two forms. First, query all known partitions for the partition holding the data that is identified by the specific primary key being sought.
  • the query might instead be a request for all partitions to declare their primary key identifier of all entity instances. In that case, the response will repopulate all guidance data held by the steward, along with PK-partition mapping information held in the satellites.
  • FIG. 27 is a flowchart depicting a multi-hop find process in accordance with an exemplary embodiment of the present invention described above.
  • FIG. 26 is a diagram depicting DataBus components necessary for performing the multi-hop find process described in the flowchart of FIG. 27.
  • Each of the relevant process steps is depicted in FIG. 26 as an arrow accompanied with the corresponding step number for FIG. 27.
  • the process begins with client 2620 looking up satellite service 2612 in domain registrar 2632 (step 2702 ). As discussed above with respect to FIG. 12A, a NW service can be found in the lookup table by its attributes rather than by its interface. Client 2620 returns the proxy object for interacting with satellite 2612 (step 2704 ). Should client 2720 already have the interface for satellite 2612 , then steps 2702 and 2704 can be omitted.
  • the find operation is a two-step process wherein the first step locates the partition holding the entity instance and the second step is a local find where the partition is requested to return an interface for the entity instance.
  • the process begins with client 2620 issuing a findByPk( ) to satellite 2612 via the satellite's proxy (step 2706 ). If satellite 2612 has the PK-partition mapping listed, the satellite identifies the partition holding the entity instance and the process moves on to the second step wherein the satellite performs the local find (step 2708 ). If, however, the PK-partition map is not in the satellite 2612 's cache, the satellite looks up the primary key in enterprise repository 2630 (step 2710 ).
  • Satellite 2612 finds the primary key in enterprise repository 2630 , the satellite retrieves partition information and performs a local find in that partition (step 2712 ). If, however, the primary key is not listed in the enterprise repository, the process faults over to steward 2610 .
  • Steward 2610 can perform various alternative processes. First, if steward 2610 has a listing for the primary key in its cache, it merely passes the partition identifier to satellite 2612 . Alternatively, steward 2612 executes a parallel query for the partition holding the primary key. Once the partition identifies itself to steward 2610 , that information is again passed to satellite 2612 .
  • steward 2610 executes a parallel query for all entity-class partitions to report the primary keys for their entity instances. In that case, steward 2610 can repopulate its own cache with the PK-partition mappings received from the individual partitions. That information is then passed down to the entity-class satellites ( 2612 - 2618 ) which repopulate their caches with the PK-partition mappings (step 2714 ).
  • Satellite 2612 will have identified the partition holding the entity instance and performs a local find (step 2716 ). Satellite 2612 makes the findByPk( ) to the home interface of the partition identified as having the entity instance. The partition container returns a proxy for the entity instance to client 2620 for interacting with the instance (step 2718 ). The process then ends.
  • FIG. 28 is a diagram representing a logical domain boundary defined from partitions in each of several entities in accordance with one embodiment of the present invention. Domains are, in a sense, orthogonal to the dimension of entity type or subject area cutting across different entity boundaries. Individual domains may be defined along with any pertinent grouping, for example, along geographic lines or along lines of business, or according to some other classification. Logical domains supplement the methods of finding entity instances, such as by using either multi-stage finder strategy using primary keys described above, or to chase relationship paths from a known entity to related entities using the mechanism of externalized associative engines, the description of which follows.
  • Logical domains are particularly useful with respect to situations in which a user needs to locate one or more entities, starting cold, by criteria that are more complex than a search by primary key.
  • the where clause of the SQL select query may be used for the more complex find-by-criteria operations and can be performed in parallel out at the separate partition containers for a given entity, and then the results can be coalesced.
  • Logical domains provide the means to perform this narrowing of scope.
  • Domains are closely related to the notion of data partitions serving as a logical overlay on top of the physical partitions.
  • a domain could amount to nothing more than an alias for a specific partition of some entity providing a more user-friendly common-name in place of a physical partition identifier.
  • domain “UK” might map onto partition #8 for the Customer entity.
  • a given domain for a given entity may span several partitions. More than one domain could coexist and overlap to represent the dissection of the enterprise along different dimensions (e.g., geographic and line of business).
  • Logical domain mapping may be stored in a directory service that would be used during find operations to identify all the physical partitions that are relevant for a given entity within a desired logical domain.
  • the partition can be assigned to one or more logical domains.
  • This method would first use directory services to map the specified domain name onto the set of partitions that belonged to that domain. It would then use some policy (e.g., random selection or greatest available capacity) to select one physical partition from the set of qualifying partitions; the new instance would then be created in that partition.
  • a createInDomains(String[ ] domains) method searches the directory for all partitions belonging to all specified domains (intersection) to deploy a new entity instance in a partition that concurrently belonged to two or more domains (e.g., placing an entity simultaneously in Europe and Internet LOB domains).
  • Another major area where domains would be visible in the user interfaces is in the complex finders for an entity. These find-by-criteria methods are given an extra argument for naming one or more domains to be intersected. The find operation is then performed in parallel out at all partitions matching the specified domain(s). The results of the parallel queries would then be coalesced and returned to the requester.
  • the externalization of associations is extremely flexible in that new associations may be added to existing entities as business models evolve. Thus, new entities can be introduced and associated with existing entities without any impact upon those existing entity classes or the instances themselves. This externalization is possible because neither the entity class nor the entity instance internally track any information relating to associating, or linking through association, to other entities. Rather, the external association engine is modified with association information (the links) for the additional entities which makes for an extremely loosely-coupled fabric of business objects. As an example of this flexibility, a new association can be easily defined to append supplementary information to an existing entity to support the needs of a new service. This is somewhat like object subclassing (inheritance), but is in some ways, more powerful.
  • the supplementary information can even be applied after the fact to entity instances already in deployment which is not possible with object inheritance.
  • externalized associations allow any objects housed in any store across the enterprise to be linked together with any other object in the enterprise.
  • Externalized associations also have less rigidity in the face of evolving business models than does the conventional approach of realizing a data schema as foreign keys within entity tables.
  • association engines that manage relationships between entities are built from reusable infrastructure.
  • a number of different specialized association engines are supplied to support the different common association types.
  • specialized association engines will support the common cardinalities of one-to-one, one-to-many and many-to-many relationships.
  • Another possible variation is the addition of an ordering property to one-to-many or many-to-many relationships which is useful in, for example, ordering the circuit legs that comprise the end-to-end path of a complete circuit.
  • Other more specialized associations are possible, such as ternary associations linking triplets of entities.
  • This sample code illustrates the use of class-level entity functionality through an entity's finder interface, the exercising of association functionality through an association engine interface, and the use of an entity's instance-level interface (i.e., cust.doSomething( )).
  • entity's instance-level interface i.e., cust.doSomething( )
  • the most striking aspect about this sample code is that the program asks the association interface to return the Accounts related to the Customer, rather than the more familiar object-oriented practice of asking the Customer object for its Accounts.
  • the entity and association engines and their storage might be physically located anywhere across the enterprise, while access should, nevertheless, remain this simple and transparent.
  • the entity and association engines appear to the client as centralized services deployed somewhere “out there.” This centralization is purely logical . . . an illusion that hides the distributed, de-centralized nature of the implementation.
  • FIGS. 29 and 30 are a diagram and a flowchart, respectively, depicting a process for fetching all the Account instances belonging to that Customer instance based on the Customer's primary key in accordance with an exemplary embodiment of the present invention.
  • each server has two VM containers 2908 and 2910 running, and each container has two NW partition services running within.
  • Partitions 2908 and 2910 are responsible for two main things—retrieving one or more instances of a business object and creating a new instance of a business object.
  • client 2940 would not directly invoke methods of the partition, but would utilize instead a satellite service.
  • each of the entity classes is partitioned. With respect to the present Figure, each entity has two partitions, but in practice, most entities would have many more partitions. Each partition is responsible for a plurality of entity instances which are identifiable by a primary key. Also depicted is registrar 2930 which may be a domain registrar as described above with respect to FIG. 9. It is expected that the business objects normally used by a client are proximate to that client, thus a fair assumption is that all components represented in FIG. 29 are in a local domain, such as the local domains defined by a multicast radius as further described above with respect to FIG. 9.
  • a client may interact with business objects located anywhere in the enterprise, locally or non-locally.
  • servers 2902 A and 2902 B may or may not be local, while registrar 2930 and finder 2932 are local to client 2940 .
  • the operations that each of these services perform might lead to hops in other non-local domains.
  • 1:M entity A-B association engine 2934 which provides the logic and table resources for tracking all instances of class A (Customer class) to instances of class B (Account calls) through 1:M associations between Customer entity instances and Account entity instances.
  • an association engine service will be available for the enterprise for each association between entities (similar to the association engines depicted in the E-R diagram on FIG. 16B).
  • the table resource list links the instance between the Customer entity class A and the Account entity class B.
  • a new Account entity is created in a partition and a link is added to engine 2934 from the customer instance to the newly-created account instance.
  • Finder service 2932 may be a satellite service which will be described below. Briefly stated, a satellite is responsible for two main things, finding existing entity instances and creating new entity instances of the business object. Satellites are helper services to a steward service that allocates blocks of primary keys to the satellites and locates a partition based on a specific primary key. It should be understood that in the enterprise there is only one steward for each entity class in the enterprise, but there might be many satellites distributed across the domain for that entity class whose purpose is to help the steward. Finally, FIG. 29 further depicts the interaction between components with lines that are representative of the correspondingly-numbered step in the flowchart depicted in FIG. 30.
  • the process begins with client 2940 possessing a primary key that identifies a Customer entity instance for a customer.
  • Client 2940 needing account information for the client, looks up the address (URL, URI) of the finder service 2932 in registrar 2930 's lookup (step 3002 ).
  • the registrar returns a proxy to finder service 2932 which allows client 2940 to interact with finder service 2932 (step 3004 ).
  • a similar lookup is performed for the Customer/Account Association Engine service 2934 (step 3006 ) where an appropriate proxy is returned for client 2940 to interact with engine 2934 (step 3008 ).
  • Client 2940 uses the finder service to obtain a remote reference to the customer entity instance identified by the primary key (step 3010 ). With a reference to the Customer instance, client 2940 can access the data using one of the data access modes to be described below. Next, client 2940 conveys the Customer instance primary key to Association Engine 2934 which traverses its association table and returns references to all Account entity instances associated with (link to) the Customer primary key (step 3012 ). Alternatively, Association Engine 2934 might pass the primary keys to all associated Account entity instances making client 2940 responsible for looking up each key. Finally, client 2940 uses the reference to the Customer and client entity instances to exercise the functionality of the entity instances (step 3014 ).
  • a client could also sequence through the unfiltered array of accounts and perform its own filtering via some criteria; however, this approach is very network intensive.
  • a third alternative, mentioned above, is for the client to pass in a Java filter object to the association engine during association traversal.
  • the filter is a serializable Java object, whole code is fetchable at runtime by the Java language infrastructure from its codebase URL.
  • the association engine can apply the client-supplied, custom filter to an association traversal result set before returning the result set to the client.
  • the bottlenecking problem is alleviated by applying some of the same concepts in the central association engine that are applied to entities for scaling (i.e., the association engine is partitioned, or more properly, “fragmented” by partition). Fragmenting the association does two things. It decentralizes the association engine, allowing the association links to be kept proximate to clients that would normally use them, and reduce to a manageable amount the quantity of association links kept in any one location.
  • each of these link records is redundantly stored in two locations.
  • the first link record is stored in an association engine fragment that is physically proximate to the entity partition where the source object is located. In fact, the engine fragment is logically coupled to that entity partition.
  • the duplicate link is stored in a second location that is physically proximate to the entity partition in which the destination object is located. It is also referenced or coupled to the entity partition where the destination object resides.
  • association link there is a fragment of the association link records co-located with respect to each entity partition.
  • the association engine is logically central, but physically composed of fragments that may be widely dispersed.
  • the association fragment coupled to that source object's partition is used.
  • the association storage fragment coupled to the destination entity's partition is used for traversing the relationship in the backward direction.
  • FIG. 31 is a diagram showing external central association engine 3102 consisting of a plurality of link records which describe associative relationships between Customer entity instances and Account entity instances.
  • a client merely accesses engine 3102 with a unique identifier for a Customer entity and utilizes the association link records to find any association relationships that might exist to any and all Account entity instances.
  • external central entity association engine 3102 is “fragmented” into association engine fragments 3112 , 3114 , 3116 , 3118 , 3122 and 3124 , one for each entity partition from the participating entities.
  • Each association engine fragment is proximately coupled to a specific entity partition.
  • a partition references its association engine fragment, though this record of links should remain physically close to the partition as the partition will call on the engine fragment for association link records.
  • Association links between entity instances recorded in central engine 3102 are divided up between the partitions' engine fragments resulting in twice as many link records as in central engine 3102 . This occurs because each link that was previously recorded for an association between two instances is now recorded in the partition's association engine fragment for each instance's partition.
  • entity instances in central engine 3102 are identified only by their unique identifier (primary key)
  • the entity instances in the engine fragments 3112 , 3114 , 3116 , 3118 , 3122 and 3124 are associated with a particular entity partition. It should be understood that this is merely an exemplary embodiment and that destination instances might be identified only by their unique identifiers because the client can always look up the partition container with a find service from the instance's identity as described elsewhere and above.
  • the quantity of association engine fragments corresponds with the total number of partitions between the entities. If, for instance, one of the participating entities (i.e., Customer) is divided into four partitions, and the other, Account, is partitioned two ways, then six association engine fragments would result. It should be understood that it might be possible for the instances in one or more entity partitions to not have associations with the instances in one or more partitions of a second entity. In that case, the total amount of records would still be twice that of the non-fragmented engine, but one or some of the resultant engine fragments would not have association link records.
  • FIG. 32 a diagram of NW service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention.
  • FIG. 32 is identical to FIG. 29 and therefore will not be described further except to add that arrows depicting the interaction between DataBus components are shown with regard to the process described in FIG. 33.
  • FIG. 33 is a flowchart depicting a process for getting all accounts instances that are associated with an identified customer instance in accordance with an exemplary embodiment of the present invention. It is assumed that the client has already found an association service and has association proxy 3230 to interface with the service. The process begins by identifying the partition container holding the entity instance (step 3302 ). Although this might be accomplished via finder service 3232 , as described above, this extra lookup is not necessary.
  • the smart proxy that serves as a remote handle to an entity actually encapsulates a remote reference (typically an RMI stub) to the entity partition container, as well as other information like PK.
  • a remote reference typically an RMI stub
  • the partition container must be found for the entity instance in order to locate the association engine fragment that is coupled to it (step 3304 ). Once the container is found, the interface to the coupled association engine fragment is gotten (typically via local registrar service lookup) and the Customer/Account association engine fragment traversed starting from the Customer instance to find all associated Account instances (step 3306 ). Those instances are then returned to the association engine (step 3308 ) which passes them on to client 3240 (step 3310 ). At step 3308 , it is assumed that the remote interfaces are returned for the Account instances and the client interacts with the Account instances as need be.
  • the link records held in the association fragment engines consist of the triplets (primary key, entity type, partition number) for both source entity and destination entity that are linked.
  • the association fragment engine In traversing the association, the association fragment engine must query its link record store for all link records matching a given source entity. Then, given a set of link records, it must resolve the PK, entity type and partition number for destination entities into remote smart proxies for those entities. This could be done via the multi-hop find-by-PK. In practice, we optimize this by caching, in the association fragment engine, a map from (entity-type, partition #) onto the remote RMI stub to the corresponding entity partitions.
  • the interface to the partition service is fetched via enterprise service lookup described above via a partition naming convention formed from the entity type and partition number.
  • the association fragment engine can request those partitions to return smart proxies corresponding to all the destination entities matching the destination PKs.
  • the client need only to be able to identify a particular entity instance to efficiently navigate to all data stores associated with that instance using the association engine fragments.
  • a client merely invokes an assoc.getAccountsForCustomer(cust) method, just as described above with respect to the process depicted in FIG. 30. It appears to the user that they are exercising a remote interface to a central association engine, while there is in fact no such central association engine. This slight-of-hand is accomplished by using smart proxies, a concept we have already mentioned in a number of other contexts above. Thus, many of the steps described in the process immediately above are being performed out of view from client 3230 .
  • FIG. 34 is a flowchart depicting a process for getting all accounts instances that are associated with an identified customer instance using smart proxies in accordance with an exemplary embodiment of the present invention.
  • the process begins with the client invoking a traversal method, assoc.getAccountsForCustomer (aCustomer), with the association engine (not shown).
  • This method invokes logic local to the association smart proxy that queries the Customer entity argument (which is itself a smart proxy) for its primary key, partition identifier and its remote interface to the entity container where the actual Customer entity instance is stored (step 3402 ).
  • the association smart proxy then makes a remote request to the Customer entity's partition container to traverse the “assoc.1-m.customer.account” association from the source entity with the given PK (step 3404 ).
  • the Customer entity container has no built-in knowledge of how to traverse a Customer/Account association.
  • entities know nothing of associations, and new associations can be added at any time without breaking existing entities in deployment.
  • the entity partition container can look up the interface to the association engine fragment for the association named “assoc.1-m.customer.account” which is paired with that entity partition (step 3406 ).
  • the entity partition can also keep a cache of references to these association fragments so it does not have to go out to a lookup service every time.
  • the entity partition Once the entity partition has found the remote interface to the relevant association engine fragment, it forwards the association traversal request to that association engine fragment, which in turn can accomplish the relationship traversal (step 3408 ).
  • the association engine fragment queries association database based on Customer PK and requests remote interface (Smart Proxy) for the separate account partition that holds instances associated with the customer. After the Account remote references are passed to the association engine fragment, they get passed back the invocation chain all the way to the requesting client (step 3410 ), thus ending the process.
  • association engine is accessed through a service interface that is implemented with a smart proxy that, itself, contains no inherent remote references (proxies in stubs) to a remote object.
  • the association engine smart proxies “piggyback” on the communications channels of the entity smart proxies that are passed to it as parameters in “link( )” or “traverseAssociation( )?” requests. For example, when the association interface is told to “link” entities A and B, the association smart proxy will extract from A and B their remote handles to their respective partition containers.
  • the smart proxy will then proceed to send parallel link requests (in separate threads) to these two entity containers, which in turn forward the requests to the appropriate association fragments.
  • This is a highly novel and a typical example of the use of a smart proxy. It has no communications “channels” of its own, but rather “parasitically” employs the communications channels of objects with which it comes into contact.
  • Another feature of one embodiment of the present invention is the manner in which the virtual association engine deals with violations of cardinality integrity. Specifically, when a client requests that a one-to-many association add a new link record, the system must check for cardinality violations. Due to the asymmetric nature of a one-to-many association and the DataBus approach of partitioning entities, only the fragment engine on the “many” side can reliably detect a cardinality violation. A simple-minded implementation would serialize the link requests to the association fragments on either side of the relation, first to the “many” side, then only if successful, sending the link request to the “one” side.
  • these link requests are forwarded in parallel (using two background threads) to the two “sides” of the association. If the “many” side detects a cardinality violation, it will throw an exception. The “one” side will, in any case, proceed to add a link record, all-the-while unaware of whether doing so violates cardinality constraints. But all such link operations are performed under the oversight of a global transaction. Thus, when the caller of the (illegal) link request catches the cardinality exception, they will (according to the “contract” they are expected to obey) “roll back” the global transaction. The “one” side's inappropriate adding of an illegal link record will be effectively undone.
  • the Management Operations Center is an application for providing support for people addressing problems similar to those handled in a Network Operations Center (NOC), but not limited to only network problems. As such, it is intended to support problem management in many forms, including those typically handled by customer support centers and tactical assistance centers.
  • the MOC represents a tool that assumes a fundamental re-engineering of the processes and tools used in these environments. It should not be compared directly against the tools that currently support these environments (trouble tickets, workflows, network management consoles, etc.), but should be analyzed as to how it supports the new re-engineered process. As such, it will not support many things currently expected in these environments because some activities are not needed.
  • the current NOC environment can be described in simple terms as an approach involving monitoring of activity, identification of problems, selection of problems to work on off of a queue, and resolving the problem.
  • the MOC monitors and identifies problems based on rules set up by experts.
  • the MOC determines the best available personnel for a particular problem based on circumstances and policy rules and then directly invites those persons to work on the problem. Therefore, the work team is composed based on differing roles and skill sets required for the problem, and might involve people from different organizations.
  • the MOC is an integration of services, the MOC is able to handle problem cases that are not limited to one area, as is the practice of Network Operations, but to any affected areas. For instance, a problem may bind together a network event, customer tickets, application events, etc.
  • a work event can be worked on and accessed by anyone with connectivity to the NewWave environment, so people involved do not have to be in one center, but could be at home, on the other side of the world, etc.
  • the MOC's emphasis is on collaboration tools and world-wide access.
  • the MOC of the present invention represents an example of a new way of designing applications: the inside-out design.
  • the “application” is a collaboration of many smaller units acting on common objects, possibly without knowledge of each other, but with their actions affecting each other.
  • This design also makes heavy use of rules external to code executed by rules engines or policy specific objectives. This allows for changing the behavior of the system without changing the code. Those behaviors which represent organizational policy are removed into rules, and can then be managed by experts in those organizations.
  • FIG. 35 is a diagram of the MOC and associated NewWave services necessary for collecting events into policy-based work documents, and then directly routing work to the best currently available operations staff that is automatically assembled based on the individual staff members' aptitude for particular tasks in a process flow in accordance with an exemplary embodiment of the present invention.
  • the primary MOC component services are assessor 3504 , aggregator 3506 , workspace 3502 , dispatcher 3508 , distributor 3510 , avatar 3512 , archive 3514 and work rendezvous 3516 .
  • the functionality of each of the above identified MOC services will be briefly described.
  • Assessor 3504 initially receives most events from pub/sub bus 3528 and applies operations-specified policy to the treatment of those events using, for example, a rules agent in a commonly shared rule server.
  • Authorized operation staff can change and update policy rules in near-real time using behavior service 3530 described below.
  • Highly distributed and individually customizable, typically many (customized) assessors will exist in the MOC system, thus allowing different treatment of events by different operations teams.
  • Aggregator 3506 receives event information from pub/sub bus 3528 and assessor 3504 which it associates and binds together according to an operation's requested organization of work integration to produce work document 3630 .
  • Aggregator 3506 also provides real-time binding of associated corporate business objects to the document including binding an event to many different documents.
  • aggregator 3506 contains the templates for documents for, for example, different functional areas/teams. Additionally, many different aggregators will exist and run simultaneously providing different work documents to different teams.
  • Dispatcher 3508 applies current policy rules to associate work documents and events with specific operators, customer contacts and other service care staff.
  • Dispatcher 3508 assigns work with an understanding of who is free and able to do that work and implements priority rules for understanding relative priority, thus dispatcher 3508 can bump work in progress for higher priority tasks. Additionally, dispatcher 3508 implement alternates strategies to handle cases where work is refused or overdue. Distributor 3510 handles outbound and remote communication notifications for the MOC based on decisions from dispatcher 3508 .
  • Each avatar object 3512 represents a virtual image of a specific operator's or customer contact's skills and responsibilities. Operators, provisions, customer contacts, service support staff and any other management-tasked staff in the customer and network care environment will have an avatar.
  • Avatar 3512 provides the MOC with a skills assessment of care staff including reference to a history of past work, interactions and success ratings and a means for contacting and communicating with these individuals.
  • Archive service 3514 updates and otherwise modifies work documents for or in storage based on recent experiences.
  • work rendezvous 3516 associates later arriving processed events with events that initially generated a work stream/task.
  • rendezvous 3516 notifies different work documents about all other references to a common event and associates processed events with a work document that contain a reference to the source event.
  • the GIB services have been discussed thoroughly above and will not be discussed again.
  • the MOC employs an inside-out design in which many small components act largely independently of each other, but affecting each other by:
  • the overall behavior of the MOC can be changed by adding new components, work templates, or changing policy rules, without directly modifying existing components.
  • All MOC components are NewWave services, using the NewWave registration, lookup and enterprise lookup services.
  • the MOC extends the behavior of its code through the use of external rules engines using the NewWave behavior service. This allows organizations with the expert knowledge of operations support to be in control of the behaviors implementing operations support policy, instead of programming organizations.
  • the MOC must communicate with systems outside of its direct control. It uses XML messages sent over the GIB publish/subscribe buses to do so in a highly decoupled way.
  • Work documents are constructed by an aggregating component. It is the job of this aggregating component to put together a document (a software construct) containing what information is needed to resolve the problem, including aggregating related network, customer and application events, setting initial milestones, applying rules which deal with the understanding or categorization of the problem, and binding in related information (such as necessary topology information).
  • Work documents are first class objects accessible through the NewWave DataBus. They are not just data, as they have a controlling feature that allows state changes throughout its life. All components are able to interact with and change it using distributed transaction semantics.
  • People are represented by in-memory “avatars” which are responsible for knowing the manner in which to communicate with the person, that person's current workload and information about the person. Technologies for communication are encapsulated within the avatar, allowing other components to not be knowledgeable about or bound to those technologies.
  • An avatar is a first-class object running as a service and can be found and interacted with using standard NewWave techniques.
  • a workspace (FIG. 39) is the interaction, peer-to-peer, of those services about a single work item.
  • FIG. 36 is a functional diagram of the MOC depicting interactions between key MOC components which interact in accordance with an exemplary embodiment of the present invention.
  • FIG. 36 contains component representations from the MOC, NewWave infrastructure and rule agents 3632 .
  • the MOC is responsible for coordinating the response to events which occur within individual components bound into workspace 3640 developed for the NewWave environment.
  • Components in workspace 3640 might be NewWave-enabled devices, and applications and services developed on NewWave or are detected by NewWave surrogates for external systems, for instance, agents monitoring devices or other resources, and bridges to legacy (non-NewWave) systems.
  • any component wishing to be supported by the MOC must publish events to the GIB publish/subscribe bus, or to an external publish/subscribe bus with a bridge to the GIB, shown generally as pub/sub service 3618 .
  • Each event message must use an agreed-upon XML schema for the format and follow an agreed-upon structure for the topic of the event message.
  • FMEvent XML Fram Management Event
  • An assessor 3604 is responsible for applying organizational policy dealing with how the organization responds to events of that type. An organization may set policy saying that certain events are ignored; others are problems that must be addressed immediately, etc.
  • assessor 3604 runs rules agent 3632 against an incoming event received from publish/subscribe bus 3618 .
  • assessor 3604 determines, based on the rules, whether the event is a primary event, which must be investigated and then classified by type. The function of assessor 3604 is then entirely dependent upon the rules that are set up and executed by the rules engine. These rules would be defined by experts in an organization or set of organizations responsible for handling problem events.
  • An exemplary rules engine for implementing policy based rules is Brokat Advisor and the Brokat Advisor Server (both available form Brokat Aktiengesellschaft Industriestrasse 3, D-70565 Stuttgart, Germany). Because the present invention is supported by the NewWave infrastructure, and relies on remote loading of services which in some forms rely on the Java programming language, a rule engine that is also written in Java would better match the operating environment of the MOC in its use of the mobile rules agents.
  • an assessor is depicted for assessing events based on organizational rules in accordance with an exemplary embodiment of the present invention.
  • the present invention envisions implementing rules in the normal manner by developers in development 3710 .
  • the present invention recognizes that the developers are not always the best implementers for rules, nor the timeliest, especially those based on organizational policy, such as from operations 3712 . Therefore, the rules may be adjusted, modified, supplemented or even replaced by experts in an organization or set of organizations responsible for handling problem events at, for instance, code server 3720 .
  • Code server 3720 serves up the rules to rules agents in behavior service 3730 , which are fired whenever an event is received.
  • a common approach used in both cases to alert the MOC of an anomalous condition is the NewWave publish/subscribe service.
  • the publish/subscribe service is part of the NewWave GIB and represents a contract between components for sharing information.
  • FIG. 38 The basic design of an aggregator is shown in FIG. 38 in accordance with an exemplary embodiment of the present invention.
  • FIG. 38 also describes the basic workings of aggregator 3606 in accordance with the present invention. Accordingly, events flow into aggregator 3806 and pass through a “gate,” logic gate 3748 , which applies some logic to determine whether this event represents a new or existing opportunity for packaging work. Logic gate 3748 acts as a logical IF to determine if the event represents new or existing opportunities.
  • state machine 3850 If new, aggregator 3606 starts a new state machine, and the associated bucket for collecting events and data, depicted as state machine 3850 , for controlling the work. It must select a template 3848 (FIG. 38) for the state machine that is appropriate for the particular event. For instance, a failure of a Sonet Ring would be handled differently than a failure of a modem. In the MOC, the state machine is a micro-workflow and description of the life cycle of a telecommunications process. State machine 3850 performs a number for functions regarding the event, including determining other related events needing to be bundled with the primary event and what events would signify closure of the primary event.
  • the state machine might need additional information so the state machine must be equipped to determine the additional information that is needed, such as topology or customer service level agreement (SLA).
  • SLA customer service level agreement
  • the state machine 3850 must determine what milestones in the life of a particular event are important. The state machine, the events that are to be associated, the milestones, the means of gathering additional information is represented in the template.
  • aggregator 3606 joins the incoming event to running state machine 3850 that has expressed interest in it. At some point, the state machine ultimately produces a work document and makes this document known (publishes it) to other components via distributor 3810 .
  • a behavior engine (rules engine) can be used both to implement logic gate 3848 and by the state machine to control its actions or to provide some root cause analysis of the problem.
  • FIG. 39 is a diagram of a simplified version of a workspace showing a controlling state machine in accordance with an exemplary embodiment of the present invention. Many separate workspaces may exist simultaneously. State machine 3850 controls the actual work in the aggregator.
  • state machine 3950 is responsible for receiving incoming events, binding them together (the tree of E's in the figure) and responding to any state change as a result of the new event, or binding information into the work document (the network of circles in the figure). State machine 3950 continues operating until closure conditions are reached, which may be based on completeness or time elapsed. Then, state machine 3950 publishes the work document in some manner (for instance, persist on DataBus or publish via publish/subscribe) and in some agreed-upon form (for instance, XML document or Java objects).
  • the aggregator may be implemented in a number of different ways, even by the functional workings of the other services (i.e., in accordance with one embodiment of the present invention, there is no physical component called the aggregator).
  • a resource manager can create the required number of workspaces and state machines.
  • state machine 3950 subscribes with the publish/subscribe bus for the events in which it is interested. As such, state machine 3950 receives the events directly without going through a “gate,” thus performing the join function implicitly.
  • the MOC rendezvous service discussed below, is used to prevent an event which has gone directly to state machine 3950 from also causing the creation of a new state machine, thereby also performing the gate function.
  • the assessor is allowed to create the state machine if the event is determined to be primary and the rendezvous service says it is not being handled already, thus performing the start function of the aggregator.
  • State machines are a common way of handling a process that goes through many states and responds to events, with the response being dependent upon the current state. Many implementations of state machines exist and many that may be applicable to the present invention could have been used here.
  • the MOC implementation follows along somewhat non-traditional lines because the state transactions are not complex, but the determination of the event coming in is. The implementation, then, does not optimize the state transition (as one would see in, for instance, a source code parser).
  • customer and network care staff a reference to history of past work
  • One exemplary state machine is implemented as an extension of the base class WorkItemActor.
  • the particulars of this exemplary implementation are that the publication of the document is done through publish/subscribe and after publishing the document, the state machine does not go away.
  • state machine templates 3852 should be developed to handle different classes of problems for the enterprise that share characteristics.
  • state machines might be developed to handle, for example, SonetLinearFailure, ModemReset, StandbyRequest, and ApplicationRestartFailure.
  • An XML template can then be used to describe the control differences between state machines.
  • the template document contains the settings for milestones, related events, and information to be bound in.
  • the MOC depends on a rendezvous service to tell if an event is being handled by a work item (or a state machine controlling a work item), represented in FIG. 36 as rendezvous 3616 .
  • a rendezvous service is responsible for determining if a given event is already being handled and if the problem represented by a work item document overlaps with an existing work item document. It then routes that event to the proper work item.
  • the client role of the rendezvous service dynamically registers work-items for subscriptions to related events. It also finds if any specific event is already registered in the service register as being processed by a state machine/workspace.
  • the server side continuously skims the service register for work items which should be informed of each other or joined into one work process unit.
  • rendezvous service 3616 can use rules to make its determinations, or any appropriate logic. Different rendezvous services may be deployed with different rules for determining overlap by different parameters. For instance, different services could consult different views of topology, for instance, one service could look at layer 2, a second a layer 3, a third looking only at cross domain interactions. By deploying many such rendezvous services, and by allowing work documents already started to be merged together, it is not necessary to apply all rendezvous rules before starting work. Therefore, some rendezvous rules could be quite slow and still result in alerting people to the fact that a problem spans multiple areas. Asynchronous processing allows parallel work to occur in a dynamic environment, at its own pace, and then be merged with other work upon reaching a certain resolution.
  • rendezvous service 3616 it applies simple rules to determine if an event has been handled and if there is overlap between different work item documents.
  • Rendezvous service 3616 dynamically subscribes with publish/subscribe services to be made aware of any new work item document as the item is created (but before it is published for all).
  • Rendezvous service 3616 pulls the events off of the document and keeps an index of events based on their type and based on the network element affected. Whenever it is asked about a new event, it can compare the new event against the network element to see if any existing work item document references that element.
  • WorkItem 3630 in FIG. 36 holds all of the objects, or references to the objects, associated with the item of work (i. e., the problem described in the initial event that is being addressed).
  • WorkItem 3630 will have many types of objects, bound in, including:
  • events the primary event and associated/correlated events
  • status information describing the current state of the problem resolution, for instance, status, probable cause, priority, time to resolve, actual cause
  • informational objects such as:
  • sundry information such as configuration information on the elements in question
  • proxies to devices or services related to the problem for instance, a proxy to the device or agent for the device that is reporting the problem;
  • the work document is the DataBus-enabled WorkItem (implemented, according to DataBus standards, as the WorkItemBean class and related classes). There, WorkItem 3630 is completely persisted on the DataBus.
  • a technique similar to the Jini Registrar and the Jini JavaSpace is employed for storing any serializable object and also attaching external “attributes” to be used when looking for the object (a serializable object, as described above, is an object which Java is able to “serialize” the object in a form suitable for storing or transporting across processes—this is a standard Java technique).
  • the external attributes are selected by the storer.
  • the MOC design has the concept of the work group space Workspace 3940 , a space for the work group collaborating on a problem to share relevant objects. This allows the client's avatars to interact as if the workspace were a peer-to-peer environment.
  • One implementation is to convert WorkItem 3630 into an in-memory work group space with a simple interface for finding objects and retrieving them, and a persistent work item document for persisting data about the work item.
  • This is an in-memory shared space capable of holding objects that the participants may need, including:
  • the work group space must support the putting of objects into and the getting of objects from the space, the remote downloading of the classes needed to use the objects, the registration for and notification of events relating to the objects, and the tailoring of the contents of the space to the particular problem using rules.
  • These concepts are features of the NewWave infrastructure and GIB architecture, and are easily implemented. Alternatively, with the exception of the rules, this resembles the responsibilities of a Jini JavaSpace, which could be also used as a component in implementing a workspace.
  • WorkItem 3630 is very similar to the work space concept of the present invention and performs most functions of the work this function; however, as a DataBus object, WorkItem 3630 is not practical to support those objects that are not really intended to be persistent.
  • the first implementation is a NewWave service, described in detail above, registers itself in the domain registrar and the enterprise repository. This implementation allows the work group to be accessed via normal administrative tools for services; however, large numbers of work group spaces could get unwieldy.
  • a second implementation involves creating an in-memory DataBus object. This would scale well to large numbers, but would not be directly accessible via normal service administrative methods.
  • the work group can be implemented as a JavaSpace. This would require the addition of proxies so that one JavaSpace could service a number of work group spaces.
  • contacts e.g., Operators, Provisions, Customer Contacts, Service Support staff, any other management-tasked staff in the customer and network care environment, Customers, etc.
  • contacts may participate in the resolution of, or may need notification of, WorkItem 3630 .
  • Contact data can then be saved in an appropriate location, for instance, persisted within a Contact DataBus Entity.
  • the user avatar is a representation of a person as a service, invoke-able by other software services; a virtualization of the individual, the current state of the individual and the current interface to the individual.
  • a user avatar depicted as user avatar 3604 on FIG. 36 represents a virtual image of a specific operator's or customer contact's skills and responsibilities.
  • a user avatar is depicted as user avatar 3604 on FIG. 36 that serves as a proxy for a contact within the MOC.
  • each contact has an associated user avatar. This concept is better understood with respect to FIG. 40 that depicts a user avatar in accordance with an exemplary embodiment of the present invention.
  • Each UA 4012 registers in registration service 4022 , which may be a domain registrar, started with group “Users.”
  • UA 4012 is registered with attributes including primary key (PK), login ID and name. Any service requesting information from, or sending messages or work to, UA 4012 locates this proxy using existing NewWave protocols for lookup described above.
  • PK primary key
  • Any service requesting information from, or sending messages or work to, UA 4012 locates this proxy using existing NewWave protocols for lookup described above.
  • UA 4012 is initially populated from the Contact DataBus Entity stored in DataBus 4024 . Once created, UA 4012 has the ability to synchronize its data with the DataBus. Additionally, UA 4012 provides “helper” convenience methods so that data persisted with the Contact DataBus Entity can be accessed through UA 4012 .
  • the User Avatar knows all available contact means for a contact and is responsible for forwarding all communications, messages and work to the contact via the appropriate contact mean(s). All logon/logoff requests from the WorkSpace applet (GUI) will be made through UA 4012 . A remote proxy to the WorkSpace will be retained as an available contact mean after a “logon” request from the WorkSpace GUI has been successfully processed. Likewise, all logon/logoff requests from the PDA service will be made through UA 4012 . Again, a proxy to the PDA Service will be retained as an available contact mean once a “logon” request from the PDA service is successfully processed. Other contact means supported by the current implementation include text messages sent to pagers via email, text messages sent to cellular phones via email, and email.
  • UA 4012 is also responsible for determining whether a message should be sent via one or more available contact means. This determination is made by evaluating the priority of the message or work. More urgent messages may be distributed via multiple, or even all, available contact means.
  • UA 4012 In addition to providing a communication vehicle for a Contact, UA 4012 knows what a Contact is currently working on (workload). Workload is primarily used by dispatching function 3608 to determine the “most available” Contact to participate in the resolution of a WorkItem. Workload is provided by the UserAvatar as XML. Again, workload is defined as what the operations staff is currently working on real-time, the task priority, and when is it due to be completed. Individuals can be participants in more than one workspace at the same time. The UA sees/stores this collection of work of an individual and the workspace client for an individual can reference any work-item for which an invitation is active and/or accepted.
  • UA 4012 has the ability to publish and subscribe via the GIB's pub/sub bus 3618 .
  • UA 4012 subscribes for WorkItem status changes so that UA 4012 can forward status change messages to the Contact via the available contact means.
  • Contacts also subscribe for items of interest within the MOC via their established contact means. These subscriptions are established with UA 4012 as profile information. Once UA 4012 receives a subscribed item, it is responsible for forwarding the corresponding messages in the proper format to the Contact via the established contact mean(s).
  • UA 4012 just as every other MOC service, implements the MOC's Service Admin interface, and provides statistics as XML including health/heartbeat, and additionally, the MOC specific statistics such as workload and profile information (current subscriptions, contact means, etc.).
  • avatar service 4013 serves as a container for UA(s) 4012 .
  • one avatar service is deployed for each Contact logical domain.
  • Avatar service 4013 has all of the behavior associated with a NewWave service and therefore can initially create and register (with the domain registrar) the user avatar(s), in addition to maintaining user avatar(s) leases with the registrar.
  • avatar service 4013 provides convenience methods to the DataBus for the user avatar synchronization functions.
  • the GIB architecture implements “policy-based” rules that can be modified in “near-real-time” to handle predicate logic requirements.
  • Various off-the-shelf services might be integrated into the GIB architecture to provide this functionality (i.e., the Brokat product(s), Advisor Builder and Advisor Rule Engine).
  • the function of the dispatching rules in accordance with an exemplary embodiment of the present invention. It should be understood that the account detailed below is merely exemplary and any specific policy might be applied to any policy based MOC component.
  • policy can be implemented in any rules agent as a relocatable service, including as a java object.
  • the Dispatcher Service (GenericGIBService) provides the MOC the ability to:
  • the Dispatcher Service accomplishes the above stated objectives by implementing the following functions:
  • the Dispatcher Service inherits the ability to participate in the publish/subscribe bus. Upon service start-up, the Dispatcher Service registers as a subscriber for WorkItem Events that include, but are not limited to:
  • the Dispatcher Service receives a WorkItem Event, it is ready to run the dispatching rules.
  • the Dispatcher Service inherits the ability to directly interface with a behavior (rules) engine.
  • the current Dispatcher Service implements the Brokat products to define, via Brokat Advisor, and then process, via Brokat Rules Engine, the dispatching rules.
  • the Dispatcher Service passes the WorkItem to the rules engine for processing.
  • the dispatching rules Upon receipt of the WorkItem, the dispatching rules must determine which rules, e.g. rules agent, to run based on the type of WorkItem Event. It is important to understand that this function would run at every milestone in the controlling state machine. In most cases, the first task is for the rule engine to determine:
  • the dispatching rules are responsible for determining which contacts need to be invited to participate in, and ultimately resolve, the WorkItem.
  • rules identify roles to be filled by “appropriately skilled” Contact(s).
  • the roles are determined by rules that evaluate the WorkItem's data.
  • the event data currently evaluated by the dispatching rules for the purpose of determining roles includes:
  • BELOW An example of the roles identified, via rules, for a Sonet Linear Failure network event have been included BELOW:
  • the dispatching rules evaluate customers who have been impacted by the event(s). Impacted customers and their corresponding Service Level Agreement information have been bound into the WorkItem prior to receipt of the WorkItem by the Dispatcher Service. The dispatching rules determine whether direct customer participation in the WorkItem is required. Additionally, the dispatching rules determine whether it is necessary to assign a Contact specifically to the impacted customer. The customer participation rules evaluate:
  • SLA Service Level Agreement
  • a WorkItem status change may identify additional roles through the involvement of additional rules.
  • WorkItem “escalated” status change management and more highly-skilled personnel may be invited to participate in the WorkItem via the dispatching rules.
  • a second set of rules are run to determine the “most appropriate” Contact(s) to fill the roles.
  • Contacts can be defined as interested parties, not limited to people, that have been identified by the dispatching rules as being available for participation in a particular WorkItem.
  • the dispatching rules perform pattern matches on Contacts' characteristics.
  • the dispatching rules define Contact characteristics as:
  • Each candidate Contact is identified by the rules, a function is invoked to create an invitation object and bind it to the WorkItem.
  • Each invitation contains base WorkItem information, such as event type, priority, contact's proposed role, contact's ID and WorkItem ID.
  • the initial invitation status is “ready for dispatch.”
  • the dispatching rules evaluate the roles, customers' SLAs, and event information to determine whether instructions or scripts need to be bound into the WorkItem for the candidate contacts. Once all contacts have been identified, invitations have been created, and instructions have been bound into the WorkItem, the dispatching rules engine returns to the Dispatcher Service for further processing.
  • the Dispatcher Service queries the WorkItem for a list of invitations that need to be dispatched and then performs a registrar lookup for the Contact's proxy (UserAvatar) by Contact ID. Upon return of the contact proxy from lookup, the Dispatcher Service performs a “send” request passing the invitation.
  • the contact proxy is responsible for determining where the invitation should be sent and how it should be formatted.
  • messages in the Management Operations Center need to be distributed to contacts.
  • messages take several formats: XML, HTML, text, and direct communication with a remote proxy.
  • the messages may be disbursed via a variety of communication mechanisms: PDA, email (WorkSpace servlet), pager, mobile phone, and WorkSpace GUI Client (applet).
  • Adapters are Generic Services that register with a domain registrar. As Generic Services, they inherit all associated behavior. Two such adapters are described below.
  • the Distributor Message Service of the MOC is responsible for distributing messages via email.
  • This exemplary implementation of the Distributor Service implements the Java Mail classes and distributes messages to mobile phones, pagers, and email.
  • the Distributor Service implements a simple interface with one public method for sending messages.
  • the send method takes two parameters, the first indicating whether the message is to be sent in HTML or text format, and the second parameter is the message to be sent.
  • the PDA Adapter a service of the MOC, is responsible for distributing messages to a PDA client. This exemplary implementation of the PDA Adapter distributes XML messages to the PDA.
  • the PDA Adapter implements a simple interface with one public method for sending messages.
  • the send method takes a single parameter which is the message to be sent.
  • the exemplary archive service implementation for the MOC performs a simple calculation on the experience level of each person in the role played in the work group. Each time a person participates in a successful resolution of the problem, that person's experience level is modified according to the following formula: current+((max ⁇ current)*0.5). This gives the person a lot of credit the first time that person is successful, but less credit each time until the score is close to the maximum.

Abstract

In accordance with an exemplary embodiment of the present invention, an avatar object is presented which is well-suited for the NewWave service platform. An avatar is a virtual representation of an individual or group as a Global Information Bus (GIB) software service with which other services can interact (i.e., proxy of person). Thus, a service needing to contact a person need not know who that person is. Each avatar includes means for reaching and communicating with the individual wherever they are in the global ecosystem. An avatar is the virtualization of service methods translated to user actions. In short, an avatar is an object personification of the attributes of a person, team, group, or the like, which represents specific qualities associated with the subject of the avatar. Operators, provisions, customer contacts, service support staff and any other management-tasked staff in the customer and network care environment will have an avatar(s) for a network management task manager, such as a Management Operations Canter (MOC). An avatar's virtual image may also represent a history of past work, interactions, success ratings associated with personification of the subject of the avatar. along with its current workload and contact information for forwarding all communications, messages and work to the contact via the appropriate contact mean(s)interacting with the avatar. Initially, an avatar object registers itself as, for example as a contact entity within a DataBus, with a registry within the domain of a service which may need the contact data. Any service requesting information associated with the avatar object locates this proxy using existing NewWave protocols, and then communicates with the avatar through its proxy. In accordance with one embodiment, a service invite a person to participate in a work group based on the needs of the service and attributes of the avatar and then bind their avatar to an associated work document. As the work proceeds, the avatar attributes are updated to reflect its workload and upon completion of the task the avatar's its history is updated to reflect the its association with the particular task and the success rating of the completion of the task.

Description

    CROSS REFERENCES TO RELATED APPLICATIONS
  • The present application is a divisional application of, and claims priority from, co-pending U.S. patent application Ser. No. 09/863,456 entitled “METHOD AND SYSTEM FOR MANAGING PARTITIONED DATA RESOURCES,” filed on May 22, 2001, currently pending which claims priority from provisional U.S. patent application No. 60/206,564 filed on May 22, 2000 and is a divisional application of the following non-provisional U.S. patent applications: “METHOD AND SYSTEM FOR IMPLEMENTING A GLOBAL ECOSYSTEM OF INTERRELATED SERVICES,” Attorney Docket No. RIC-01-005 filed on Mar. 29, 2002; “METHOD AND SYSTEM FOR IMPLEMENTING A MANAGEMENT OPERATIONS CENTER IN A GLOBAL ECOSYSTEM OF INTERRELATED SERVICES,” Attorney Docket No. RIC-01-006 filed on Mar. 29, 2002; “METHOD AND SYSTEM FOR REALIZING AN AGGREGATOR IN A MANAGEMENT OPERATIONS CENTER IMPLEMENTED IN A GLOBAL ECOSYSTEM OF INTERRELATED SERVICES,” Attorney Docket No. RIC-01-007 filed on Mar. 29, 2002; “METHOD AND SYSTEM FOR REALIZING A RENDEZVOUS SERVICE IN A MANAGEMENT OPERATIONS CENTER IMPLEMENTED IN A GLOBAL ECOSYSTEM OF INTERRELATED SERVICES,” Attorney Docket No. RIC-01-009 filed on Mar. 29, 2002; “METHOD AND SYSTEM FOR IMPLEMENTING IMPROVED CONTAINERS IN A GLOBAL ECOSYSTEM OF INTERRELATED SERVICES,” Attorney Docket No. RIC-01-010 filed on Mar. 29, 2002; “METHOD AND SYSTEM FOR IMPLEMENTING A GLOBAL LOOKUP IN A GLOBAL ECOSYSTEM OF INTERRELATED SERVICES,” Attorney Docket No. RIC-01-01 filed on Mar. 29, 2002; “METHOD AND SYSTEM FOR USING MOBILE CODE IN A GLOBAL ECOSYSTEM OF INTERRELATED SERVICES,” Attorney Docket No. RIC-01-012 filed on Mar. 29, 2002; “METHOD AND SYSTEM FOR IMPLEMENTING A DATA BUS IN A GLOBAL ECOSYSTEM OF INTERRELATED SERVICES” Attorney Docket No. RIC-01-013 filed on Mar. 29, 2002; and “METHOD AND SYSTEM FOR IMPLEMENTING A GLOBAL INFORMATION BUS IN A GLOBAL ECOSYSTEM OF INTERRELATED SERVICES,” Attorney Docket No. RIC-01-014 filed on Mar. 29, 2002; which are assigned to the assignee of the present invention. The above identified applications are incorporated by reference in their entirety. [0001]
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0002]
  • The present invention relates to providing ubiquitous access to data resources even where such data resources are maintained in separate stores and by entirely separate processes. [0003]
  • 2. Description of Related Art [0004]
  • The operation of a modern large business enterprise relies heavily upon the processing, storing, communicating and manipulation of vast amounts of information. This is particularly true of a large service company, such as a global telecommunications company. The types of information vary widely and may include, for example, customer data, employee data, account information, traffic and revenue statistics, and engineering data such as network topology and provisioning data. The vital information that supports a large enterprise may even include the software instructions that drive various elements and systems in a telecommunications network. Some information is relatively static, such as the name or address of a customer, whereas other forms of information, such as the momentary operational status of a network element, can change abruptly and must be communicated as quickly as possible to points where the information is needed. [0005]
  • Traditionally, the various types of information that support a large enterprise have been treated separately. Each principal function in the company, such as human resources, customer service, or engineering, has been self-contained in its use and maintenance of the data needed by that function. Each function typically selects its own tools (software applications and hardware platforms), populates its own data store, and institutes its own procedures with little regard to the remainder of the enterprise. In cases where there has been limited sharing of data between functions, the implementation has often been an ad hoc gateway between divergent systems and approaches. [0006]
  • It is becoming widely recognized in the field of information technology that it is not only advantageous, but essential to use a comprehensive approach to managing the data in a large enterprise. [0007]
  • Various approaches have been applied in an attempt to achieve ubiquitous access to data. One approach is to maintain all of the data in one central location. As the amount of data grows, this approach rapidly leads to a bottleneck at the servers as many “clients” attempt to simultaneously access the body of data. Furthermore, the remote access to the data requires a communications infrastructure and may consume considerable bandwidth. [0008]
  • To relieve these constraints, a different approach involves replicating the data at many distributed sites. In most cases, it is usually not known beforehand what particular data may be needed at a given site, so the entire data store must be replicated at each site. While this divides the demands upon the access to the data, this approach introduces problems in maintaining synchronization among the copies of the data. Furthermore, the replication multiplies the overall storage resources needed, which can be very substantial. If a design is chosen that replicates the data as needed to maintain a certain level of performance in accessing the data, then the overall storage may actually grow as the square of the data size. [0009]
  • As a compromise between centralization and replication, a caching approach can be used wherein local data stores are used to partially duplicate only those portions of the overall data that are needed locally. Typically, in response to requests from points of use that rely on the cache, the local cache selectively downloads data only on an as-needed basis. The cache will accumulate a self-forming subset of the overall data. Once loaded, a particular data item in the local cache may be held indefinitely or may be discarded after a time according to a caching algorithm. Schemes have also been deployed for ensuring that data in the cache is kept current as changes occur in the corresponding data in the master data store. Although a distributed approach introduces some complexities, there are some advantages to be gained. [0010]
  • BRIEF SUMMARY OF THE INVENTION
  • The present invention is directed to a method and system whereby data entities, even in a highly distributed and partitioned environment, may be readily accessed by client applications across an enterprise. [0011]
  • A new approach is required in the context of a partitioned body of data wherein separate data stores are maintained by separate computing processes and separate business functions and are usually physically separated. When data resides in a single space, such as data tables in a relational database, it is easy to represent relationships among data elements. [0012]
  • For example, in a database, a first table may contain employee information and each record might have as separate fields, an employee number, a social security number, a hire date, and a salary grade. There may be a second table wherein each record maps an employee number to a (project number) department number and internal mail location. Yet, a third table may have social security numbers mapped to an employee's name and home address. [0013]
  • It is even possible to express (or enforce) that a one-for-one or a one-for-many relationship exists between the corresponding data elements. For example, a relationship may be built that enforces a one-for-one relationship between employee number and social security number. Another relationship may allow the same department number to be claimed for many different employees. [0014]
  • Once a correspondence among data fields is established, useful information may be extracted drawing upon the collective set of tables. In the above example, a database designer may explicitly establish that the employee number field in the first table corresponds to the employee number field in the second table and that, where matching values are found in these two fields, the remainder of the fields in the associated records can be effectively joined to form a composite record. Thereafter, a report may be easily created listing the salary grades of the employees in a given department, despite the fact that the pieces of information are maintained in separate tables. Properly designed, this separation of data into related tables lends advantages in efficiency and flexibility as is well known in the field of relational database technology. [0015]
  • Combining table contents based on a correspondence among fields is referred to as a “table join” and is fairly easy to accomplish when the tables are maintained in a common file or are accessible by a common application or process. [0016]
  • Beyond the realm of relating tables in a database, it is also necessary to cause data objects in a computing environment to be associated with one another in some fashion so that they can cooperatively provide a desired function. As is well known in computing science, an association among two data objects may be formed by, for example, having either or both of the objects contain a reference or handle or pointer to the other object. This tends to happen inherently where a first object causes the dynamic creation or “instantiation” of a second object. After the second object is created, the first object maintains a memory address for the newly-created second object for the purpose of subsequently accessing the data or invoking the methods of the second object and for ensuring that the second object is properly removed from the memory space when it is no longer needed. [0017]
  • Associations among data entities, such as database tables or streamable data objects in a distributed computing environment, may also be formed and maintained externally without the associations being imbedded in the objects themselves. Externalized associations have been proposed whereby a first data object and a second data object may be associated by an external entity which maintains a reference to both objects and has a description of how the objects are related. This implies the use of an external association engine which must be involved whenever a computing task involves cooperation between the first data object and the second data object. In this approach, the first and second objects need not “know” about one another nor contain any provisions for pointing to one another. Indeed, the association among the first and second data objects may occur well after the objects have been designed and implemented. Associations may later be formed as needed, as in response to requirements that were not apparent at the time the data objects were initially implemented. Of course, this enables tremendous flexibility in the growth of a distributed computing environment. [0018]
  • In a large computing domain, such as a global enterprise or a government, data objects may be highly partitioned. To fulfill a needed function, an application may need to draw upon data and functionality from many sources that are separately maintained and often logically or geographically remote from one another. In fact, even a single data object, offering some particular useful functionality or a particular view of the global data, may itself be partitioned and distributed among many sources. In the context of highly-partitioned data, there is a desire to support the creation of such composite objects which transcend being located in any one data store. [0019]
  • While an externalized association engine may at first be contemplated to fulfill this need, the aforementioned problems with centralization make the externalized association engine impractical for large scale implementations. Recall that the externalized association engine must support the interaction among objects, including the assembly of composite partitioned objects, for the entire computing environment. It is foreseen that even attempts to moderately distribute the function of a unified, externalized association engine will introduce difficulties and invite the potential for catastrophic failures. [0020]
  • Therefore, there is a need for a method and system which supports ubiquity of data access, subject to security constraints, of course, across a large enterprise wherein the data may be highly distributed and partitioned. [0021]
  • Overall resources may be conserved and availability of data enhanced if the data store is allowed to remain naturally partitioned, with each portion of the data store maintained nearest the original source of the data or nearest the highest volume of interaction with the data. [0022]
  • It is an important advantage of the present invention that an application needing access to data anywhere in the enterprise does not need to know where such data may be located. The application calls for the data without having to specify where to look. Furthermore, the data needed is readily accessed without undue delays, as if all of the data were local to the application. The mechanism taught by the present invention automatically handles the finding and retrieval of requested data without burdening the application. This readily-available and seemingly-ubiquitous access to the data at large has been referred to as a “data dial tone” by the present inventors, drawing an analogy to the ability of a telephone caller to place a call to anyone without knowing how the call will be routed nor even exactly where the call will be received. The term “data layer” has also been inspired to refer to this style of accessing the enterprise-wide collection of data without regard for location. [0023]
  • A further advantage of the present invention is that, due to the manner in which associations are made and data objects are found, associations may transcend simple object-object linkages. Associations may be defined by “fuzzy” criteria and may cause useful information to be retrieved beyond what a requesting application would have known to explicitly ask for. [0024]
  • In accordance with an exemplary embodiment of the present invention, association forming entities are a) maintained as objects in a like manner to the data objects being associated, and are b) themselves partitioned objects comprising two or more association fragments, each association fragment being mostly concerned with the interfaces to a particular data object participating in the association. [0025]
  • In accordance with an exemplary embodiment of the present invention, each association fragment affiliated with a particular data object is stored in a location that enhances the ease of interaction between the association fragment and the data object. For example, where a first data object and second data object are maintained in data stores at some distance from one another, physically or logically, then a first association fragment will be located with or near to the first data object and a second association fragment will be located with or near the second data object, at least within the same partition. This arrangement may be preferable because the volume of interaction between a data object and its respective association fragment may far outweigh the interaction needed among the two association fragments. This arrangement may also be preferable as the volume of interaction between a client application and both the data object and respective association fragment may exceed the interaction needed among the two association fragments. Some interactions will employ only one of the association fragments with the net result being a reduction in communications requirements and an improvement in performance. [0026]
  • The present invention further provides for defining logical domains which are arbitrary and entirely orthogonal to partitions. [0027]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as an exemplary mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein: [0028]
  • The present invention is illustrated by way of example, and not by way of limitation, in the Figures of the accompanying drawings and in which like reference numerals indicate similar elements and in which: [0029]
  • FIG. 1A depicts a point-to-point architecture where applications message one another directly according to prior art messaging techniques; [0030]
  • FIG. 2 is a representative diagram of an application; [0031]
  • FIG. 3 is a logical diagram of an enterprise network containing CORBA-enabled processes distributed in both [0032] domain 1 and domain 2;
  • FIG. 4 is a diagram representing independent systems' stovepipe relationships as might be expected in a telecommunications enterprise according to the prior art; [0033]
  • FIG. 5 is a diagram of the NewWave network management concept in accordance with an exemplary embodiment of the present invention; [0034]
  • FIG. 6 is a diagram illustrating the concept of many, small generic servers in many geographic locations distributed for enterprise use in accordance with an exemplary embodiment of the present invention; [0035]
  • FIG. 7 is a diagram illustrating various typical configurations of the small servers running various operating systems in which VM containers are running on host servers in accordance with an exemplary embodiment of the present invention; [0036]
  • FIG. 8 is a conceptual diagram of distributive concepts for managing an ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention; [0037]
  • FIG. 9 is a diagram of service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention; [0038]
  • FIG. 10A is a diagram depicting launching and registering service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention; [0039]
  • FIG. 10B is a diagram depicting finding and implementing a local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention; [0040]
  • FIG. 10C is a diagram depicting finding and implementing a non-local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention; [0041]
  • FIG. 11A is a flowchart depicting a process for launching and registering service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention; [0042]
  • FIG. 11B is a flowchart depicting a process for finding and implementing a local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention; [0043]
  • FIG. 11C is a flowchart depicting a process for finding and implementing a non-local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention; [0044]
  • FIG. 12A is a flowchart depicting the process employed by the registrar for registering services in accordance with an exemplary embodiment of the present invention; [0045]
  • FIG. 12B is a flowchart depicting the process for enterprise leasing in accordance with an exemplary embodiment of the present invention; [0046]
  • FIG. 12C is a flowchart depicting a process employed by the registrar for looking up a service in accordance with an exemplary embodiment of the present invention; [0047]
  • FIGS. [0048] 13A-13B are flowcharts depicting the transaction process employed by the transaction manager is illustrated in accordance with a preferred embodiment of the present invention;
  • FIG. 14 is a diagram depicting a service failure and re-homing the service to a different server and further depicting self-healing a proxy reference using a smart proxy in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention, and further illustrates self-healing a proxy reference using a smart proxy; [0049]
  • FIG. 15A is a flowchart depicting a service restarting process in a global ecosystem of interrelated services in accordance with the present invention; [0050]
  • FIG. 15B is a flowchart depicting a process se for self-healing stale references using a smart proxy in accordance with the present invention; [0051]
  • FIG. 16 is a diagram depicting a conceptual realization of the DataBus two-tier infrastructure concept for mediating data transactions and an enterprise-wide data persistence layer which allows clients to access shared enterprise data in accordance with an exemplary embodiment of the present invention; [0052]
  • FIG. 17A is a traditional representation of an E-R diagram; [0053]
  • FIG. 17B is a representation of nodes and arcs of the E-R diagram being mapped onto entity engine processes and association engine processes; [0054]
  • FIG. 18 is a diagram illustrating three entities, [0055] entity A 1802, entity B 1804 and entity C 1806 partitioned in accordance with an exemplary embodiment of the present invention;
  • FIG. 19 is a diagram illustrating three container-database partition pair in accordance with an exemplary embodiment of the present invention; [0056]
  • FIG. 20 is a diagram depicting DataBus components necessary for creating an entity instance in accordance with an exemplary embodiment of the present invention; [0057]
  • FIG. 21 is a flowchart depicting a process for creating an entity instance in accordance with an exemplary embodiment of the present invention; [0058]
  • FIG. 22 is a diagram showing a read/write copy of the entity instance being streamed directly to the client in accordance with an exemplary embodiment of the present invention; [0059]
  • FIG. 23 show the cache server approach where a copy of the entity instance is streamed to a cache server rather than the copy being directly steamed to the client in accordance with an exemplary embodiment of the present invention; [0060]
  • FIG. 24 is a diagram showing the event notification approach where the client is using only read-only copies of the entity instance and receiving change notifications whenever an update is received in accordance with an exemplary embodiment of the present invention; [0061]
  • FIG. 25, on the other hand, the optimistic concurrency approach depicts the client using a read/write copy that must stay in sync with a master copy in order for updates to be accepted in accordance with an exemplary embodiment of the present invention; [0062]
  • FIG. 26 is a diagram depicting DataBus components necessary for performing the multi-hop find process in accordance with an exemplary embodiment of the present invention; [0063]
  • FIG. 27 is a flowchart depicting a multi-hop find process in accordance with exemplary of the present invention; [0064]
  • FIG. 28 is a diagram representing a logical domain boundary defined from partitions in each of several entities in accordance with one embodiment of the present invention; [0065]
  • FIG. 29 is a diagram of NW service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention; [0066]
  • FIG. 30 is a flowchart depicting a process for finding entity instances that are associated with an instance in accordance with exemplary of the present invention; [0067]
  • FIG. 31 is a diagram showing external [0068] central association engine 3102 which consists of a plurality of link records which describe associative relationships between Customer entity instances and Account entity instances;
  • FIG. 32 is a diagram of NW service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention; [0069]
  • FIG. 33 is a flowchart depicting a process for getting all accounts instances that are associated with an identified customer instance in accordance with an exemplary embodiment of the present invention; and [0070]
  • FIG. 34 is a flowchart depicting a process for getting all accounts instances that are associated with an identified customer instance using smart proxies in accordance with an exemplary embodiment of the present invention; [0071]
  • FIG. 35 is a diagram of the MOC and associated NewWave service necessary for collecting events into policy-based work documents, and then directly routing work to the best currently available operations staff that is automatically assembled based on the individual staff members' aptitude for particular tasks in a process flow in accordance with an exemplary embodiment of the present invention; [0072]
  • FIG. 36 is a functional diagram of the MOC depicting interactions between key MOC components interact in accordance with an exemplary embodiment of the present invention; [0073]
  • FIG. 37 is a diagram of an assessor for assessing events based on organizational rules in accordance with an exemplary embodiment of the present invention; [0074]
  • FIG. 38 is a diagram illustrating a basic design of an aggregator in accordance with an exemplary embodiment of the present invention; [0075]
  • FIG. 39 is a diagram of a simplified version of a state machine in accordance with an exemplary embodiment of the present invention; and [0076]
  • FIG. 40 which depicts a user avatar lookup in accordance with an exemplary embodiment of the present invention.[0077]
  • Other features of the present invention will be apparent from the accompanying drawings and from the detailed description which follows. [0078]
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention relates to data processing. More particularly, the present invention relates to the management of information technologies. [0079]
  • The automation of manual business processes was one of the first important tasks for which computers were employed. Prior to integrating the business processes in computer applications for execution on computer-implemented systems, business processes were typically segmented along departmental lines, so naturally the computer business process applications that automated those business processes were likewise segmented along departmental lines. The resulting computer-implemented applications/systems were characterized as having narrow scope, rarely doing little more than automating the same steps and procedures that comprised the manual business process. Because of a lack of interoperability, they seldom integrated with other systems which likewise made sharing resources impossible. Normally, this way of providing answers to an enterprise can only tailor the answer from the perspective of the department that manages the stovepipe. An enterprise answer, or a solution to an enterprise level problem, might require that an enterprise user access several, or even all departmental stovepipe applications for the departmental perspective view in order to get a “piece” of the entire enterprise level solution. It would then be left to the user to coalesce the departmental answers from the respective stovepipe applications into a unified enterprise level solution by integrating the disparate departmental perspective answers into an enterprise level solution. [0080]
  • Currently, within enterprises exist many stovepipe applications that address and solve very narrow problems within departments. For example, human resources, finance, timekeeping and even resume-tracking applications within human resources are natural stovepipe applications that address particular problems within an enterprise. Moreover, vendors of specialized stovepipe applications often become extremely proficient at solving penumbra issues that cross enterprise boundaries and are adopted by widely-diverse enterprises. An enterprise might be thought of as consisting of having umbra and penumbra functions, umbra being methods, processes and the associated resources necessary for accomplishing core enterprise charter goals, and penumbra being methods, processes and the associated resources necessary for accomplishing and supporting the charter goals. Alternatively, an enterprise's core functions can be described as revenue centers, while support functions can be characterized as cost centers. Examples of umbra stovepipe applications include inventory control applications and sales tracking applications that exist within a sales organization; reservoir management applications, downhole logging applications and production and field control applications that exist within an oil production company; admissions and discharge applications, medical record keeping applications and laboratory applications that exist within a healthcare provider; and even legal instrument-drafting applications, docketing applications and litigation toolkit applications that exist within a law firm. These applications came about when traditional mainframe systems failed to solve individual departmental problems or, more likely, were not flexible enough to solve the problems in a timely fashion. Because of this failure, a “departmentalized” solution ensued and critical, mission-critical departments implemented their own systems. These systems owned, maintained and protected the applications, hardware and resources necessary to efficiently perform their missions, resulting in an enterprise made up of independent “islands” of special purpose applications, hardware and resources. [0081]
  • Even though departments were protective toward their stovepipe systems, that did not mean that departmental users did not want to share information or resources with the remainder of the enterprise. Instead, it was merely indicative of the processes, data and resources existing within a single department. Incontrovertibly, this reality demonstrated that the enterprise parts, or departments, were automated without regard for the enterprise level needs. Information, process and resource sharing among enterprise departments were rarely considered when selecting a vendor's stovepipe application/system. As a result, there were no open application programming interfaces (APIs), open architectures, or other mechanisms that allowed for ready access to the processes and data existing within these stovepipe systems. In order to achieve acceptable results with a department's stovepipe system, an enterprise user had to be proficient with a department's stovepipe application, system and GUI, as well as understand how the application managed its resources. [0082]
  • Traditional systems (also known as “legacy systems”) are applications that exist as stovepipes, such as departmental or vendor stovepipes, in a centralized enterprise environment. Mainframe-based systems make up a majority of traditional systems, while minicomputers and large UNIX-based systems might also be correctly referred to as traditional systems. The characteristics that define the traditional system include centralized processing, unshared resources and terminal-based access. Traditional systems typically support a large user and processing load on both database and business processes that exist together within the same environment. While these systems may support thousands of users concurrently accessing the same application, sharing processes and resources between applications is uncommon. Moreover, sharing processes and resources to applications outside the system is unheard of; however, simultaneous access to an application across a single platform is a powerful incentive for businesses. The total cost on ownership (TCO) for these systems is relatively low when compared to PCs and workstations. Therefore, rather than becoming extinct, these systems not only continue to sell, but older applications leveraging traditional systems have demonstrated significantly more staying power than originally anticipated. The prior art's answer to the shortcomings of stovepipe applications was to implement Enterprise Application Integration (EAI) between stovepipe applications. [0083]
  • In general, applications serve two primary purposes: (1) they perform routine business processes that support a business function; and (2) they access, process, and/or display data. At the highest level of abstraction, applications can be organized by the functions they perform and the data they process. EAI, in its most idealistic form, involves the unrestricted sharing of business processes throughout an enterprise's networked applications or data sources. Software programs in areas such as inventory control, human resources, sales automation and database management which were custom built in the technology of the day were designed to run independently for addressing a specific need and do not share. Many times the applications were implemented as proprietary systems, with no interaction between the systems and thus did not share. EAI's popularity can be attributed, in part, to the need for maintaining the older stovepipe applications, while simultaneously integrating them within a new enterprise application infrastructure. As the enterprises grow and recognize the need for their information and applications to have the ability to be transferred across and shared between systems, companies invest in EAI in order to streamline processes and keep all the elements of the enterprise interconnected. [0084]
  • The focus of EAI is primarily directed into four major categories: database linking, application linking, data warehousing and virtual systems approach. Database linking involves implementing EAIs between departmental databases for sharing information with each other and duplicating information as needed based on a set of rules. Application linking involves the enterprise sharing business processes and data between two or more applications. Data warehousing involves data being extracted from a variety of resources (data sources) and compiled in a specific database for analysis. This unified collection of data better supports management decision making by allowing enterprise users to view resource data from a variety of stovepipes from an enterprise perspective. Data warehouses contain a wide variety of data that present a coherent picture of business conditions for the enterprise at a single point in time. The final category of EAI is a common virtual system which involves using EAI in all aspects of enterprise computing, tying applications, resources and data together so that they appear as a unified application to a client. [0085]
  • EAI is often referred to as “middleware” because EAI software functions as a conversion or translation layer. It is also a consolidator and integrator. Custom-programmed middleware solutions have been developed for decades to enable one application to communicate with another that either runs on a different platform or comes from a different vendor or both. Middleware is software that translates commands or data between different software programs. [0086]
  • EAI exists in two popular architectures, point-to-point and hub and spoke. Typically, point-to-point architectures are referred to as messaging EAIs, while hub and spoke architectures are referred to as middleware EAIs. Both variants allow existing enterprise applications to supply existing business processes and resources to other enterprise applications. With respect to the first type of architecture, point-to-point applications directly access data and resource data from other applications. FIG. 1A depicts a point-to-point architecture where applications [0087] 102-116 message one another directly. Each enterprise application must be modified with a messaging agent, a queue and a relationship application table for listing other enterprise applications and the data and resources that they own. Java applications may require further modification with a multi-valued attribute, a “codebase,” for storing the location of the object's class definition. An application interacts with the messaging agent whenever the application determines that it needs access to data or resources that it does not own. The messaging agent accesses the relationship table for the location of an application that owns the needed resource. An initial request message is sent to the application that owns the resource for specific resource data. Here, several potential transitions may take place depending on the requestor application (e.g., temporary use of the resource, updating the resource, etc.) However, the resource owner application might be busy at the time the request is received, so the request is queued until the application is free to process the request. Once the response message is sent to the recipient, the recipient application might also be too busy to process the incoming message thread. In that case, the resource data in the response is also queued in anticipation of a processor freeing up and the process thread needing the resource being executed. At some point, the thread is executed in accordance with the application's processes. The messaging agent is responsible for the message and data integrity that it sends and/or receives, so if the transaction is not completed, the messaging agent must repeat the transaction.
  • As can be understood from the foregoing, each application requires significant modifications for point-to-point EAI to be effective. If an enterprise application is upgraded, modified or even migrated to a different physical location, it and any application that it relies on, or that relies on it, must also be modified for subsequent point-to-point messaging transactions to be successful. In addition, each individual enterprise stovepipe application is a potential bottleneck as the individual applications are usually not scalable for messaging responses. Finally, inter-application messages can either be in the form of some proprietary messaging protocol or may, instead, take advantage of existing messaging protocols and messaging specification. If the enterprise utilizes proprietary messaging protocols, the protocol specification must be formalized within the enterprise and maintained and a corresponding message transport devised. If, on the other hand, existing protocols are to be used, then the enterprise's existing message transports that utilize those protocols will be called on for handling the added burden of the point-to-point messages. [0088]
  • The second EAI architecture improves on existing point-to-point middleware by utilizing a message broker that manages communications among all enterprise stovepipe applications. The message broker communicates directly with each participating application and thus forms the “hub” of a hub and spoke messaging architecture. Message-broker processing is a mixture of schema and content transformation, rules processing, message splitting and combining, as well as message routing. Once the processing is complete, the information is sent to any target system that needs to receive that information using whatever native format the target application can understand (e.g., eXtensible Markup Language (XML), IDoc, Java Message Service (JMS) message, proprietary, etc.). [0089]
  • FIG. 1B depicts a hub and spoke messaging architecture wherein [0090] messaging middleware 140 serves as a central point of communication between enterprise applications 122-136 for transferring messages between applications. Hub and spoke architecture has the advantage that the participating applications require somewhat less custom programming because messaging middleware 140 acts as a messaging broker for providing an interface between stovepipe applications, thus allowing them to asynchronously send data back and forth to each other. Data sent by one application is stored in a middleware queue and then forwarded to a receiving application when that application becomes available to process it. In addition to a transport means, the messaging broker provides stovepipe applications with distribution rules for forwarding messages and formatting rules for reformatting data from a sending application's format to a receiving application's format. A rules engine analyzes incoming messages and makes routing decisions, while a formatting engine converts the data into the structure required by the receiving application. The messaging broker provides disparate stovepipe applications with a common message transport and queuing system, thereby relieving applications from the responsibility of ensuring that the data sent is properly received.
  • In practice, a messaging broker can be either a complete messaging system or software that works with existing messaging transports in order to add routing intelligence and data conversion capabilities. While the hub and spoke architecture represents a significant advancement over independent stovepipes and an improvement over point-to-point messaging, the hub-and-spoke EAI solution is resource-constrained because all the processing takes place on a single server. Eventually, the number of connected systems and the information traffic will saturate the available resources of the integration server (memory, processor, and disk) resulting in reduced performance. Bottlenecks can and do occur and scheduling can become problematic for enterprise applications. Moreover, once an application signals its intent to process resource data from the messaging queue in the hub, the messaging broker may be busy and thus unavailable to pass the necessary resource data to the requesting application prior to the receiving application timing out. In that case, the application thread is held up waiting for the resource data to arrive and might in fact timeout prior to the messaging broker responding to the application. If a timeout occurs, the resource data remains queued until the application is again freed up. Overloads on the messaging broker have led to the development of a “federated architecture” wherein the applications connect to a single integration server or hub statically and are able to exchange information with each other. This means that all information produced or consumed from a particular application is available only for processing within a particular hub. Since the hubs are interconnected, each hub appears to the other hubs as connected applications, thus producing and consuming messages. However, messages produced from a single application may process only on a single hub because they are statically bound to that hub. This architecture does not allow hubs to share the message-processing load, or nor does it allow other hubs to process messages from applications that are not directly connected. [0091]
  • In general, applications serve two primary purposes: (1) they perform routine business functions that support a business process; and (2) they access, process, and/or display data. At the highest level of abstraction, applications can then be organized by the functions they perform and the data they process. A representative diagram of an application is depicted on FIG. 2 as any of [0092] applications 202A-202N. Since an application is the building block of an information system, it can be expressed as a collection of software programs that execute user interface 204A, business rules 206A, and data access operations 208A, all of which are necessary to execute a business process. Typically, application 202A consists of a plurality of services that perform these operations. Services are any predefined, specialized results which are produced from specific software programs designed to perform explicit data processing operations when called upon. Services might be considered as either business logic services or infrastructure services. Business application services are designed and developed to provide specific computational, input/output, or data access operations when called upon at execution time, while infrastructure services provide computer platform operating systems, database management systems, or network platforms for supporting business applications.
  • Returning to FIG. 2, [0093] application 202A uses business rules 206A as a logical specification for the business' requirements. Business rules 206A define computational algorithms and operations to perform explicit data processing operations that are necessary to implement a business process. Also shown in FIG. 2 is a logical representation of another prior art mechanism utilizing the aforementioned messaging architecture for handling stovepipe applications. Stovepipe applications 202A-N are the defined logical layers that provide practical boundaries for physically segmenting the application into smaller, more manageable program segments. The interactions between logical layers of an application can be accomplished through messaging and middleware services as described above. The logical layers of an application are defined as a user interface layer, a business logic layer and a data access layer.
  • The user interface layer of an application interacts directly with end-user input/output devices (e.g., Windows workstations or a printer/fax device). The user interface layer is the most visible aspect of the business process supporting the end user. It encompasses a variety of operations, such as window or screen management, keyboard and mouse handling, end-user help functions, general input editing and data type validation, or formatting data for output to a laser printer or plotter device. [0094]
  • The business process (logic) layer of an application implements the particular requirements of a business process based on a set of business rules. The business rules may be no more than developer guidelines, but more often are generic algorithms that can be tailored to a business' needs by the user selection of values for parametric constraint variables. Typical operations at this layer consist of controlling the logical flow of interaction between the end user (via the user interface layer), access and manipulation of data or information (via the data access layer), and specific computational algorithms to be performed (via the business logic layer). [0095]
  • Finally, the data access of an application includes the operations needed to store, access and maintain data or information necessary to support a business process. The data accessed within this layer can include both structured and unstructured formats, depending upon the application requirements. For the most part, a commercial relational database management (RDBMS), or proprietary file access system, provides the services performed within this layer. [0096]
  • The division of applications A-N into logical layers and the inherent physical program design characteristics necessitate services that enable communication between logical and physical layers via messaging services and data access middleware and operate fundamentally as described above. The intent of the logical layer concept is to stratify applications by their analogous functional levels while maintaining the unique character of each application A-N. Application management becomes more of a concern because the natural tendency of programmers is to offload processing tasks to other, more capable applications while focusing their efforts on the core functional aspects of an application. This distributed concept tends to centralize certain services at key applications. Failures and modifications of those key applications can result in disastrous effects across the enterprise. [0097]
  • Separating an application into discrete layers permits application services to be scaled and positioned where appropriate and reduces the complexity inherent in single-platform solutions. Specialized application components can be combined to achieve the best results, and similarly, different combinations of clients and servers allow for a computing fix to these specialized application components. However, the layered application approach suffers from all of the above-described shortcomings attributable to the messaging and middleware EAIs. The user interface and business process application levels must be internally modified for messaging interfaces, user [0098] interface messaging interface 220, and business process messaging interface 222 for communications between the respective application levels, while data resources are handled by a completely different architecture. Data, while being accessible to any application within the enterprise, is still owned by a single application. Resource access bottlenecks become more prevalent at the enterprise level so data access middleware 224A-224N is regularly configured as federated architectures. In short, while the layered application concept somewhat distributes services in layers across an enterprise, the stovepipe application structure is maintained because each application remains responsible for providing its own necessary services and managing its own resources and data.
  • Another prior art means for sharing services between applications is through the use of distributed object systems such as Common Object Request Broker Architecture (CORBA)-enabled processes. CORBA-enabled processes can be placed and run on the same machine or on any machine in a network enterprise differing from messaging middleware in that they cause processes (components/objects) to be executed in real-time rather than sending data. Examples of these CORBA applications and other similar distributed object systems include System Object Model (SOM) and Distributed System Object Model (DSOM) from IBM Corporation, One New Orchard Road, Armonk, N.Y. 10504; or Component Object Model (COM) and Distributed Component Object Model (DCOM) from Microsoft Corporation, One Microsoft Way, Redmond, Wash. 98052. [0099]
  • CORBA provides a way to execute programs (objects) written in different programming languages running on different platforms no matter where they reside in the network using an “object bus” or “software bus,” a software-based communications interface through which objects are located and accessed. Objects reside on various machines throughout the distributed environment and are tasked with performing duties defined by their implementation. [0100]
  • FIG. 3 is a logical diagram of an enterprise network containing CORBA-enabled processes distributed in both [0101] domain 1 and domain 2. CORBA objects are defined by an Interface Definition Language (IDL) that describes the processing (methods) the object performs and the format of the data sent and returned. IDL definitions are stored in an interface repository (not shown) which can be queried by client application 312 to determine what objects are available on the bus. However, unlike such standard servers, objects have the ability to move around if needed. A client communicates with an object through an object reference. This is a pointer to the object that allows requests for operations and data access to be sent from the client to the server via an object request broker (ORB). In the Figure, the ORB is depicted as client ORB 316 and server ORB 322, but could be conceptually represented as an ORB bus between client 310 and server 320 and connected to a plurality of objects (or object implementation). At runtime, CORBA client 310 makes requests to remote CORBA object 328 via an ORB 316. ORB 316 provides a proxy object in the client's address space which creates the illusion that remote object 328 is a local service or process. ORBs 316 and 322 manage the interactions between client 310 and object implementation 328. Client 310 issues a request and invokes methods of object implementations. Client 310 and server 320 communicate by exchanging messages defined by the General Inter-ORB Protocol (GIOP). When client 310 calls a CORBA operation, client ORB 316 sends a GIOP message to server 320.
  • The client-side architecture provides client [0102] 310 with interfaces to ORB 316 and object implementations. A dynamic invocation (not shown) allows for the specification of requests at runtime whenever the object interface is not known at runtime and utilizes the interface repository. Each CORBA implementation comes with one or more IDL compilers (not shown) that know the language mapping for the language in which they were designed (i.e., that used by client application 312). It is the IDL compiler's job to turn the IDL into stub and skeleton files 314 and 326, respectively. These files are used in distributed applications to make object communication almost transparent. Stubs and skeletons are all language- and ORB-dependent so the same IDL file is used to generate the stubs and skeletons for each language and ORB implementation. IDL stub 314 is used in client processes to communicate with server 320. Stub files 214 consists of functions generated by the IDL interface definitions and linked into client application 312 for a mapping between client application 312 and ORB 316. Client application 312 uses stub 314 to make calls to the server objects. Functions needed by client 312 are called just as if they were local objects. However, stub object acts only as a proxy that forwards requests to and responses from a CORBA process on a remote server.
  • The implementation-side interface consists of [0103] server ORB 322, IDL skeleton files 326 and object adapter 324. Skeleton files 326 are the converse of stub files 312. They are what the server-side applications use to seamlessly receive distributed requests. It is the skeleton's job to receive requests from ORB 322, call the proper implementation, which in this case is object implementation 328, and return the results. ORB 322 calls method skeletons to invoke the methods that were requested from client application 312. Object adapter 324 provides the means by which object implementation 328 accesses most ORB services. Object adapter 324 isolates object implementation 328 from ORB 322. A server may have a variety of object adapter types, each providing specific services.
  • In short, [0104] client application 312 connects directly to ORB 316 through its stub 314. Object implementation 328 on server 320 connects directly to object adapter 324 through skeleton files 326. Object adapter 324 then connects to server ORB 322. A request from client application 312 is next sent through client stub 314, across ORBs 316 and 322 to the proper object adapter and through server 320's object adapter 324 and skeleton files 326, eventually reaching implementation 328. The return value of the implementation follows the same route in reverse.
  • Every object on the ORB has an Interoperable Object Reference (IOR) which is a global identifier string that identifies the machine on which its associated object is located and the interface that the object supports. It has encapsulated the IP, PID and other values required by the client to connect. Client [0105] 310 can use IOR for an object and standard function calls on ORB 316 to find an object reference. Client ORB 316 uses the IOR to determine what type of object is being referenced and the identity of the server for routing requests. In single machine domains, the client can write its own IOR to a file and get all server objects on the ORB since the ORB stays within the domain of the client machine. The client could then read the IOR from this file and have the ORB resolve it into an object reference. However, when the server object is in a different domain from that of the client machine, the client must receive a reference to the object from an independent service. Usually, this is accomplished by writing server 320's IOR to a Server IOR File and placing it in a well-known location, using http, shared file system or ftp. At start up, client 310 merely accesses the file system for the server's IOR. This method for bootstrapping, although simple to understand and test, has several disadvantages, notably the need for the client and the server to share access to a file system.
  • Another method for locating an object server is for the enterprise to employ naming [0106] service 302. Naming service 302 uses a standard CORBA object which contains operations that bind, resolve, and unbind human-readable names with an IOR. When a service object is created, it binds its IOR with a name in naming service 302. By looking up the associated name, any other object on the ORB, or with access to the naming service, can retrieve that object reference from the naming service server. Client application 312, needing a connection to server 320, merely retrieves a reference to naming service 302 and accesses server 320's IOR by the server's name. Then, server 320's IOR is resolved into the identity of the server for routing requests.
  • A stovepipe application is a stand-alone program. It implies an application that does not integrate with or share data or resources with other applications. Many current systems have been built as “stovepipe” applications, meaning that they do not communicate easily with other enterprise systems. Moreover, these stovepipe applications form their own system “islands” with their own hardware platforms, development languages, protocols and resources (e.g., rules, databases, etc.) Corporations are demanding new systems changes at an astounding rate, and unfortunately, these old legacy systems do not adapt well to change. A telecommunications company, for example, might have had separate systems for plain-old telephone service (POTS) customers, inter-exchange carrier (IXC) customers and wireless customers. [0107]
  • FIG. 4 is a diagram representing independent systems' stovepipe relationships as might be expected in a telecommunications enterprise according to the prior art. Current day “independent systems'” stovepipes are represented in the Figure as stovepipes A-N. Telecommunications enterprises implement specific telecommunications systems in a effort to provide their customers with profit-generating services. The telecommunications services provided to the enterprise's customers are represented in the Figure as Digital Subscriber Line service ([0108] DSL 410A), Asynchronous Transfer Mode network services (ATM 410B1 and 410B2), Synchronous Optical NETwork (SONET) fiber-optic transmission system services (vendor “A” 410C and vendor “B” 410D), and Internet Protocol services (IP). As will be understood from the figure, each of the enterprise's services 410A-410N must be managed by its own specialized management applications, represented in the Figure as management applications 408A to 408N. The combination of the services and management applications define the enterprise's profit centers. While many of the management applications 408A to 408N may own services and/or resources identical to those owned by any of the other management applications in the enterprise, the enterprise's management applications are tightly coupled and therefore do not share services and resources. As discussed above, this happens because a particular management application, for instance management application 408A, is developed for a unique enterprise service, which in this case is DSL 410A, without any thought of sharing the application's resources and services with any other management application within the enterprise. Other enterprise management applications were developed for enterprise systems in a similar ad hoc fashion.
  • Each of [0109] management applications 408A-408N performs specific management tasks associated with a corresponding service provided by the enterprise to its customers; however, rarely does a management application provide the services necessary to cost center applications (i.e., tracking and billing customers and accounts for the service usage). Therefore, in addition to developing a management application 408A for specific enterprise services, it was often necessary for an enterprise to stovepipe a business application, represented in the Figure by business application 406A, to the management application for providing cost center services and functionality not provided by the profit center application. The combination of corresponding independent cost center applications and profit center applications form independent systems' stovepipe applications. Events and information are communicated between individual management and business application stovepipe systems using point-to-point messaging architectures as described above. However, each application owns the resources and data necessary to carry out its functionality. Application services are not shared between business and management applications but instead, data and events are merely passed up the stovepipe system. For the most part, information is transferred to and from an administrator working in Operations Center (Ops) 404A on client 402A through either business application 406A or management application 408A.
  • Notice that the stovepipe systems for [0110] DSL 410A and IP 410N are fairly analogous and symmetric. However, as discussed above, in certain situations, EAI is possible between the business applications and the management applications. Notice, for instance, that the administrator on client 402B may receive an integrated presentation from each of business applications 406B and 406C. Notice also that rather than business applications 406B and 406C being stovepiped directly to a separate management application, that each of business applications 406B and 406C communicate directly to each of management applications 408B-D. This is possible through the use of enterprise application integration between independent stovepipe systems for similar enterprise services as management application 408B handles a synchronous transfer mode routers through ATMs 410B1 and 410B2, while management application 408C manages a particular vendor's version of synchronous optical networks (SONET) and management application 408E handles a second vendor's SONET 410E. Here, rather than each management application having its own stovepipe business application, the enterprise is able to consolidate business applications from three independent stovepipe business applications to only two, 406B and 406C. Thus, the enterprises achieved processing and storage efficiency by handling only two independent stovepipes for the three management applications. Notice, however, that true resource integration has not been accomplished. In fact, the only point at which resource data is truly integrated is in the integrated presentation 404B to client 402B. Thus, while the enterprise has realized a certain amount of reduction in scale due to reducing the duplicative business application processes and resources, none of management applications 408A to 408E share any services or resources whatsoever. In fact, with regard to the telecommunications enterprise depicted in FIG. 4, it should be apparent that the only true data integration occurs at the presentation level. For instance, by integrated presentation means 404B for client 402B. Thus, rather than applications 406B and 406C sharing resource data, the data is actually fed to integrated presentation means 404B.
  • From the representative stovepipe relationships in FIG. 4, it is apparent that any of [0111] management applications 408A to 408N may have duplicative services from any of the other management applications, as none of the management applications communicate with one another, and instead communicate only along their own independent stovepipe lines. Those services would be under-utilized with respect to the enterprise and require that more enterprise resources be devoted for housing those services. The same is true of resources needed for the execution of the services within management applications 408A to 408N. While it is true that the various enterprise services 410A to 410N may require different resources be available to the management applications, it may also be true that various resources may be common among the various management applications. Network elements compound the stovepipe issue by requiring multiple control interfaces at the element. For example, Juniper routers require both Simple Network Management Protocol (SNMP) and XML to perform a full suite of network management functions. Therefore, the enterprise must again house and manage duplicative management resources only because the independent stovepipe systems' own services, resources and data do not share with one another.
  • NewWave Concepts
  • NewWave (NW) network management is a next generation management concept that adapts the most advanced concepts from distributed computing to build a global application infrastructure. NW fuses virtual machine spontaneous networking, mobile code, directories, rules engines, and eXtended transAction (XA) transaction standards to deliver a fine-grained set of services on which management applications are re-engineered. NW leverages leading edge technologies for achieving a cross-domain technology management system which separates applications from technology. The individual stovepipe systems that evolved for network equipment, hosts and servers, and applications can all be integrated into a coherent management regime. [0112]
  • FIG. 5 is a diagram of the NW network management concept in accordance with an exemplary embodiment of the present invention. NW might be analogized to a schema for presenting services to a service user, such as [0113] client 550. The term “client” will be understood to represent any consumer or user of a service, notably, many clients or other services, but may instead be any application, software module or tool that utilizes the processes of a service. NW network management service platform 500 (NewWave NM) is comprised of Global Information Bus 510 (GIB) is necessary to make services (along with the resources needed by the services) available to client 550. DataBus 520 is a mechanism for decoupling data from the applications that have historically owned the data and make the data available to all authorized users, such as making all data in an enterprise owned by the enterprise and then available to all (authorized) enterprise uses. Finally, Management Operations Center 530 (MOC) utilizes service provided by both GIB 510 and DataBus 520 for monitoring and operating a network. NewWave NM service platform 500 itself consists of a group of NW infrastructure services and procedures necessary to support NW services.
  • [0114] GIB 510 is best described as a global ecosystem of interrelated services. The GIB architecture is an infrastructure for deploying and managing individual services on a global scale. GIB 510 provides an infrastructure on which to build services that can run on many platforms. The physical infrastructure is high scalable allowing for new capacity to be easily added, almost invisibly, with a low cost-per-capacity. GIB 510 deployment infrastructure enables software distribution and service configuration and deployment to be accomplished without direct access to the physical servers within the enterprise. Distribution, configuration and deployment are centralized operations, but the effect to consumers is distributed. GIB 510 also utilizes a runtime infrastructure for distributed computing, including discovery of services, distributed transaction management and self-healing and also incorporates a management infrastructure for keeping the state of the ecosystem stable.
  • Finally, [0115] GIB 510 includes a distributed communication infrastructure which supports multiple types of interaction between services. These interactions may be totally decoupled, message-based communication in which sender and receiver are unaware of the existence of the other, slightly coupled, wherein message-based communication in which the sender and receiver are aware of each other, but never gain direct access to each other. Also, GIB 510 distributed communication infrastructure supports generic coupling, event-based communication in which the receiver registers interest in certain events with the sender (the sender is physically coupled to the receiver, but does not know anything specific about it) and fully coupled, remote-procedure call communication in which the sender must find the receiver to make the call (GIB 510 also supports methodologies for finding each other).
  • [0116] DataBus 520 is a data management architecture for NW service platform 500. It presents an architecture for creating a consistent, enterprise-wide data persistence layer which allows clients to access shared enterprise data. DataBus 520 achieves this enterprise-wide look by decoupling shared enterprise data from specific applications (breaking down the stovepipes) and opening up the data layer to across-the-enterprise access (given proper authorization). DataBus 520 architecture is designed from the ground up for global scalability and accommodation of evolving business data models in a highly-distributed physical deployment. Scaling is realized predominantly through the partitioning, while individual partitions are mapped to logical data domains that are defined along more relevant dimensions than entity-type dimensions (e.g, geography, line of business, etc.), and cut across traditional entity boundaries.
  • [0117] MOC 530 is a set of NW-enabled services intended to provide support for addressing problems similar to those handled in a Network Operations Center (NOC), but not limited to only network problems. As such, it is intended to support problem management in many forms, including those typically handled by customer support centers and tactical assistance centers. MOC 530 represents a tool that assumes a fundamental re-engineering of the processes and tools used in these environments. MOC 530 is an example of the NW approach to designing and managing applications. Rather than building monolithic stovepipe application systems, the “application” is a collaboration of many smaller services acting on common objects, possibly without knowledge of each other, but with their actions affecting each other. MOC 530 makes extensive use of rules external to code executed by rules engines. These rules, being uncoupled from specific applications' processes and code, can be presented in a more human-readable form. Additionally, novel uses of finite state-machines and logic gates are used to integrate information and provide behavioral responses to a follow of events and/or data. This allows for changing the system's behavior without changing the code. Those behaviors which represent organizational policy are removed into rules which can then be managed by experts in those organizations. Those rules which encode structural information can be managed, augmented and altered separate from the overall system's responses and actions.
  • Fundamental to the concept is a behavioral approach to rules and application logic. Behavioral in this context means that “events generate responses.” Instead of elaborately designed processes and procedures, which must be successively decomposed into more and more refined detail, individual use cases are directly programmed (in isolation) using only their own context scope of applicability and the domain of their effect. This results in a bottom up aggregation of behavior from small to large (instead of from large to small). Change can proceed without overarching knowledge and with lessened effect on surrounding applications (increased isolation of design and development). This is achieved via re-use of common framework services with different procedural behaviors attached. [0118]
  • NewWave [0119] NM service platform 500, largely through the use of GIB infrastructure services 510, spawns many small components (services and resources) that act largely independently of each other rather than a single monolithic application. These services may directly interact with shared resources by, for example, registering for notification of updates to shared resources. The small services find each other and communicate by using GIB infrastructure services 510, (specifically registration and lookup services) and may also publish messages using the GIB's publish/subscribe services. In general, without directly modifying existing components, the overall behavior of any NW-supported architecture can be changed by adding new components. Sometimes this will be a whole new framework service, at other times a specialization of a common service with specific behavior and scope. Since all components, services in particular, are NW-enabled services utilizing registration, lookup and enterprise lookup services, new services, such as services 540, can be added to NewWave NM service platform 500 from outside vendors and entrepreneurs. Moreover, because new added services 540 may unknowingly invoke existing enterprise cost center services, such as customer tracking and billing, vendor-supplied services provide a rich source of revenue for an enterprise without adding infrastructure normally associated with traditional stovepipe systems.
  • The NW network management service platform relies on the ability to deploy services on many different platforms that run on many different server types. Java (a trademark of and available from Sun Micro Systems, Inc., Palo Alto, Calif.) is a programming language designed to generate applications that can run on all hardware platforms, small, medium and large, without modification and thus provide a means to develop on one platform, but deploy on many. In practice, the [0120] Java 2 platform (JDK 1.2) has been the basis for this multi-platform deployment, but one skilled in the art would readily recognize that other developer kits are available for specific platforms. The Java programming language allows developers of services to be unconcerned with the platform on which the service will be deployed.
  • The NewWave architecture exists separate and apart from the Information Technology used to build the architecture. The architecture and design predate the selection of deployment technology. The reference application uses Java language and Jini distributed applications infrastructure, both Sun technology. There are many reasons why this technology is especially adapted to the NewWave architecture and its reliance on “plug and play” and code mobility. However, other systems can implement this architecture and several have been used in the Worldcom Lab including Sun JMX, IBM Aglets, IBM WebSphere EJB, and Objectstream Voyager products. Nevertheless, there are real and distinct synergies between design and the target implementation technology. Many aspects of NewWave would be much more laborious to achieve on technologies other than Java and Jini. Further, we expect application infrastructures to evolve and in a few years, better implementations technologies will arrive. NewWave anticipates these and expects to deploy on each successive wave of distributed computing that achieves product status. [0121]
  • The Physical Machine Layer—Ubiquitous Server Machines
  • The NW network management service platform is deployed on large numbers of small, rack-mounted servers of varying platforms. Some exemplary platforms include Solaris for Netra (available from Sun Microsystems, Inc.), IBM AIX (available from International Business Machines Corporation), HP UX all of which are UNIX-based platforms. UNIX is a trademark of the American Telephone and Telegraph Company Corporation of New York, N.Y. NT and Linix systems are also in use. The NW network management service platform could be deployed on larger servers as well. However, the cost of scale may go up with larger servers, as those physical boxes are on an entirely different cost curve. [0122]
  • The NW physical environment consists of thousands of these small to medium size servers deployed throughout the physical boundaries of an enterprise. These servers could, in the case of a telecommunications enterprise, be deployed on the edges of the network in Point of Presence connections (POPs) as close to the user as possible and even on user premises in user enterprise domains. Data centers and major network hub intersections are also used in the physical deployment model. A NW-enabled server is configured with one of a small number of standard configurations. Standard configurations include generic servers with no special features, and resident application servers with Commercial Off the Shelf Technology (COTS). Resident servers in use include, but are not limited to: database servers with specific database products installed, directory servers with directory applications installed, security servers with security applications and rules servers with a rules engine installed. Basically, native services are relocatable and can migrate to any generic container. Integration with resident applications (each fixed to a specific server or servers) is achieved by representing the interface to the service a NewWave service. [0123]
  • FIG. 6 is a diagram illustrating the NW concept of many, small generic servers in many geographic locations distributed for enterprise use. For example, an exemplary territory is exhibited in the state of Virginia where three sites have been designated for the distribution of physical hardware denoted hereon in the Figure as geographic sites A, B and C. Each geographic site contains racks of physical hardware, racks [0124] 1-n, including various servers 604A-C available from a variety of original equipment manufacturers (OEMs). In accordance with the exemplary embodiment of the present invention, servers 604A-C are not larger multi-processor servers, but instead are smaller rack-mounted servers which may support various platforms such as Solaris, IBMAIX, Windows NT, Linux, etc. However, larger servers can be easily configured in accordance with the exemplary embodiments. For instance, at location A, racks 1-n, 602A contain a plurality of servers 604A. Each of servers 604A may be from a single vendor or instead might be from multiple vendors. Associated with one or more of servers 640A are particular resources managed by that particular server. For instance, databases 610A are particular vendor's databases, while database 612A is another vendor's database, each of which are managed by a server in a rack at location A. Another resource, which will be discussed in more detail below, is a rules engine 614A which may also be managed by one or more servers 604A. Notice that racks 602B at geographic location B and 602C at geographic location C are similarly configured as those at geographic location A, thereby having large numbers of small generic servers 604B and 604C, respectively. Similarly, some of servers 604B and 604C may host various vendor's data resources 610B, 610C or 612B, along with the rules engines 614B and 614C. The importance of this concept is that any server in any geographic location can process any service needed by any client in any other geographic area.
  • In its broadest sense, NewWave releases the application and the data from the physical server and also from the bounds of that single location. NewWave produces a global scale computing system where the telecommunications data network replaces the traditional computer backplane and the individual server and the containers on it substitute for each of the chips in a multi-processor enterprise system. Immense scalability is archived at greatly improved efficiency for organizations that require large scope business activities. [0125]
  • The Virtual Machine Layer
  • The operating system of each physical server is not used directly in the NW operating environment. Instead, each server must have the capability of running a platform-independent programming language virtual machine (VM) on top of the operating system that converts Java bytecode into machine language and executes it. The Java Virtual Machine (JAM) (a trademark of and available from Sun Microsystems, Inc.) is currently the most popular software that converts the Java intermediate language into machine language, but other vendors supply their own versions. For example, the Microsoft Virtual Machine (available from Microsoft Corporation in Redmond, Wash.) is also a Java interpreter. [0126]
  • A VM is a multi-threaded processing environment that encapsulates all access to the underlying computing platform. As such, a Solaris Netra looks the same as a Windows NT to a process being executed by the VM. A VM is, in fact, a single computing process, but it supports the running of many “mini” processes (threads) within. Thus, the NW operating environment is actually thousands of VMS deployed on small physical server machines throughout the world. [0127]
  • Other approaches to abstraction of the application environment from the underlying system were explored, most notably IBM's Aglets. Java and the DIV have provided the best platform to date. Other platforms used the VM approach in the past, most notable the IBM VM system and the Honeywell Multicast systems. In the future, NewWave expects to use other platforms as these reach the market and provide similar dynamics. [0128]
  • Containers
  • In the NW environment, services are remote processing entities that are managed remotely, configured remotely, load their code remotely, and found and communicated with remotely. To facilitate these requirements, the NW service platform includes a container technology for providing a runtime operating environment for services. At the heart of the container scheme is the concept of a generic service container—a CPU process into which arbitrary software services may be homed to a host server at runtime. Each VM runs a small set of code which identifies it as a VM container and makes the VM container able to be found and communicated with remotely. VM containers are realized as VM heavy-weight processes which are launched from boot scripts as the server is booted. VM service containers are the multi-threaded servers that provide a place in which multiple-service instances reside, each executing its own thread or threads of execution. [0129]
  • A VM container is also a service itself. More correctly, a VM container may be thought of as a “service container service running on a VM.” The service provided by a VM container is the launching of other services within itself. It behaves much like the services it contains in the way it can be found remotely and communicated with. Thus, like any other service, a VM container must register itself with a domain registrar and/or enterprise repository to be visible in its home domain and with the enterprise repository to be visible to services across the enterprise. The registration and finding of services will be discussed in greater specificity below. The salient point is that, like services, VM containers can be found remotely from anywhere in the world and requests can be programmatically made of them. VM containers report their own statistics and can be asked to shut down. [0130]
  • The main difference between a VM container and all other services supported by the NW service platform is in how a VM container, or more properly, the container service, is launched. A VM container is launched from the operating system and not from within another container. It cannot be launched from a remote location programmatically according to the NW conventions. In a similar fashion as other services, containers are not intended to be launched by NW clients. Rather, conceptually it could be considered as an integral part of the operating environment and launched by one of the following means: [0131]
  • 1. manually, by telneting into the server and running a script; [0132]
  • 2. as part of the startup of the host server's operating system; [0133]
  • 3. using an operating system-specific scheduling mechanism, such as Unix crontab or Windows services; or [0134]
  • 4. using Remote Method Invocation (RMI) activation (a Java-specific remote procedural call that requires the RMI Daemon to be running), which itself would have to be started via operating system-specific means. [0135]
  • Once running, a VM container must register itself to be visible to clients, services and administrators in the enterprise that may need the VM container for running a service. [0136]
  • Although every VM container is truly generic in nature, a VM container runs a small set of code in which the VM container can designate itself as a particular type of container. Some containers might designate themselves for running essential NW infrastructure services or other enterprise services such as GIB, DataBus or MOC services, or perhaps the container designation may relate to the type of host server running the VM container. Designating a container as being of a particular type might also be based on the server resources available in a logical domain. Depending upon the total quantity of VM containers in a domain, their reliability and domain loading factors, an administrator can designate a pre-defined number of containers as being NW infrastructure-type, GIB infrastructure-type, and so on. The composition of VM container-type designations is based on the priority of the hosting center and intended to assure that VM containers are always available for crucial enterprise objectives, such as re-homing services that are essential to the enterprise. Therefore, key services, while they may run in a generic-type VM container, do not depend on a generic-type VM container being available for self-healing of dead or dying services because other VM containers have been pre-designated for restarting those services. Thus, in the case of an essential infrastructure service, or any service for that matter, a predetermined quantity of VM containers can be pre-designated for running only those essential infrastructure services (self-healing capabilities will be discussed in greater detail below). [0137]
  • A key technical aspect is the storage of the configuration of the system and the container off board of the system and the container. In NW systems, this occurs in the registry. This is implemented in this generation via Jini Lookup and Directory (LDAP) services. However, any abstract and external service can implement the off board registration. By being separate from the container, all or part of the configuration can be transferred efficiently to another container as needed. Enterprise wide operations can occur on the configuration, without reference to the physical/server location it describes. [0138]
  • It should be understood at this point that a logical domain within the enterprise may be of at least two types—management and network—and these domain types are not necessarily synonymous. A management domain is generally defined from servers that are physically located at a physical hosting facility. On the other hand, a logical network domain is based on the transmission topology of a network defined around, for instance, a unicast or multicast routing table and may not be physically located at a single facility. Furthermore, some self-healing services use service lookup services that utilize management domains, while others use service lookup services that utilize network domains. Therefore, if the intent of the VM container is to designate itself as a type compatible with self-healing services, the VM container must ensure that it is listed in the lookup service being used by the particular self-healing service monitoring the services to be run by the VM container. [0139]
  • With respect to still another criteria, a VM container can designate itself as a particular type of container based on the resources available from the host server running the container. Services must be run in a container, but some services need additional resources aside from the container, such as a particular type of database, rules engine, etc. A service provider must be apprised of the resources available at a server host before attempting to launch a service on a host that is not equipped to run the provider's service. [0140]
  • Finally, a VM service container amounts to a heavyweight CPU process. Allowing service threads belonging to different service suppliers to coexist in the same process space is an open invitation to adverse interactions (e.g., modification of a non-final static variable used by both services). For the sake of isolation, each VM container is uniquely owned by a single service supplier business entity. While APIs might be used by a customer who supplies services to lease a service container, the container may also designate itself as a container type to be used by a particular supplier. In that way, only services supplied by a single-service supplier business entity will be able to run in a particular container. Thus, a VM container can be designated to services supplied by a particular supplier. [0141]
  • Note that domain registrar and/or enterprise registry are not the only means for finding a handle to a service container. Another option is to register the service containers within RMI registry. The URL address for connecting to a specific service container (e.g., “rmi://lambic.wcomnet.corn/serviceContainer13/”) is stored within the inventory database. A service supplier would query the inventory database for the URL address and then perform a conventional RMI lookup against that URL address. [0142]
  • FIG. 7 is a diagram illustrating various typical configurations of the small servers running various operating systems in which VM containers are running on host servers in accordance with an exemplary embodiment of the present invention. Here, four [0143] servers 702A, B, C and N are shown, each having a unique operating system platform such as operating systems A, B, C and N. Running on each of servers 702A to N are one or more generic VM containers 704. Every CPU host in an enterprise hosting facility will run at least one VM container processes such as servers 702N and 702A). Service deployers may inject the code for their services at any one of the VM containers. As can be seen from the Figure, it is expected that the VM containers 704 are multi-threaded, multi-tasked containers allowing for the concurrent execution of various services 706 on each container 704. Further, each server platform 7021A-N may run multiple VM containers 712.
  • High Level Overview of the NewWave Platform
  • With respect to FIG. 8, a conceptual diagram of NW distributive concepts is illustrated in accordance with an exemplary embodiment of the present invention. General Information Bus (GIB), also called the Global Information Bus (GIB), [0144] 802 can be conceptually described as an information bus containing NW-enabled services and mobile applications available for use by clients as needed. Essentially, the GIB is a set of specific, yet extensible, Framework Services, implemented on a scoped (local, regional, global) distributed computing infrastructure.
  • The heart of [0145] GIB 802 is the manner in which it allows deployment of services into the operating environment in a very flexible and easy-to-administer manner. GIB 802 is a series of services that may change from one execution to another, finding and collaborating with other services dynamically. This system of collaborating services starts to resemble an ecosystem, and the job of the GIB architecture is to maintain the interconnectedness and stability of this ecosystem as it continually changes. Almost all GIB components are implemented as services, even if they support no externally-available requests because all components must support certain administrative requests mandated by the NW. The administration and management of the ecosystem depends upon this capability. Although the component is acting as a service in the traditional sense of the word, it is deployed as a service. For this reason, even though GIB components come in many different flavors, at one level they all appear as services and follow many of the same conventions. The different flavors include the following and are depicted in the Figure below:
  • services that are part of the GIB infrastructure; [0146]
  • services that are parts of applications; [0147]
  • services that provide access to persistent DataBus objects; and [0148]
  • services that act as agents representing external entities such as devices, gateways to external (non-GIB) systems and even people, or are built directly into devices. [0149]
  • Services
  • All services must conform to certain conventions to be a well-behaved service. These include the following: [0150]
  • a service must exhibit the greatest degree of mobility possible; [0151]
  • a service must discover and register with all local registrars, renewing its own registration lease; [0152]
  • a service should register with a proxy which can handle simple loss of connection to the service, re-finding the service and continuing processing without interruption; [0153]
  • a service must implement certain management-related requests, including ping( ), healthCheck( ), shutdown( ), quiesce( ), reset( ); and [0154]
  • a service must accept requests for notification of events, and notify listeners, at a minimum, of certain administrative events; additionally, the service could define other types of events. [0155]
  • To the greatest extent possible, a service must be mobile, which is the single most important characteristic of a service. This is to say that there are as few restrictions as possible to the deployment of a service on any machine anywhere as quickly as possible without human intervention. The limitations of this goal are primarily the provisioning of a service by: [0156]
  • installing software needed for the service to run; [0157]
  • establishing local configuration parameters; [0158]
  • installing resources upon which the service depends; and [0159]
  • performing the actual launching of the service on a particular machine (requiring human intervention or establishing scheduling options on the machine running the service). [0160]
  • Services in the NW environment must overcome these limitations. As such, NW services must be able to be launched on a server without any code specific to the service and without any configuration information being pre-installed on the server. All resources used by the service, if possible, must be able to be remotely accessed and not depend upon the resource being present on the local machine. Databases used by NW services must be able to be created on the fly by the service. So, while a service might depend on the existence of a local database server, it cannot depend on that database having been configured to have certain tables. It must be able to create the tables from a schema which is remotely loadable and to populate the database from remote sources. If the data cannot be remotely loaded, then the database must have a mirror copy which the service can re-home to. Finally, a NW service must be able to be launched on a server without a human logging onto the server to initiate the launch and, in the event of a failure, a service must be able to be re-homed at runtime from one server to another without human intervention. [0161]
  • The NW infrastructure provides an operating environment for services which is similar to the public Internet or an intranet. Instead of many client machines, the NW service platform is deployed on large numbers of small, rack-mounted servers. Instead of web browsers running Virtual Machines, there are VM containers, and instead of running applets in the web browser VM, there are services running in container VMs. When an applet is launched from a web page, it has a “codebase” identifying the location of the class files (server) that need to be loaded before the applet can run. In the NW infrastructure, each service has a codebase identifying from where its class files should be loaded from. To create this environment, the NW service platform deploys many HyperText Transport Protocol (HTTP) servers in place to serve up code, that is, Java class files and resources. The class files and resources are installed on the HTTP servers. An HTTP server which is employed to serve up code is called a “code server.”[0162]
  • When a service is launched in a VM container, the container is provided with certain configuration information, including the service's codebase. The codebase contains the address(es) (usually URL(s), but it could be URI(s)) of the code servers which are able to serve up the service's code. So, when the service is launched, its code is loaded from a remotely-located code server. As services are generally long-running, code located remotely, even if it is a large amount of code, is a reasonable cost. Additionally, caching techniques are used to locally store the class files, checking each time to ensure that they have not been modified on the code server. In this way, installing a new version of a service's classes does not involve any type of software distribution technique involving the servers on which the services will run. Instead, it involves only pushing the new software out to the HTTP servers, which is a much more manageable task. [0163]
  • Consumers of services must run software that is consistent with the service. Whenever a service is used, there is a piece of code, the proxy, which is used to access the service. The proxy is referred to herein as a client proxy, proxy object and service object alternatively and will be more fully described below. In some environments, notably the CORBA environment described above, the proxy is the Achilles' heel to software distribution. However, in the NW environment, the proxy is also remotely downloaded. When a proxy is registered with an enterprise registrar, it too is given a codebase from which any client using the proxy should load the code. In this way, the client and the service always use consistent copies of the service and the proxy. In implementation, the Java Jini proxy is used with specific semantics and augmentation for NewWave service inter-working. [0164]
  • Regardless, a client must have initially loaded an “interface” for interacting with the proxy. This code also must be consistent with the interface presented by the service. One solution is to launch client applications that use NW services with a similar remote loading approach. Specifically, an “Application Launcher” that launches an application using a specified remote codebase. One such application launching tool is Web Start (available from Sun Microsystems, Inc.). [0165]
  • A service must be mobile from the point of view of class and resource files, as well as from the point of view of configuration information. Configuration information, like class and resource files, cannot be tied to a specific machine. To accomplish this, configuration information is made available at the enterprise level, thus NW services can be launched using configuration information that is not local to the service. As will be more fully described below, all configuration information is stored in an enterprise level repository (the enterprise repository) and then replicated to identical repositories throughout the geographic extent of the enterprise. Application launchers access the configuration information in the repository, and then forward the configuration information to the VM container selected for running the service. The information includes both configuration information needed by the container to launch the service and information needed by the service itself. [0166]
  • The NW infrastructure provides for remotely-located resources. Reference files and other resources used by a service are remotely loaded at runtime using the same techniques described above used for class loading. These resources may include EXtensible Markup Language (XML) files, properties files, images and the like. These resources are installed on the HTTP code servers in a similar manner as the class files. However, some services that use a resource require a local resource to be local, therefore the local resource must be provisioned automatically to accommodate the reference files and other resources that will be loaded remotely at runtime. For example, a service that uses a database locally, must be able to start with a completely empty database, and then add the necessary database tables, remotely and on the fly. However, the local resource must be prepared for the remotely-loaded tables with suitable database definitions for the structure and the type of contents that each data element that the local resource can contain (i.e., the database schema). An HTTP server could be used for storing schema information in a similar fashion as the resources and code files. Another solution is to use an enterprise level directory that is visible to all services. The schema information can then be remotely loaded from the enterprise directory, after which the source data for populating the newly-defined tables is loaded from a remotely-located HTTP server. [0167]
  • Returning to FIG. 8, the functionality of [0168] GIB 802 requires certain services to be available for all other services. These services are generally referred to as GIB infrastructure services including registrar, enterprise repository and lookup services 804; distributed transaction services and semantics 806; policy rule services 808; messaging and publication subscription services 814; rendezvous services 812; and self-management services 812. The GIB is designed to be extensible, and additional framework services are continuously being defined; these incorporate seamlessly. Enterprise repository and lookup services 804 provide a means for client to locate a needed service without knowing where that service is currently running. Whenever a service is launched in a container, that service registers itself with its domain registrar in order to make itself visible to the client in its own domain. A service registered with a domain registrar is visible only in the domain the service is running, so in order for a service to be visible to all clients in the enterprise, a service must register with an enterprise level registry, the enterprise repository. Clients needing a particular service do not need to know where the service is running or even if the service is available in the client's own domain. Instead the client merely looks the service up with the registrar. If the needed service is not listed in the registrar, the client can be directed to a enterprise repository lookup for the location of an enterprise repository within the enterprise. Registrar, enterprise repository and lookup services 804 also manage VM container leases. These and other functions of registrar, enterprise repository and lookup services 804 will be described in more detail below.
  • Distributed transaction services and [0169] semantics 806 manage transactions between the NW services running in the enterprise, with distributed transaction coordination and without the heavy, monolithic character of traditional Transaction Processing (TP) monitors. Distributed transaction services and semantics 806 ensure that processes which need transactional atomicity (several operations complete in their entirety or not at all) can get it. The transaction manager oversees a two-phase commit protocol to coordinate the commit of all containers and association engines that joined the transaction.
  • [0170] Policy rule services 808, or behavior services, are employed by GIB 802 for applying policy outside of the normal flow of processing logic to interactions between services. This is accomplished through the use of rules engines that allow the specification of policy-based rules outside of the processing logic. This allows organizations knowledgeable of operations support, instead of programming organizations, to be in control of the behaviors implementing operations support policy.
  • NW messaging and [0171] publication subscription services 814 provide NW components the means for communicating between NW services. There is no single answer as to how services should communicate. There are different levels of coupling between services desired, depending on the type of service. Services publish events, subscribe to event topics and receive events to which they have subscribed for notification of various events which may need service. Generally, the communication service is dynamic with run-time announcements of producer and consumer registrations, including topics. (Traditionally, these communications' channels were fixed by the logical, initial configuration and physical deployment of a distributed system.)
  • [0172] Rendezvous services 812 recognize and combine patterns of events which may require further service. One important factor when processing events is to know if the event is already being handled. Rendezvous services 812 recognize that events are being handled, thus preventing an event which has gone directly to a state machine from also creating a new state machine. Event patterns are also recognized which allows work documents already started to be merged together.
  • NW services, once substantiated, must remain running on a server, or at least some server, and register for clients needing the services to be located. Therefore, [0173] GIB 802 also employs a group of self-management services 816 for monitoring the state of essential NW infrastructure services, or any services for that matter, on their separate servers. Notification of a dead service to a re-homing service (“arch-angel” service) is primarily a function of the leasing service provided by the domain registrar. The re-homing service then re-launches the dead service in another container, possibly on another server. Clients using a dead or dying service are left in the lurch as they cannot then complete processing even though the dead service might have been restarted in another container. The solution involves the use of self-healing proxy references that look to the registrar whenever a request to a service results in a stale exception. Here again, each of the GIB infrastructure services will be discussed in greater detail with respect to the Figures below.
  • One feature of the present invention involves separating data and resources that have been traditionally tied or owned by a particular application, from that application, thus breaking down the stovepipe. These resources are managed by [0174] persistent services 818, particularly DataBus services, and may be used by clients and enterprise users via GIB 802. However, persistent services 818 make enterprise data directly available to the enterprise users, depending on authorizations, and not from a data-owning application. Data can be organized by broad business domains such as the classification based on “tiles” or the TeleManagement Forum's BAC/SIM classification. However, any organization principle can be used. Current implementation uses the DMTF CIM/DEN information model. Deployment of data is generally “holographic” and randomly distributed within a named domain. [But policy-based distribution and resource capacity is also used] Domain names are based on geography, technology, and line-of-business; yet, any number of domain dimensions can be created allowing business extensibility.
  • Although data objects and data storage tiers are shared across the enterprise and de-coupled from applications, they are still available via simple, transactional APIs. Essentially, each kind of data is a service. Although finding data is somewhat more complex that finding a running service, the method is similar to the two-hop method employed with services. First, look to a local domain registrar for the location of a data object. If the data is not local, then look to an enterprise directory for the data object. The present invention achieves enormous scalability via a high degree of partitioning where data is flexibly mapped to a persistence layer of hundreds of mixed vendor databases and occasionally to other persistence technologies such as directories and tuple spaces. File storage is also supported via integration of Jiro (Sun product) or other Jini enabled disks. This provides for development of remote storage products such as NSPs and similar services within the NW infrastructure. [0175]
  • Finally, enterprise devices and heritage systems are provided access to NW services and resources via [0176] heritage system gateway 820 which translates heritage services into NW services. This is accomplished by implementing NW services acting as agents which represent external entities enterprise devices to other NW services. A similar mechanism is used for enterprise network elements. Enterprise network elements access NW services on GIB 802 in either of two ways by: 1) being NW-enabled themselves (i.e., by incorporating NW distributive intelligence services onboard that can directly access GIB 802); or 2) utilizing distributed intelligent agents 822 which are similar to non-network devices described above and that interact with the resident protocol for the network elements to access NW services on GIB 802.
  • The GIB Infrastructure Architecture
  • The GIB is an ecosystem of NW services interacting in a highly-distributed fashion requiring special technologies to help services discover each other and keep the ecosystem healthy and stable. As independent stovepipe systems are deconstructed, new challenges are unearthed that are unaddressed by the prior art. Neither the EAI initiatives, the CORBA and EJB standards nor Sun's J2EE platform and Jini technology provide a holistic solution to the problems encountered in such a highly interactive-distributed environment as NW. [0177]
  • NewWave Service Platform Infrastructure
  • Before discussing FIG. 9 in depth, a brief discussion of the underlying principle of the glue that binds the NW infrastructure would be helpful. NewWave, unlike prior art attempts, is a highly distributive environment based on an enterprise (or global) model and is not merely a domain level model of service distributions. Virtually every NewWave component can be embodied as a NewWave service so the NewWave principles described below apply to most, if not all NewWave components. [When a non-native application is integrated into the NewWave service environment, a surrogate or proxy NewWave service is created which maintains the specialized interface /communication; the marketplace of other NW services sees only another NW service interface.] In order for the ecosystem to remain in balance, whenever a service is launched, that service finds all services with which it needs to interact and also makes itself visible to all clients (service consumers, usually other services) that need to interact with it. Clients and services running in a domain are listed in all local lookup directories (directory services running in that domain). So, a newly-launched service spontaneously discovers all domain directories for registering itself to be found by services needing to interact with it, and finding services with which it needs to interact. The present invention, in contrast to the prior art, utilizes a “two-hop” discovery process to discover all local directory services and all enterprise level directory services. Through this two-hop process, a newly-launched service can discover and register with all local directories. Having discovered the local directories, the service can “find” any and all local services with which its needs to interact. One service is a “find” service which is used by a newly-launched service to find non-local directories (enterprise level directories) to make itself visible to non-local service consumers. Similarly, the local directory and find services can be used to look up services the newly-launched service needs, locally from the local directory and globally via the find service. [0178]
  • This method is generally extensible and can be extended to three or more hop implementations if extremely large or extremely refined scope delineations are required by business circumstance or by the specifics of an alternate/future implementation technology. For instance, extension of the NewWave domain beyond a single global company to a marketplace of many global companies can be realized via an “extranet” service registrar which could be implemented as a third hop. In this manner, the NW infrastructure could be extended to a pandemic, global computing platform treating applications and data similarly to how the international financial infrastructure deals with products and money. Data in the system could be traded, deposited, withdrawn and even willed to heirs. Application services can be found via service directories (like phone numbers are today) and leased to other users. These service extensions and products are in development. [0179]
  • Returning to FIG. 9, a diagram of NW service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention. It is expected that an enterprise network is geographically widespread and serviced by a plurality of logical network domains, represented as network domains A-N. Logical domains are conceptually “local” to all services and clients within the domain. Everything not in a domain is “not local” to that domain and those services and clients. Local NW components in domain A ([0180] 902A) include all locally-running VM containers 918A and other NW services 910A, domain registrar(s) 914A1-914AN, transaction managers(s) 912A1-912AN and enterprise repository lookup 916A. “Local,” from the perspective of a component, means it is in the same multicast radius. Therefore, network domains A-N define separate multicast domains. NW components in domain A would be local to other components in domain A but non-local to NW components in any of logical domains B-N. Enterprise repository(ies) 926, on the other hand, is non-local to all other services and resources, no matter the domain. It should be understood that the enterprise consists of a plurality of domains, local and non-local, but the present invention of the invention will be described, heretofore, with respect to NW components in logical domain A (902A). The term “client” will be understood to represent any consumer or user of a service, notably, many clients are other services, especially another service that builds upon more primitive services, but may instead be any application, software module or tool that utilizes the processes of a service or might even be an end-user in the enterprise.
  • In each logical domain, such as domain A, [0181] services 910A are deployed on a plurality of host servers, 904A, 904A1 and 904A2 and running in a plurality of VM containers 906 (as described above with respect to FIG. 7). When deployed, servers 904 are loaded only with Java and the container code, these servers being “generic hosts,” depicted as server A 904A1 and server B 904A2. However, special resources such as database 908 and rules engines (not shown), can be locally added to generic servers that transform the generic host into a “specialized host” or server, such as that depicted server 904A. Within each of VM containers 906A, one or more services 910 may be launched and continue running while awaiting requests from clients. However, enterprise clients must be able to find a service in order to utilize its functionality. While prior art technology makes the client responsible for knowing where to look for the service, by address usually, the present invention utilizes domain registrar(s) 914A for tracking the addresses (URL address, URI addresses or host name) of services in accordance with an exemplary embodiment of the present invention.
  • Domain Registrars
  • Each of domains A-N has at least one domain registrar, but as many as N registrars may be located in any one domain. A domain registrar can be embodied as a service and thus launch, discover and be discovered as any other service. Domain registrar [0182] 914 provides up to four primary services for the NW infrastructure: 1) a listing/lookup service for NW services running in its local domain, the services being listed and looked up in a lookup table by type and attribute, a proxy to the service is also listed that is streamed out to clients that lookup the corresponding service; 2) a leasing service for services running to lease resources in their local domain; 3) an enterprise level listing/lookup service allowing local services an client to bridge the gap to the enterprise level; and 4) a replicating service to replicate its tables or merely change in its tables to other registrars, or in fact to any service that has a need for registration or leasing information, for example, re-start services, trawling services, find services, enterprise level listing/lookup service, and other registrars in the local domain.
  • 1. Discovery and Registration [0183]
  • In the NW environment, when [0184] service 910A is launched, it spontaneously “discovers” all nearby registrars 914A1-914AN (i.e., all domain registrars in its local domain). The newly-launched service 910A then registers itself with the all newly-discovered domain registrars 914A1-914AN. In accordance with one exemplary embodiment of the present invention, the NW infrastructure uses multicast packets to allow both services and consumer services (clients) to spontaneously discover any of domain registrars 914A1-914AN within a local domain defined by a multicast radius, thus bootstrapping the process of finding and registering services. Thus, discovery is accomplished without obtaining any specific information about domain registrars 914A, such as a URL address or host name. Similarly, whenever a new domain registrar is deployed, the domain registrar signals its availability for registering services within the local domain by broadcasting a multicast message to all nodes in the multicast domain (this is expected because a registrar is a NW service). All services 910A running in domain A strive to remain registered with all local domain registrars 914A1-914AN, and so upon receiving the broadcast message, all services in the domain register with the newly-launched registrar.
  • This method utilizes Java Jini functional facilities. Other lookup methods can be supported in specific circumstances or environments. One such method utilizes a mobile agent approach where an active mobile service agent deposits information in each lookup or enterprise registration facility. Circumstances which can invoke these alternate methods are generally the result of technical or logical barricades such as company boundaries, security domains, or non-IP transport networks. [0185]
  • A. Local Registration [0186]
  • Once local domain registrars [0187] 914A1-914AN have been discovered, local registration is a two-step process, providing registration information about the service and making an enterprise lease for resources needed by the service. Local registration makes service 910A visible to other NW services and clients (collectively service consumers or merely consumers) in the local domain. When a service registers itself, it provides a number of attributes in the registration that makes it easier for others (potential consumers) to find. These attributes may include one or more names, domain-type information, the interfaces which the service implements (i.e., what function a service can be requested to do). Thus, a client can match a service listed in registrar 914A according to their interface type or by matching one or more attributes with which service 910A registered itself.
  • Additionally, [0188] service 910A can also include administrative information in the registration information provided to registrar 914A (i.e., administrative information for interacting with the service administratively, such as an icon for display or a user interface object).
  • Finally, [0189] service 910A must provide registrars 914A an object which is a proxy, or a service object, to service 910A, during registration. The proxy is an object (or objects) that allows clients to access a service. The proxy is streamed to registrar 914A where it is stored in serialized form. When a consumer of service 910A looks up that service, the proxy is, in turn, streamed out to the consumer. A proxy contains codebase with a URL of an HTTP server, the service code (usually Java byte-code) that implements the proxy object can be served up from that HTTP server by its URL, which is located arbitrarily in or outside the geographical domain of the enterprise.
  • The above-described approach to registering a service proxy in a local service registrar that employs a leasing approach to registration constitutes prior art, specifically embodied by the Jini technology suite from Sun Microsystems. This approach to proximity-based, local service lookup is itself not a part of the present invention, but is used by the present invention in conjunction with novel techniques that expand the visibility of network services to enterprise scope. [0190]
  • B. Proxies [0191]
  • In its simplest form, a proxy merely forwards requests from a consumer, for instance, on to [0192] service 910A. However, the proxy might also contain any code that could be executed in a client environment before, after or instead of forwarding the request. Such a proxy is known as a “smartproxy.” This model is in sharp contrast to CORBA, where a registry simply stores a reference (a sort of address) that allows a consumer of a CORBA service to make a connection to some remotely-deployed service process. The present invention allows proxies that implement the service interface to be moved out to consumers at runtime.
  • The technique of using smart proxies in the context of distributed object systems was known within the CORBA development community (and explicitly discussed in Iona CORBA documentation). However, the approach taken to implementing smart proxies within a CORBA context was highly constrained and awkward. A developer needed to manually insert source-code modifications into the stubs that were generated by the IDL compiler, an inelegant work-around. The Jini technology from Sun Microsystems, greatly added to the state-of-the-art with regard to the usefulness, power and practicality of smart proxies. This storage of serialized smart proxies within service lookup engines, and the streaming of such proxies to service consumer processes obviated the need to manually modify generated stub code, as well as freeing client applications from the requirement to link in required stub implementation code at program build time. The current invention makes extensive use of smart proxies, for example, in its handles to remote entity instances and the interfaces to logical association engines (discussed in depth below). However, such smart proxy techniques themselves are part of the prior art that is used in novel ways to support and enable the current invention. [0193]
  • The proxy that gets stored in domain registrar [0194] 914A, and subsequently streamed out to clients, can be absolutely any object that is serializable. A smart proxy can do anything that can be done in Java code. This model of moving smart proxies and service code to clients at runtime is different from CORBA, where a stub object can only act as a proxy that forwards requests to and responses from a remote server process. According to the one embodiment of the present invention, a smart proxy may perform computations that are purely local within the client's process space. According to another embodiment of the present invention, it might store state information local to the client. Alternatively, and in accordance with still another embodiment of the present invention, it might interact with a remote server process (outside its local domain)—the real implementor of a service.
  • Essentially, the client proxy hides code from the client, thus when the client makes a request for a NW service, a smart proxy will be returned with service interaction code that is hidden from the client. The client might “think” it is interacting with the requested service, while in fact the smart proxy provides the client with a means for executing the service locally, or interacting with the requested service, or interacting with services, sequentially or concurrently, without the client being aware of the interactions. The client proxy can hide any code, thus allowing the client to communicate with a remote service using any protocol or middleware or many services. Alternatively, client proxy can hide any code allowing the client to perform all logic locally or even implement an entire client application, including GUI. [0195]
  • It should be understood that even in the degenerate case, where the service object simply forwards requests to a remote process, NewWave services become roughly equivalent to CORBA or RMI services. One of the most common forms of NW services uses an RMI stub object as the proxy object that is downloaded from a domain registrar's lookup to a client. But this is simply the most common case. A smart proxy encapsulates code that interacts with a remote service using any one of a variety of protocols or middleware, such as sockets, RMI, CORBA, IBM MQSeries, and the like. Or a smart proxy interacts with two or more remote services using the same or even different middleware or protocols. Or a smart proxy interacts with zero remote processes, implementing the entire service interface locally within the client's process space. Over the course of time, a smart proxy might have an implementation that changes to a different communications protocol, unbeknownst to the client. For example, as vendors and vendor services evolve, the implementation code in the smart proxy changes to reflect new services. Alternatively, the proxy might communicate with one or another remote server processes, depending upon the time of day, lading or other configurable factors. In still another example, the proxy might parasitically use the communication channel of an object that is passed to it as an argument, not using its own communication channel. [0196]
  • Recall that looking up a service means fetching the service code for the service from a code server located remotely. The proxy contains a codebase that includes the address(es) (URL(s)) of code server(s) [0197] 922A which are able to serve up the code for the proxy. Thus, the proxy code is loaded remotely in the client space through its codebase. Through this proxy clients can access the service via the remotely-located service code that is streamed to the client. In contrast with the prior art, looking up a service means fetching the service's proxy from registrar 914 and the proxy's service code is streamed out to the client from HTTP server 920A.
  • C. Non-local Registration [0198]
  • Once a service has registered in a local domain (and acquired an enterprise lease), the service is visible to any local client looking for a service of a similar type of attributes (potential service consumers) listed in domain registrar [0199] 914A's lookup. Non-local clients have no mechanism for perusing registrar directories that are non-local to themselves (i. e., in a non-local domain). Therefore, registration with a registrar only ensures that a service is visible to local clients. Registering in non-local domains requires that a service list itself with an enterprise level directory that is accessible by all clients in the enterprise. In accordance with an exemplary embodiment of the present invention, a service that wishes to be visible to non-local passes the URL address(es) local registrar(s) to enterprise repository 926 to make itself visible to clients in non-local domains. The present invention envisions multiple methods of registering with enterprise repository 926. One mechanism involves the use of enterprise repository trawler services that trawl all the registrars' lookups for services that indicate the intention to be visible non-locally. The trawler service then returns the registration information, at least the service's attributes, and the registrar's URL address, to the enterprise repository(ies). Another mechanism involves the service itself finding an enterprise repository lookup service. The enterprise repository lookup service then finds an enterprise level repository and registers the service with it by depositing registration information and the registrar's URL address, to the enterprise repository(ies). However, a salient point here with regard to non-local registration is that enterprise repository 926 lists, at least, the service's attributes and a URL to a local registrar that contains other registration information, such as administrative information and the proxy.
  • Finally, there might be cases when a service is running and yet must become invisible to potential consumers, for instance, when a service is executing processes on all available threads. Therefore, in accordance with another embodiment, registrars [0200] 914 track the amount of services running on threads of another service, especially container services, in the local domain. Once a threshold number of running services is reached, registrar 914 makes the service unavailable for potential consumers of the service and notifies the enterprise repository, using one of the techniques described above, that the service is no longer available to clients. Of course, this may be run on a separate service that communicates with the registrar directly. Services that need a service with the particular attributes of a service that is unavailable must either find another service with those attributes, wait for the service to free up, or initiate a process to start another instance of the service on another (or possibly the same) VM container.
  • 2. Enterprise Leasing [0201]
  • Another important facet of the NW service architecture is the notion of enterprise leasing. The leasing mechanism, in general, allows enterprise resources to be reserved on behalf of a requesting client (or any consumer of the resource) in the enterprise. These enterprise resources may include services, databases, enterprise engines (rules, etc.), transaction managers, and communications (publish and subscribe, messaging, event, etc.). With respect to registrars [0202] 914, the enterprise leasing mechanism allow services 910 to bind themselves to the registrar's directory and lookup, and then periodically renew their binding to the directories of registrars 914. It should be understood that if the client is responsible for registering with all registrars in a domain, it is also responsible for contracting with each registrar for an enterprise lease. The act of enterprise leasing reserves registrar resources to the service that are necessary for the service to make itself visible to service consumers.
  • Any time resources are reserved on behalf of some participant in the enterprise, the reservation of those resources adheres to a leasing convention, sometimes known as time-limited resource allocation. In accordance with one embodiment, the client that requests the reservation of resources may specify a lease duration, a time period over which a client-party can assume the resource reservation will be maintained. The requesting client will be issued a lease object that indicates the amount of time for which the lease has been granted (a duration that might be shorter than that requested). Alternatively, the enterprise lease duration is set at a default time period which is known to all participants in a domain. Once a lease is established with a resource, it is the responsibility of the client reserving the resource to know the lease duration and then to renew the lease, if necessary, prior to the known time period elapsing. Whenever it is necessary to maintain the resource past the term of the original lease, the requesting party should always request a lease renewal before the lease expires. In practice, this might entail requesting several lease renewals from various registrars in the local domain. If the requesting party should fail to renew the lease and it expires, the provider of the resource will do whatever cleanup is appropriate. For registrars [0203] 914, cleanup includes deleting the service from the lookup table, including removing all attributes, administrative information and proxies (service objects).
  • This technique of enterprise leasing facilitates the implementation of self-healing services. If a process, on whose behalf a resource is leased, should abruptly crash, the lease will eventually expire and the system can de-allocate the resource. Things get cleaned up all by themselves. Moreover, with respect to the registrar, whenever an enterprise lease for service expires, the registrar can notify the self-healing services of the lease expiration. The self-healing services can then attempt to restart the service, either in the same or different container. In certain cases, a process might include several transactions that are dependent on one another. If, as will be discussed below, a transaction has not been completed, the participants will be instructed by transaction manager [0204] 912 to roll back the process to a state prior to the commencement of the transaction, thus the participants are unaffected by a failure during a transaction. However, if several transactions have been successfully accomplished, the results of those transactions might be cached to a storage resource awaiting further processing. If the service hosting the resource fails, or even if a service fails that is crucial to the remaining transactions, it is likely that the cached data will not be recoverable. In the best case, the client can restart the process for the beginning and reestablish the data. In the worst case, the states of the service resources being used have been changed during the previous transactions making restarting the process impossible. The solution is a mirror resource that mirrors inter-process results for a running process. In case of a failure resulting in a lease expiration (service, communications or resource), the client or the client proxy maintains an object for the mirror and when the self-healing services restart the service(s), the client can continue the process with the mirrored interim results.
  • In accordance with one embodiment of the present invention, individual registrars may be responsible for tracking the enterprise leases for all services listed in their respective lookups. In accordance with another embodiment of the present invention, the registrars are responsible for notifying each other through replication and the like (and possibly the enterprise repository) of a lease to a expiring service. Finally, in accordance with still another embodiment, specialized enterprise leasing services track individual leases for services and notify the directories (domain level and possibly enterprise level) whenever an enterprise lease expires. With regard to NW service leases, the main construct is to de-list any service that has failed in any directory that the service is visible to clients (i.e., domain registrars and enterprise repositories). [0205]
  • The premise is that all enterprise leases are managed in the local domain that the service is running. Some component(s) in the local domain (i. e., one or all local domain registrars or a leasing service) must recognize that a service's enterprise lease has expired. The service must then be de-listed from local directories that client can access and then re-listed in non-local directories that clients can access. Enterprise leases are managed at the domain level while the resources that they reserve might concern a service that is available to clients across the enterprise. Such is the case when a service registers itself locally, making itself visible to local clients, and then makes itself visible to non-local clients (i.e., clients in non-local domains). Registering in non-local domains requires that a service list itself with [0206] enterprise repository 926 to make itself visible to clients in non-local domains. Therefore, whenever an enterprise lease expires in a local registrar, that service must be de-listed from the local registrar(s) and then the lease expiration must be communicated to enterprise level directories in order to make that service invisible to potential clients. Several mechanisms are useful for this task depending on the functionality of registrar 914.
  • The first leasing mechanism involves an individual registrar managing only the enterprise leases for service that it registered. It is expected that self-contained registrar models that operate only at the domain level, such as Jini technology registrars, will utilize this mechanism. In accordance with this mechanism, when a lease expires in a registrar, clean up is automatic and the registrar does not communicate the lease expiration to either other registrars in the local domain or to the enterprise repository. In this case, each registrar is responsible for managing its own leases as eventually the failed service's enterprise leases will expire in all of the registrars that it registered (i.e., local registrars [0207] 914A1-914AN). However, if the service was listed in enterprise repository(ies) 926, it will remain listed until the repository is notified that of the lease expiration. Notifying enterprise repository(ies) 926 of lease expirations is the job of the enterprise repository scavenger services. Recall that trawler services originally found all services listed in local domain registrars that intended to be visible non-locally and returned the service's attributes and the URL address(es) of the registrar(s) in which the services were listed. Scavengers are the antithesis of the trawler services as these scavenger services de-list services that leases expired in a domain registrar from the enterprise repository(ies). Recall also that a service might be listed in an enterprise repository with one or several URL address(es) for the registrars with which the service is registered. A scavenger daemon is a background service that compares the contents of registrar's lookup table between scheduled checks. Registrar entries for services that have been cleaned up between checks, for whatever reason (i.e., enterprise lease expiration, explicit shutdown, etc.), will be communicated to enterprise repository 926. Enterprise repository 926 can then de-list the service from the registrar's address from its directory. If the service has only one associated URL, then the service is completely de-listed from the enterprise repository's lookup and the service will be rendered invisible to potential consumers.
  • In accordance with another mechanism, each of registrars [0208] 914A1-914AN communicate lease expirations from their respective directories directly to enterprise repository 926. Direct communications between registrar 914 and enterprise repository 926 is possible only if registrar 914 maintains a reference or address for enterprise repository 926 itself (or possibly for enterprise repository lookup 916, which can then be accessed by the registrar). In that case, when a service's lease expires, registrar 914 communicates the lease expiration to enterprise repository 916. Enterprise repository 916 can then de-list the reference to the registrar from its lookup or, if only one URL address/reference is listed, enterprise repository 916 can then de-list the service completely as described immediately above.
  • 3. Enterprise Level Listing/Lookup [0209]
  • Clients seeking services outside their local domain and services wishing to be visible outside their local domain must have a mechanism to utilize a non-local directory. The present invention uses an enterprise repository for global service listing thereby making services visible from outside their local domain. As alluded to above, registrar [0210] 914 may or may not provide clients and consumers with a reference or location information (URL) for enterprise repository 926. Certain domain level registrars, notably Jini technology registrars, do not themselves provide multi-tiered domain structures (i.e., a local level and non-local or enterprise level). Those domain level registrars cannot be easily modified themselves, but can be integrated with enterprise-scoped directory services to expand service visibility to enterprise range. Therefore, in accordance with one embodiment of the present invention, a reference to a “find” service such as enterprise repository lookup service 916A, is held in the registrar's lookup. Enterprise repository lookup service 916A is then utilized by local clients and service for finding enterprise level directories, and finding or listing service in those directories. In the case of service, enterprise lookup service 914A looks up an enterprise repository and then registers the service by listing the service's attributes and the service's registrars' URLs in the enterprise repository. In the case of a global client, enterprise lookup service 914A looks up an enterprise repository and finds a service listed in enterprise repository 926 based on the attributes listed for the service. Enterprise lookup service 914A either returns the service's registrars' URLs to the client and the client accesses the registrar for the service proxy, or alternatively enterprise lookup service 914A accesses one of the service's registrars directly and causes that registrar to pass the service's proxy to the client.
  • In accordance with an alternative embodiment of the present invention, [0211] enterprise repository 926 is treated like any other service and a reference for enterprise repository 926 is copied directly into registrars 914. In this case, enterprise repository lookup 916 would check for enterprise repositories starting up or shutting down and list or de-list the repositories accordingly. Newly-launched services, as well as local consumers, can then discover enterprise repository 926 from the reference in the registrar without having to access a separate lookup service for the address. In addition, once having a reference to the enterprise repository, registrars 914A1-914AN can replicate service registration information and lease updates directly to enterprise repository 926 without the need for trawling and scavenger services.
  • What is novel about this approach to enterprise service lookup is that, by combining multicast-based local service lookup with enterprise-scope directory services, the client can bootstrap its way to finding a service anywhere in the enterprise. This bootstrapping occurs without an a priori knowledge of the IP address, URL, DNS host name or other detailed location information detailing how to connect to the enterprise service directory. Prior approaches to finding enterprise services, such as CORBA naming or RMI Registry, require the client to know, or be able to find, the contact information for the enterprise service directory. Other service location technologies, based upon multicast discovery (notably Jini technology) enable spontaneous discovery of services without such a priori address knowledge, but are limited to local service discovery, unless augmented by additional techniques. The NW multi-stage approach to enterprise service lookup achieves a “best of both worlds,” allowing spontaneous boot-strapping by the client to find services anywhere in the enterprise. [0212]
  • 4. Replication [0213]
  • Replication between registrars [0214] 914A1-914AN is unnecessary if services are responsible for discovering all registrars in their respective local domains (e.g., registrars 914A1-914AN in local domain A), and if the individual registrars are responsible for their own lease management. Otherwise, the separate registrars' lookups must be reconciled with one another by including one another's updates. The simplest means for rectifying registration and leasing information between registrars is through a replication mechanism. Therefore, in accordance with one embodiment of the present invention, registrars 914A1-914AN provide a replicating service for replicating listing changes (i.e., registrations, lease expirations, lease renewals, explicit shutdown or reset, etc.) to each of the other registrars in the domain.
  • As mentioned above, registrar [0215] 914 may have a reference to enterprise repository 926. If so, then the enterprise repository could also be updated from the registrar during replication. In that case, domain services 910 would then be relieved from the responsibility of registering with all of registrars 914A1-914AN in the domain, as well as renewing leases with all registrars in the domain. A service merely discovers one registrar in the domain and registers with it. The registrar replicates the registration information throughout the domain and to enterprise repository 926 if necessary. However, if the registrar known to the client fails or becomes unresponsive to the client, the client must discover and register with another registrar prior to the enterprise lease expiring.
  • Alternatively, the individual services are responsible for replicating service related information throughout the local domain. Services discover all running registrar services in their local domain and then register themselves with each registrar. Additionally, services make and renews enterprise leases with the individual domain registrars. In that case, the client also registers with all newly-launched registrar services in its local domain and, through a process that will be described below, registers with [0216] enterprise repository 926 if the service desires to be visible and usable by non-local clients. In accordance with still another embodiment of the present invention, a series of enterprise repository services are responsible for trawling the registrars 914 for registrations and promoting any enterprise-visible service registration up to the enterprise level. Enterprise lease expirations are handled by comparing the content of the registrar's lookup between trawls.
  • Enterprise Directory Services
  • NW services may make themselves visible to clients in their local domain or may intend to the visible to all enterprise clients, whether local or non-local. [0217] Enterprise repository 926 provides a lookup service for clients, but at an enterprise level (non-local) rather than domain level (local) registration provided by domain registrar 914. As described above, registering a service outside its local domain is the responsibility of either the service itself, enterprise repository lookup service 916A or a series of enterprise registrar services that trawl local registrars 914 for registrations. Each of these mechanisms promote any service wishing to be visible outside its local domain the means to be enterprise-visible, through registration at the enterprise level.
  • In addition to being a registry, [0218] enterprise repository 926 is a directory for clients needing a service. Enterprise repository 926 provides a means for non-local clients to access services that are not available in their own domains. Therefore, the lookup for enterprise repository 926 must include, at a minimum, all attributes for listed services, along with addresses (URL addresses or host names or some other references) for the services' registrars. With that information, a potential consumer can look up a needed service by its attributes and, by using the associated URL, go to one of the service's registrars for a proxy to the service.
  • The enterprise utilizes [0219] multiple enterprise repositories 926 that are strategically located around the enterprise's geographic domain. A potential service consumer might access any of enterprise repositories 926 for finding a service. Therefore, each of enterprise repositories 926 must list all running services in the enterprise that wish to be visible to clients in non-local domains (i.e., at the enterprise level). Thus, enterprise repository 926 must replicate service information received from enterprise registrars with every other enterprise repository in the enterprise.
  • The Lightweight Directory Access Protocol (LDAP) is a protocol used to access directory listings and is supported by web browsers and e-mail programs, and the like, which can query a LDAP-compliant directory. LDAP provides a common method for searching e-mail addresses on the Internet, similar to a global white pages. LDAP is a sibling protocol to HTTP and FTP and uses the ldap://prefix in its URL, thus familiar to use. LDAP provides good replication around the world and therefore provides the necessary level of replication needed for an enterprise repository. However, the LDAP protocol and directory also have shortcomings which make them unsuitable for use as an enterprise repository in the present invention. [0220]
  • It is not possible to support the full range of attributes and lookup required by enterprise registrar [0221] 914 in an LDAP directory as LDAP directories do not support all of the configuration information for a container that is necessary for launching a service in that container. The LDAP directory is not able to store logical domain mappings that are defined along any relevant dimensions (e.g., geography, line-of-business, etc.). This aspect of the present invention will be discussed below with the description of the DataBus service.
  • In an effort to overcome the above shortcomings of the LDAP and its directory, and in accordance with an exemplary embodiment of the present invention, [0222] enterprise repository 926 supports all service attributes that may be used by a client for finding a service. These attributes are available to local clients in registrars 914A1-914AN and therefore must be available in enterprise repository 926 for a client to find a service in a non-local domain. It should be remembered that a client finds a service that it needs by comparing the type and attributes for the services running in the enterprise and are listed in a lookup to the attributes needed by the client. Service lookup is based on type and attributes and not on unique name, and therefore the enterprise repository must support service type and attribute information.
  • Another shortcoming with LDAP is that it was never intended to store database schema. Services that use a resource which must be local must be able to automatically provision that resource. For instance, if a service uses a database locally, it must be able to start with a completely empty database, adding the tables needed on the fly. To do this, database schema information is stored in [0223] enterprise repository 926 by any method, including proprietary. XML-based schemas (Extensible or XML Structure Definitions (XSD)) are popular because they can be created with any XML tools.
  • NW service must be mobile from the point of view of machine-specific configuration information. Configuration information cannot be tied to a specific machine because the service might run anywhere, and configurations cannot be redefine at runtime. It must be available from anywhere in the world, and a service must be able to be launched using configuration information that is not local to the service. To do this, all configuration information is stored in [0224] enterprise repository 926 and replicated throughout the world on other enterprise repositories. Launch scripts access enterprise repository 926 to get the configuration information and forward the configuration information to VM container 910A where the service is launched. Therefore, in accordance with another exemplary embodiment of the present invention, enterprise repository 926 supports all configuration information needed by a VM container to launch a service and the configuration information needed by the service itself.
  • Recall that a VM container is actually a running NW service that is launched from the operating system and not from within another container. Conceptually, VM container services might be considered as an integral part of the operating environment. Other NW services, such as those that run inside VM containers, must be programmatically launched from a remote location according to the NW conventions. In order to launch a service in a specific container, the administrator must have the configuration information for the VM container that the service will run in, as well as configuration information concerning the service itself. Thus, [0225] enterprise repository 926 contains all configuration information for every VM container service currently running in the enterprise, so an administrator merely accesses the repository for all container configure information. In actuality, when a service is launched in a container, the container is provided with certain configuration information, including the service's codebase. The codebase contains the URLs of the code servers which are able to serve up the service's code. Therefore, when the service is launched, its code is loaded from HTTP servers at a remote location, for instance from HTTP server 920A.
  • Finally, the enterprise repository supports logical domain mapping information in accordance with an exemplary embodiment of the present invention. In accordance with the present invention, enterprise data is no longer owned by an application but instead is owned by the enterprise. Enterprise data is, however, stored at various locations around the enterprise in specialized resource servers called “entity” servers. Separate entities will generally be housed in separate storage servers. Even a given entity is likely to be physically partitioned across many separate storages. Partitions of a given entity are often collocated at a given operations center, but the same entity might alternatively be physically partitioned across geographically distributed sites, for example, by siting one subset of customer data in the U.S. and another in Europe. Logical domains are used to narrow the context of an operation to a scope that is smaller than the entire enterprise. Logical domains are, in a sense, orthogonal to the dimension of entity type or subject area, and thereby cut across different entity boundaries. These could be along geographic lines or along lines of business, or according to some other classification. With the entities being highly partitioned across distributed data stores, the multi-hop finder is used for finding any particular data object of interest. Entity instances can then be found from anywhere in the enterprise, no matter where it is physically located, by a Primary Key (PK). A multi-stage finder strategy allows the navigation to any entity instance from anywhere in the enterprise given its primary key. This strategy, of course, requires that a primary key is mapped onto the partition number where the entity is stored. Mappings from the PKs onto respective partition numbers that uniquely identifies a relevant container where the entity is stored are then stored on the enterprise repository. [0226]
  • Also included in each of domains A-N are [0227] enterprise repository lookups 916A-N, respectively. Enterprise repository lookup 916 is an alternative embodiment as its functionality may be incorporated directly into each of domain registrars 914A1-914AN and is therefore represented in the Figure as a dashed block. As discussed immediately above, the sole function of enterprise repository lookup 916 is to track the location of at least one enterprise repository 926 for newly-launched services wishing to be visible outside their local domains, and for clients needing to find a service from outside their local domains. It is the function of the enterprise repositories to track every service running to the enterprise, at least those running services that wish to be visible enterprise-wide, and make that information available, either directly or indirectly, to clients that cannot find a needed service in the client's own domain. Notice that, in accordance with an exemplary embodiment of the present invention, N enterprise repositories are used which tends to prevent the administrative interactions and discovery/registration and find stages from becoming a bottleneck.
  • HTTP Servers
  • NewWave services are mobile, in other words, the services can be quickly deployed on any machine, anywhere, without human intervention. As such, NW services can be launched on a server without any code specific to the service being pre-installed on the server and without any configuration information being pre-installed on the server. All resources used by the service can be accessed remotely and are not dependent on the resource being present on the local machine. Databases can be created on the fly by a service which creates the necessary database tables from a schema that is likewise remotely loaded. Additionally, NW services can be launched on a server without an administrator logging onto the server to initiate the launch. Re-homing of services is also performed at runtime from one server to another without human intervention. [0228]
  • To create this environment, the NW service platform deploys many HyperText Transport Protocol (HTTP) servers in place to serve up code, that is, Java class files and resources. In addition to the NW components described above, a plurality of [0229] web servers 920A to 920D are also located in the enterprise. Each HTTP web server (HTTP Daemon) 920A-920C holds a plurality of mobile code 922A-922C including, for example, service code 922A, application classes 922B and vendor code 922C. Through administrative APIs, the service supplier indicates the URL address that identifies where which one of servers 920A-920C service code 922 resides, which can be essentially anywhere on the Internet. The API method allows a requestor to start a service executing in the service container, supplying parameters that identify the URL for the code-base of the service code, the fully-qualified class name of the Java object that is the service's root object, and initialization payload object. Other methods are provided to allow a service to be abruptly shut down, allow the service to be gracefully quiesced (requested to stop accepting incoming requests, but carry to completion in-flight requests), and allow one to query whether the service is in a quiescent state. A generic service container service, such as VM container 918A loads code 922 via one of HTTP web servers 920A-920C and runs the service in its own thread of control.
  • Transaction Managers
  • Notice that within each local domain a plurality of transaction managers [0230] 912A1-912AN are available for creating transactions which are used for the purpose of transacting with host servers. In accordance with an exemplary embodiment of the present invention, transaction managers 912A1-912AN are NewWave service and as such discover and register with local registrars 914A1 as any other service. In an environment in which a function is the collaboration of many services taking action cooperatively, an important ingredient is the notion of a distributed unit-of-work. A unit-of-work is managed by transaction managers 912A at the domain level. The NW approach to transaction semantics relies on a transaction that is passed around like a football each time a service request is made. There is no central transaction manager managing the transaction, to be a bottleneck, instead a client finds any transaction manager in the domain and creates a transaction. Finally, resource managers must support bi-directional communications between a transaction manager (TP monitor) and resource managers such as eXtended transActions (XA) for providing two-phase commit to persistence.
  • The distributed nature of transaction managers [0231] 912A is facilitated by the highly-distributed world of the NW services. Any service, running anywhere, needs only to find a transaction manager running close by. If load is high, up to N transaction managers may be deployed across a domain thereby allowing highly-distributed services to gain access to a transaction manager and for scalability—as load increases the transaction manager does not become a bottleneck. In accordance with another exemplary embodiment of the present invention, all transactions have a lease associated with them, similar to the NW services described above. A transaction has a predetermined time-to-live. Transaction manager 912 issues enterprise leases on newly-created transactions in much the same manner as registrar 914 issues enterprise leases on services. However, the participants in the transaction can renew the lease if the activity takes longer than expected, but absent a renewal, an uncommitted transaction will expire and roll back. Any NW service which maintains state about other services or clients should implement a leasing scheme to keep its state clean.
  • Because of the use of Jini transactions, resources used in the GIB that are expected to participate in transactions must be managed by resource managers exposing a two-phase commit interface, such as XA or the Jini transaction participant interface. A typical resource manager is a database management system, for example, Oracle or Versant. However, recall that in FIG. 8 enterprise network elements might be NW-enabled and thus access NW services on [0232] GIB 802 by incorporating NW distributive intelligence services 824 onboard. In those cases, network elements 824 plug directly into GIB 802. In those cases, the network elements implement the relevant XA interfaces XAResource and XAConnection so that it could participate in the transaction as part of a transaction.
  • NewWave Functionality
  • In the NewWave environment, an application is a collection of services operating in concert with each other. These NW services may or may not know of each other, but their collective action makes up the functional whole that is an application. To work as an application, NW services “find,” communicate and function with one another. [0233]
  • 1. Find [0234]
  • NW services can be found, either locally (within a multicast domain), within a non-local domain, or anywhere in the enterprise. Services register in lookups by their respective attributes and interfaces, and thus they are found by whatever attributes with which they service registers. Locally, a service registers with all domain registrars in the service's local domain. Non-locally, a service that wishes to be visible to clients from outside the local domain registers with an enterprise level registration and lookup service, the enterprise repository. The transition from local level to enterprise level visibility is bridged by an enterprise repository lookup that provides a reference to an enterprise repository for services and clients in a local domain. [0235]
  • 2. Communication [0236]
  • NewWave services communicate differently, depending on the type of service and the level of coupling between services desired. A distributed intelligent agent for network elements, for instance, is normally highly de-coupled, depending on little and thus able to continue processing regardless of the state of other NW services. It generally relies on highly, de-coupled forms of communication. The following different forms of communication are supported in the GIB: [0237]
  • Tightly coupled: The service implements a remote interface with exposed methods. Clients find the service and make specific requests of it by calling methods on the interface. The coupling is reduced by registrar lookup, thus still a code-level dependency between client and service. [0238]
  • Two-way tight coupling: The client opens a session of some sort with the service. The service maintains state about the client. There is then a runtime dependency that exceeds a single request. [0239]
  • Moderate coupling, event notification: A client registers with a service to be notified when certain events occur. There is a direct runtime dependency, as the service will hold a reference to the client (listener). However, the reference will be generic. The service will not know the actual interface of the client beyond the listening interface. This minimizes compile-time dependency, but still has runtime dependency. This essentially is a session between client and service, the service could be blocked while the notification is sent, and transaction semantics must be handled carefully. This is good is some circumstances to reduce messaging traffic by having notifications directly from the source to the listener with no intermediary. [0240]
  • Loosely coupled, peer-to-peer: Messages are sent through an intermediary, but directed to a particular destination by name. In this case, client and service know about each other, but only via a destination name as they can never directly access each other. [0241]
  • Loosely coupled, publish-subscribe: Messages are sent to a topic queue and are delivered to destinations that have issued subscriptions for particular kinds of messages. The sender and receiver of the message are never aware of each other at all. The only coupling is on message topic and message attributes. [0242]
  • Loosely coupled, XML: Messages are sent via publish-subscribe or peer-to-peer, but contains only XML, no objects. This removes any class-level dependencies. This is good when unrelated components are involved. [0243]
  • 3. Interactions [0244]
  • Tightly Coupled Interactions
  • In a tightly-coupled interaction, a client or service acting as a client finds a target service via a registrar lookup or some other means, obtains a proxy to the target service, and calls methods on the proxy. A proxy, in accordance with the present invention, may communicate to the target service by any means. One exemplary method is Java Remote Method Invocation (RMI). The proxy communicates back to its service via direct sockets, IIOP, HTTP, JMS messages or any other middleware. However, the communication method selected for these transactions must be able to be reasonably effected from the client meaning that it cannot rely on the installation of any runtime component on the client. Code is remotely loaded from the codebase, but must be limited in size. It can be reasonably assumed that sockets, IIOP and HTTP would be generally available. RMI provides remote loading of arguments to the method call via the codebase. [0245]
  • Moderately Coupled Interactions Using an Event Model
  • All services must support a standardized event model, the Jini event model or the like. NW services accept requests to receive notifications from listeners and are used for certain administrative events. However, a service can use this model to extend the way in which it interacts with all clients. In this model, NW services maintain event notification registrations, and directly call each listener when an event occurs matching the event registration. Each listener must first find a service and then makes a registration. All event registrations are maintained and the service accepts lease renewals and cleans out registrations when their lease expires. Services have the proxies to the listeners loaded in their respective virtual machines, requiring the remote loading of all required classes and the services will block waiting on a reply from each listener. This mode of interaction is moderately coupled because the interaction is through standard listener interfaces, rather than specific service interfaces, but it is more coupled than the loosely coupled approaches below. However, it is appropriate for some types of interactions as it is faster than the more loosely coupled approaches and useful when the client must find the service anyway. [0246]
  • Loosely Coupled Interactions Using Publish-Subscribe or Peer-to-Peer Messaging
  • Messaging involves the sending of peer-to-peer and publish-subscribe messages through an intermediary. A variety of messaging services are available, including the Java Message Service (JMS) specification as the interface for messaging (available from Sun Microsystem Corporation). A client could publish a message to a topic queue or send a message to a logical destination. Subscribers would receive a publication if their subscription matched the message published. Loosely coupled interactions can be made even looser by using XML as the primary message format. JMS messages can include objects, but this adds a code-level dependency between sender and receiver; however, XML schemas or XML document-type definitions are not code level dependent. [0247]
  • Launching and Registering a Service
  • In enterprise computing, the platform provider, the supplier of services (programs) and the consumers of services are often all the same corporate entity, residing within the same enterprise. The NewWave infrastructure fills the gap left by other paradigms by providing a dynamic service deployment architecture, that is not domain bound. Essentially, a service provider/supplier launches its services onto host servers at their own enterprise facilities, or at a third-party facility, through the exercising of administrative APIs and/or an administrative console application. This model of dynamic service deployment onto awaiting facilities is radically different from more traditional hosting arrangements that might involve extensive business negotiations. Thus, a service provider deploying its services onto live hosts out on the network amounts to API calls—not phone calls to support personnel. This model of service deployment is termed “frictionless” because of its ease of interaction. It allows service providers/suppliers to get tomorrow's services running in the field in Internet time. The concept of frictionless, dynamic deployment of services onto the network is all enabled by the constructs of code-mobility. As discussed above, code-mobility allows NewWave systems (HTTP servers) to move code out to consumers of services. By the same token, this mobility allows developers of services to also dynamically load the code that implements their services onto these third party host servers. This is very much analogous to the way that Java applets are streamed out to a user's PC web browser and run in a virtual machine process that serves as a sort of software container for applet code. The present invention service deployment platform simply applies this software container concept to backend-hosted services. Every server in a hosting facility runs at least one of generic container processes (VM container) into which service deployers inject the code for their services. The actual implementation code gets served up from any ordinary web server (http daemon) located anywhere in the Internet. [0248]
  • Through administrative APIs, the service supplier indicates the URL that identifies where the service code resides out there somewhere on the Internet. The generic service container process loads the code via the HTTP server and runs the service in its own thread of control. FIGS. 10 and 11 depict launching and registering service in a local domain or the enterprise, as and well as looking up a service that is running either locally or non-locally, and then interacting with the service in accordance with an exemplary embodiment of the present invention. FIGS. [0249] 10A-10C at diagrams that depict the logical flow of the processes depict on corresponding flowcharts in FIGS. 11A-11C.
  • FIGS. 10A and 11A are a diagram and flowchart, respectively, depicting a process for launching and registering service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention. The process begins with an [0250] administrator 1004 searching enterprise repository 1026 for suitable VM container to run a service (step 1102). Recall that a VM container is merely a service and, as such, can be defined by name or as a set of attributes under which it is registered. While some NW services defer enterprise visibility, it is expected that due to the unique nature of VM container processes, as compared to most other NW services, containers will be registered, and thus visible, at the enterprise level for ease of interaction with service providers that need specific VM container attributes. For example, many services, perhaps most, run perfectly well in a generic VM container. Others, however, need a particular resource to be local to the service as it runs (e.g., as database, rules engine, etc.) The administrator can, therefore, analyze all enterprise VM container services for necessary attribute and select only the VM container(s) that have attributes matching the service's requirements. Once administrator 1104 has selected a group of candidate VM containers, the administrator can further differentiate between specific VM containers by logical location based on the URL address of the containers matching the requirements. By making service containers enterprise-class services, one can centralize administration in an enterprise, while nonetheless making service deployment highly distributed.
  • Once an appropriate VM container is selected, [0251] administrator 1004 launches the service in the selected VM container by passing a reference (URL address or host name) for the HTTP server holding the service code to the VM container (step 1104). With URL, the VM container fetches the service code from the HTTP server at runtime (step 1106) and the service begins running in the container (step 1108).
  • Once running, [0252] service 1010A must make itself visible to potential consumers of the service, whether the consumers are located locally or non-locally to the container. In accordance with an exemplary embodiment of the present invention, NewWave uses multicast packets to allow service provider processes and consumer processes to spontaneously discover lookup servers within multicast radius, thus bootstrapping the process of registering and finding services. Local registration involves the service broadcasting of a message to all registrars in the domain and then registering with them. Enterprise registration involves service 1010A using a “Find” service to find an enterprise level directory and then registering there. Local registration begins with registrar discovery, or service 1010A broadcasts multicast “ping” into the multicast radius that defines the local domain, domain 1002A (step 1110). All domain registrars that are “listening” in domain 1102A will return a “pong” with their address information, usually URL addresses or host names (step 1112). As depicted in the Figure, only domain registrar 1014A is present, but any quantity of registrars could actually be present in accordance with the present invention.
  • With the addresses of [0253] local domain registrar 1014A, service 1010A can register locally with registrar 1014A. Service 1010A registers by passing information to registrar 1014A that makes service 1010A visible to clients looking for a service in domain 1002A and information that facilitates clients' interaction with service 1010A step 1114. Service 1010A registers with local domain registrar 1014A by passing registration information to registrar 1014A, including service attributes (name(s), domain-type information and implementation interfaces). The registration information may also include administrative information such as display icons or user interface objects for an administrator to use. Finally, service 1010A must pass a serialized proxy object (Obj. in the Figure) to registrar 1014A which will be passed to clients looking up the service. The proxy includes code and a codebase for fetching service code for implementing the proxy. The service code is remotely located in an HTTP server, server 1020 for example, and the codebase contains an address for that server. At this point, service 1010A is registered locally with registrar 1014A making it visible to any clients looking in registrar 1014A.
  • However, [0254] service 1010A is not visible clients located in non-local domains. To be visible to more than just local clients, service 1010A must register at the enterprise level in an appropriate enterprise directory—enterprise repository 1026 is such a directory. However, hopping from a local level domain to an enterprise level has been a shortcoming of the prior art that heretofore has been insurmountable. Services can discover only those services that are within their own multicast domain because the multicast message is not transmitted beyond the multicast radius. Therefore, another mechanism is necessary for “finding” non-local directories in order to make service 1010A visible to clients which look up service in them. In accordance with one embodiment of the present invention, a service wishing to be registered at the enterprise level utilizes a “find” service to find enterprise level components, such as enterprise repository 1026, that are not in their multicast domain.
  • The “find” service is represented in the Figure as [0255] enterprise repository 1016A and as a service running in domain 1002A and it is listed in domain registrar 1014A. Therefore, a service wishing to be visible to a client located outside its local domain need only look up enterprise repository lookup service 1016A while registering with the registrar (step 1116). As will be described below, service 1000A retrieves a proxy from the registrar for interacting with enterprise repository lookup service 1016A (not shown in the Figure). Service 1000A then requests enterprise repository lookup service 1016A to service “finds” enterprise repository 1026 and register it with the repository (step 1118). Service 1000A passes its registration information, usually limited to its service attributes and also the address of all registrars with which it is registered, registrar 1014A (URLs) to enterprise repository lookup service 1016A. Enterprise repository lookup service 1016A then finds an enterprise repository in the current example enterprise repository 1026 and registers a newly-launched service with that enterprise repository. Service 1000A is now running in domain 1002A and registered for clients that may be located in local domain 1002A or any non-local domain.
  • Finding a Local Service
  • The reciprocal of registering a service in the NewWave environment is finding a running service. FIGS. 10B and 11B are a diagram and flowchart, respectively, depicting a process for finding and implementing a local service in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention. Recall that the term “client” is used herein to represent any consumer or user of a service, notably, many clients or other services, especially another service that builds upon more primitive services. A client may also be any application, software module or tool that utilizes the processes of a service, or alternatively, a client might refer to an end-user in the enterprise. A client perceives a need to invoke a process, but in accordance with an exemplary embodiment of the present invention, the client need not identify the service by its interface, as is common in the prior art. Instead, [0256] client 1008 might identify the service process by some service attribute that is important to the client.
  • Therefore, in accordance with an exemplary embodiment of the present invention, a client need not know the identity of the service it wishes to invoke or even where the service is running in the enterprise. [0257] Client 1008 uses the identical multicasting processes described above with respect to FIGS. 10A and 11A to find registrar 1014A (not shown). Thus, a NewWave client may come up cold and discover registrars and services in its local domain. The lookup process begins with client 1008 perusing one of the local domain registrar, here domain registrar 1014A, for a needed service (step 1122). Client 1008 searches local domain registrar 1014A's lookup for services with service attributes matching those needed. Once a service is identified, client 1008 has no information whatsoever about the running service (e.g., its location, its configuration information, implementing code). Therefore, client 1008 retrieves, and registrar 1014A returns, a proxy or object (Obj. in the Figure) to use for interacting with the selected service, service 1010A (step 1124). The code for the proxy is loaded remotely in the client space through its codebase. Thus, once implemented in the client, the proxy fetches service code at runtime from HTTP server 1020 using URL in the proxy's codebase (step 1126). This code in invisible to client 1008. Client 1008 uses a series of APIs to interact with the proxy, but the client actually intends to interact with a remote service (step 1128). This does not always happen, even though the client 1008 “thinks” it is communicating with the service. In fact, several interactions are possible and each one is hidden from client 1008. Client 1008 might actually be communicating client requests to remote service 1010A as its thinks. Alternatively, client 1008 may be interacting only with the remotely-loaded service code and the code is locally performing logic to process the client requests in the client's own space. Finally, client 1008 may be communicating client requests to multiple remote services, via the service code, which may or may not be the service selected by client 1008. This feature allows a client's requests to be processed anywhere and in any manner that is convenient to the enterprise. For example, since the client did not identify the service by a specific interface, the service may have been provided by any vendor that produces service with attributes that matches the client's needs. Alternatively, while the attributes listed with the registrar's lookup might remain constant, throughout the lifecycle of the service its functionally or resource requirements might change (i.e., a service that utilized a particular OEM's resource might switch to another's resource). Loading and scope parameters can be managed by hooks implemented in the service code that interact with different services based on dynamic parameters, such as the time of day, day of week, frequency of use, bus loading, service loading, history, complexity of the application running the service.
  • Finding a Non-Local Service
  • One shortcoming of the prior art is that instances of services, other than infrastructure services, must be running in every domain that a consumer for that service is located. If not, the consumer will not be able to provide some aspect of its functionality. The other alternative is to eliminate logical domain demarcations and make all services available to all consumers in the enterprise. However, here bandwidth and directory listing become an impediment to efficiency. The present invention eliminates the need for either unnecessary duplication of service or eliminating logical domains by providing a mechanism for services and service consumers to see each other outside their own local domains. This has been referred to above as the “two-hop” process, a local hop, and a non-local or enterprise hop. FIGS. 10B and 11B illustrate a mechanism for finding and implementing a service that is local (the local hop or first hop) while FIGS. 10C and 11C illustrate a mechanism for finding and implementing a service that is not local (referred to alternatively as the non-local, enterprise or second hop) in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention. With respect to FIGS. 10C and 11C, [0258] service 1010A registers itself with domain registrar 1014A in exactly the same manner as was described with respect to FIGS. 10A and 11A, above. However, with respect to FIG. 10C, client 1006, located in domain 1002B, must find and implement a service. The process begins with client 1006 searching local domain registrar 1014B's lookup for a service that matches service attributes needed to accomplish some task (step 1132). However, rather than finding a service, local domain registrar 1014B returns a fault. In practice, whenever a service cannot be located in a client's local domain registrar, either the registrar or the client initiate a “find” service that will ultimately lead to finding a non-local service. However, client 1006 cannot see outside its local domain, so client 1006 must implement a local service for finding an enterprise level directory; that service is enterprise repository lookup 1016B. Client 1006 looks up enterprise repository lookup service 1016B in domain registrar 1014B's lookup and returns a proxy for enterprise repository lookup 1016B that is used to interact with the service (step 1134). Client 1006 then interacts with enterprise repository lookup 1016B, through its proxy, for finding the service it needs somewhere in the enterprise (step 1136).
  • Here, enterprise repository lookup [0259] 1016B searches for an enterprise repository from which to access its lookup and find a service (step 1138). Enterprise repository lookup 1016B finds enterprise repository 1026, and then accesses its lookup for a service that matches the service attributes required by client 1006. Upon finding a matching service, enterprise repository lookup 1016B returns an address (URL address, host name or some other reference) for the non-local domain registrar with which the service is registered, domain registrar 1014A. Next, enterprise repository lookup 1016B attempts to find a service that matches the requirements of client 1006 in domain registrar 1014A's lookup (step 1140). Domain registrar 1014A returns a proxy object (Obj. in the Figure) for matching service 1010A to client 1006 (either directly or via enterprise repository lookup 1016B) (step 1142). The code for the proxy is loaded remotely in the client space through the proxy's codebase. Thus, once implemented in the client, the proxy fetches service code at runtime from HTTP server 1020 using URL in the proxy's codebase (step 1144). Again, this code in invisible to client 1006, and although client 1006 intends to interact with remote service 1010A using APIs for the service, the code might redirect or locally process the calls (step 1146). Thus, while client 1006 might intend to communicate with service 1010A, the actual computations may be performed by logic in the service code locally, in the client's own space. Alternatively, client 1006's request might be processed by remote service 1010A, or by some combination of remote services such as service 1010B (that is actually local to the client).
  • Registrar Functionality
  • FIGS. [0260] 12A-12C are flowcharts depicting the methodology implemented in registrar 914 for providing the four primary NW functions in accordance with exemplary embodiments of the present invention. It should be understood that these services (domain level listing/lookup for services; resource leasing; enterprise level service listing/lookup; and replication) are available or necessary for each embodiment of to the present invention. Because some of theses service are performed simultaneously, the four registrar services are illustrated in three separate flowcharts. FIG. 12A is a flowchart depicting the process employed by the registrar for registering services in accordance with an exemplary embodiment of the present invention. FIG. 12B is a flowchart depicting the process for enterprise leasing in accordance with an exemplary embodiment of the present invention, while FIG. 12C is a flowchart depicting a process employed by the registrar for looking up a service in accordance with an exemplary embodiment of the present invention.
  • The service registration process begins with the registrar in a listening state, waiting for messages to arrive on the network. The signals may be generated by a service (including a container service) or a client (any consumer or user of a service) located in a local or non-local domain or in another registrar in the local domain, thus allowing for many possible permutations for incoming signals. With regard to the exemplary process, a ping( ) is handled first. If, at [0261] step 1202, the registrar receives a ping( ), the registrar immediately returns (pong( )) its location to the service initiated the ping( ) (step 1204). The registrar then waits for the service to return its registration information. If, at step 1202, no ping( ) is received, the process flows to step 1206 where a check is made to determine if registration information has been received by the registrar. If the information has not been received by the registrar, the process iteratively reverts to step 1202 until registration information is received. Here it should be understood that the registrar is merely in a listening state, listening for events and messages that it must process. [ Checks 1202 and 1206 merely represent an iterative process used to simultaneously listen for both a ping( ) and registration information from a variety of services in the domain.]
  • Returning to step [0262] 1206, if the registrar receives registration information, the process continues to step 1208 where the registrar receives registration information about the service, which may include attributes for helping clients find services such as one or more name, domain-type information, implementation interfaces (i.e., what the service does for a client or a description of the service's functions). Additionally, the registration information may contain administrative information for manually administering the service, such as a display icon or a user interface object. Finally, the registration information may contain a serialized proxy object. It is possible for there to be cases where a service registers with only a URL or host name, but as a practical matter, most clients will need a proxy to interact with the service. Clients access the service with the proxy. The proxy could then contain any code which could be executed in a client environment before, after or instead of forwarding the request. The type of proxy, a smart proxy, may invoke services and functionality unknown to the clients. For example, the proxy might call more than one service for concurrently executing the client's request. In another example, the proxy might call for services executing ancillary functions unrelated to the client's service request (e.g., a client might intend to execute a network management function (profit center) and proxy calls billing services (cost center) to perform client and billing procedures that are ancillary to the client's request). The proxy also contains a codebase which is, at least, the URL address of an HTTP server which contains the implementation code for the proxy. That URL is used when the proxy is passed to a client to load the implementation code to the client, unbeknownst to the client.
  • Regardless of the type of proxy, the registrar may check the lookup for an instance of the service (step [0263] 1210). In accordance with one embodiment of the present invention, the domain registrar will receive registration information only from services wishing to register themselves in the registrar's domain. However, in accordance with other embodiments, the domain registrar will receive registration information from another registrar in the local domain through a domain level replication process. The present flowchart envisions either eventuality. Here it should be understood the domain registrar of the present invention is extremely flexible. A domain registrar may communicate changes in its table to any service that is listening, for instance at the local domain to other registrar, re-start services, trawling services, scavenger daemons, enterprise repository lookup services and find services.
  • If the registration information is from another registrar in the local domain, it might be possible for a record of the service to already exist in the lookup table. This record might exist due to a previous replication from another third registrar, or from a re-start and re-registration where the service was not properly communicated to all of the other registrars throughout the local domain. While either of these cases is unlikely, it is good practice to continually monitor the registrar's lookup table for duplicative registrations. Therefore, if a copy of the service's registration information exists in the registrar's lookup table, it should be assumed that the service was re-started and the enterprise lease for the service should then be extended (step [0264] 1224). However, with regard to enterprise leasing, it is possible for enterprise leases to be managed independently at each registrar in the local domain (assuming that more than one instance of a registrar exists), or managed at one registrar, typically the registrar that initially registered the service. That registrar would be expected to communicate the lookup information to all registrars throughout the domain. Thus, if the service registration information received by the current registrar is from another registrar in the domain and that registrar manages that service's enterprise lease, the process would then end without renewing the service's lease.
  • Returning to step [0265] 1210, if the service is not listed in the registrar's lookup, the registrar makes an entry for the service in the lookup table (step 1212). Typically, attribute information would be listed in the registrar's lookup table for easy access when looking up services corresponding to clients' requests. Administrative information and the serialized proxy object may be stored separate from the attribute information in another location, but referenced from the attribute information for quick retrieval after a match has been found. Next, the registrar determines whether or not the registration information has been received directly from a newly-launched service or another registrar (step 1214). If the registration information is not directly from the service, the registrar then creates an enterprise lease for the newly-registered service, assuming that each registrar in the domain manages its own leases (step 1224). The process then ends.
  • Returning to step [0266] 1214, if the information has been received from the service directly, it is the responsibility of the registrar to replicate the information in each of the registrars in the domain. In that case, the registrar must update the enterprise repository with registration information from each service wishing to be locally visible in only the local domain (step 1216). Next, the registrar determines whether the service intends to be visible in only the local domain (step 1218). If so, the process reverts to step 1224 where the registrar creates an enterprise lease for the service and then the process ends. Alternatively, at step 1218, if the service intends to be non-locally visible (i.e., in the enterprise, outside the local domain), the registrar passes the registration information to the enterprise repository. As discussed above, finding the location of the enterprise registrar may be performed internally, inside the registrar, or externally via an enterprise repository lookup. If registering with the enterprise repository is handled internally, the registrar merely looks up the enterprise repository's location (step 1220) and passes the device's registration information to the repository step (step 1222). Otherwise, the registrar looks up the location of the enterprise repository lookup and passes the device's registration information to the enterprise repository lookup (step 1220), which in turn passes the device's registration information to the repository (step 1222).
  • Two things should be made clear here. First, it is apparent that creating an entirely independent lookup just for finding the enterprise repository is counterproductive. That is normally true except in the present case where technology exists to perform some of the registrar's functionality that is usable, but not easily adapted, from a local domain-type environment to an enterprise consisting of multiple domains. One such technology is Jini technology that performs certain registrar functions at a domain level, but is not suited to multi-domain functionality. Secondly, enterprise registration might not be synonymous with domain registration. In some situations it might be acceptable to merely pass the location of the registrar to the enterprise repository. Whenever a client cannot find a service in its own domain and hops to the enterprise repository, the client can pick up the host name, or URL, for a registrar in the service's domain. From there the client can retrieve the serialized proxy in the same manner as if the client had retrieved it from a local registrar. Moreover, it might be that all services have an entry in the enterprise repository, even though some are not visible in non-local domains because it is expected that administrative functions will almost always be performed at the enterprise level. Administrators can then access administrative information, icons, interface and other service tools for services that are not visible in the non-local domains (enterprise) which is especially important for launching a service. Since containers are service, there might be a case where the intent is not to be visible in the enterprise, but be available for administrative use (i.e., launching a new service). [0267]
  • Regardless of whether or not an enterprise repository lookup is used, the registrar must create a lease for the newly-started service (step [0268] 1224) prior to ending the process.
  • Regarding FIG. 12B, a flowchart depicts a process for managing enterprise leases in accordance with a preferred embodiment of the present invention. Every service running in any of the enterprise's domains must have a lease. When the registrar accepts a service registration, it issues a lease for the registration. The service must periodically renew the lease or the registrar will dispose of the registration, thus allowing the registrar to remain stable. If a service goes away or is inoperative, the lease will not be renewed and the registrar will eventually clean up its tables. The principle of lease management is a fundamental principle of the NW infrastructure and is used throughout the GIB. Any GIB service which maintains state about other services or clients should implement a leasing scheme to keep its state clean. Services typically run a background thread that periodically wakes up to perform the lease-renewal chore. A service remains registered only so long as it keeps expressing interest via lease renewal. The renewal is passed, if necessary, from the registering registrar to other local registrars or to the enterprise repository. However, the task of lease maintenance might be left to the registering registrar and renewals are replicated around the enterprise. [0269]
  • Lease maintenance, as depicted in the flowchart, is a continuous process that always reverts to an enterprise lease monitoring state (step [0270] 1230). Leases remain valid for a predetermined amount of time. That duration of time may be fixed or specifiable by the service making the enterprise lease. Therefore, the registrar must have a sense of time from which to make expiration determinations, for instance, from outputs from the internal CPU oscillator clock. Whenever a lease is created, a counter may be initialized that, based on the duration time of the lease, counts down to a lease expiration event. The lease expiration event may be circumvented by the service renewing the enterprise lease anytime prior to an expiration event. Therefore, the registrar is cognizant of lease creation or extension events and lease expiration events. If, at step 1232, the registrar detects an enterprise leasing or renewal event, the registrar must first identify the service associated with the event (step 1234). Next, the registrar creates or extends the service's enterprise lease by postponing the lease expiration event for a period of time equal to the preset lease duration (step 1238). The process may end here or in accordance with another exemplary embodiment of the present invention, the registrar may determine if the container running the service is being fully utilized (i.e., the threshold amount of threads are currently being processed (step 1240)). Recall that generic service containers are multi-threaded processes allowing many separate service instances to be run in their own threads. However, if all of the container's threads are used by services, the container cannot support another service and a load error will occur. A threshold number of services may be defined for a container and, whenever the number of services being run exceeds that threshold, the container service simply de-lists itself until some services' leases expire. Thus, if the threshold is not exceeded by the addition of the new enterprise lease, the process reverts to step 1230 where the registrar continues to monitor the enterprise leases. Conversely, if the threshold number of services are now being run in the container, the container can no longer support new services, so the registrar notifies the enterprise repository to make the container service invisible to potential clients (step 1242). It is expected that, in most instances, container services are discovered at the enterprise level most likely by an administrator; thus, the registration must be hidden at least the enterprise level. However, it is also possible that the container service may be discovered at the local domain level so each registration instance of the container service in the local registrars might also be hidden from view, depending upon the discovery process for containers. Once the fully-loaded container service is hidden, the process reverts to step 1230.
  • The second type event being watched for by the registrar is a lease expiration event (step [0271] 1244). If one is detected, the registrar identifies the service whose enterprise lease expired (step 1246). Next, in accordance with an alternative exemplary embodiment of the present invention, the registrar determines if the container service is running at threshold capacity (step 1248). If so, the registrar notifies the enterprise repository to unhide the container service and make the container visible to enterprise clients looking for a service (step 1250). At this point, the registrar's listing of the container service must also be made visible if the container service was hidden in the registrar's lookup. However, the listing of a service whose lease expired must be removed from the lookup (step 1252) and that removal be replicated to the other registrars in the local domain (step 1254). Finally, the registrar must notify the enterprise repository that the service's lease expired and the service's registration information be removed from the enterprise repository (step 1256). The process then reverts to step 1230.
  • Regarding FIG. 12C, a flowchart depicts a process employed by a registrar in response to a “find” request from a client in accordance with a preferred embodiment of the present invention. The present invention allows a service to register itself with a local registrar by providing service attributes in the registration to make it easier for clients to find and interact with the service. These attributes may include one or more names, domain-type information and/or the interfaces which the service implements. “Finding” a service is potentially a two-hop process for a client, a local hop; and if a suitable service is not found in the local domain, a non-local hop. Registrars store all attribute information for each service running in their respective local domain for finding a service, and a proxy for each running service is passed to a requesting client to use for interacting with the service. While the registrar performs certain functionality associated with finding a service in its local domain, registrars do not provide attribute information for each service running in all non-local domains (i.e., the enterprise). The enterprise repository provides a requesting client with a mechanism for finding a needed service in a non-local domain by listing all running services in the enterprise. A client needing a service that is not running in its local domain can access the enterprise repository for the location of a registrar having a running copy of the service. In accordance with one embodiment of the present invention, the client can then go to that registrar for the service's proxy and interact with the service. In accordance with another embodiment of the present invention, the enterprise repository also maintains a proxy for each running service in the enterprise so the client can get the proxy directly from the enterprise repository rather than going to the service's registrar. [0272]
  • Turning now to FIG. 12C, the process begins with a registrar receiving a “find” request for a particular service (step [0273] 1270). It should be understood that the client may be in the registrar's local domain and, in fact, with respect to the first, or local, hop the client is in the registrar's local domain. However, in accordance with some embodiments of the present invention, the “find” request may have been referred to the present registrar by an enterprise repository. The registrar then checks its lookup for service using information in the request, such as service name or any other attribute information in the request (step 1272). Next, the registrar decides whether or not the service is running in the local domain (i. e., if there is a match between the attribute information contained in the “find” request and the service attributes contained in the registrar's lookup table (step 1274)). On the first hop, the service needed by the client may or may not be found in the local domain, and thus registered with the registrar and listed in the lookup table. It is, however, expected that administrators will attempt to locate services proximate to clients that utilize those services; therefore, in many cases the service needed by the client will be found on the first hop in the client's local domain. With respect to the present flowchart, the client may not be local to the registrar, but might have been referred to the present registrar by the enterprise repository. In that case, it is highly unlikely that the service will not be found in the registrar lookup table because the present registrar registers the service with the enterprise repository. In any case, if the service is found in the registrar's lookup, the registrar gets the proxy object for the service from a storage location associated with the lookup table (step 1276) and returns the proxy to the requesting client (step 1278). The process then ends.
  • Returning to step [0274] 1274, if the service cannot be found by the registrar in its lookup table, then the registrar must pass the client request on to another registrar, albeit indirectly, in which the service is registered. Here, two alternate embodiments are possible. The first requires that the registrar track the location of at least one enterprise repository, while the second embodiment involves the registrar merely pointing to an enterprise repository lookup containing the location of an enterprise repository. As discussed above, the alternate embodiments are brought about due to technologies for performing some of the registrar's functionality actually existing, and due to the varying ease in which these technologies may be transformed from a domain-type environment to an enterprise environment consisting of multiple domains. Regardless, if the service information cannot be found in the registrar's lookup, the registrar must get next hop information for the client (step 1280). The next hop information may be either the location of the enterprise repository itself or might instead be the location of the enterprise repository lookup. In that case, the location of the enterprise repository must be acquired from the enterprise repository lookup. In either case, the location of the enterprise repository is found and passed to the client (step 1282) and the process ends. Alternatively, the registrar passes the client's request directly to either the enterprise repository lookup or the enterprise repository to checks it records for a service that is compatible with the client's request. Once found, the client request would then be passed to the service's registrar and the present process would return to step 1270 for the new registrar.
  • Transaction Processing
  • With regard to FIGS. [0275] 13A-13B, a flowchart depicting the transaction process employed by the transaction manager is illustrated in accordance with a preferred embodiment of the present invention. The process begins with the client sending a transaction request to the transaction manager (step 1302). The transaction manager may be any of transaction managers 912A1-912AN depicted in FIG. 9 and the client may be one of the services being run in containers 906. Upon receiving the request, the transaction manager creates a transaction for the client, issues an enterprise lease for the transaction, and then returns the transaction content to the client as a transaction object (TXN) (step 1304). The transaction manager will manage the transaction only as long as a valid enterprise lease exists for the transaction. Should the enterprise lease expire, the transaction manager will clean up the client's transaction. By using the enterprise leasing concept, the client need not notify the transaction manager in case of a transaction failure. Should the client not be able to complete a transaction, the transaction manager automatically cleans up after the enterprise lease expires. However, if the transaction is proceeding at a slower than expected pace, the client can always renew the enterprise lease with the transaction manager. The enterprise lease maintenance process will not be further described for the transaction manager as the process has been fully described for the registrar with respect to FIG. 11B.
  • Returning to FIG. 13A, the client then requests various resources to join the transaction by passing the TXN to a resource in a request to join the transaction (step [0276] 1306). Recall that the client may be communicating with resources via traditional resource managers or might instead be communicating with NW-enable devices and network elements that are managing a resource. Next, if the resource manager notifies the client that it intends to join the transaction, the process flows to step 1308 where the resource manager also passes a participant interface to the transaction manager (step 1314). The client then determines whether or not another resource is needed in the transaction (step 1316). If another resource is necessary, the process returns to step 1306 where the client invites another resource to join the transaction and the process continues as described immediately above. If, on the other hand, another resource is not necessary for the transaction and the client has joined the necessary resources in the transaction, the client makes a “commit” call to the transaction manager (step 1318). At that point, the transaction manger implements the two-phase commit process which is invoked by the transaction manager on all participants joined in the current transaction (step 1318).
  • Returning to step [0277] 1308, should the resource manager not join the transaction, either expressly or by failing to respond to the client's request, the client may attempt to find another resource (step 1312). The process implemented by the client for finding a resource is similar to that described above with respect to FIG. 10 for finding a service and will be discussed further with respect to the DataBus. Should the client find another resource that is suitable for the transaction, the process reverts to step 1306 and continues as described above. However, if the client cannot find a suitable resource to transact with, the transaction ends. At some point, the transaction's enterprise lease expires with the transaction manager and the transaction manager cleans up itself.
  • Turning now to FIG. 13B, the two-phase commit process implemented by the transaction manager is described. After the client makes a “commit” call to the transaction manager via the TXN object, the transaction manager makes a “prepare” call to all participants (resource managers) that have joined the transaction with the client (step [0278] 1330). If all participants accept the “prepare” call, then the transaction manager issues a “commit” call to all participants (step 1334). Here again, the participant may accept the call or abort the transaction (step 1336). Should every participant acknowledge that it accepts the commit, the participants then perform the requested transaction and the transaction manager notifies the client that the transaction has been accomplished (step 1338), and the process ends. However, at times a participant cannot complete a transaction, thus returning to steps 1332 and 1336. At any time during the two-phase commit process a participant aborts the transaction, the client is notified of the failure (step 1340) and the transaction is rolled back at all of the participants due to the failure (step 1342). Roll back is a mechanism for returning participants to the state in which they each were prior to the participant accepting the transaction request. Rolling the transaction back ensures that no participant has partially completed the transaction.
  • Service Failures and Self-Healing Services
  • It is a fundamental principle of NewWave that it is a normal occurrence for the operating environment to be unstable for a time, but that it must return to stability independently. Maintaining a healthy environment depends first on finding out the health of the environment. As such, two techniques are used. The first involves the reporting requirements of all services. All NW service must answer ping( ) and healthCheck( ) requests. The ping( ) only establishes that the service is alive. The healthCheck( ) establishes that the service is alive and is able to perform all of its required functions. This includes accessing any needed resources, such as a database and a transaction manager. It also includes the ability to perform a task in a predetermined time period, depending on the task. [0279]
  • Enterprise leasing provides information to the registrar about the health of the services registered in its tables. If a lease is renewed, the registrar rightly assumes that it is alive, but not its condition. If the lease expires, the registrar assumes that the service is no longer functioning. This information is used to keep the registrar's tables clean and avoid giving out any stale references. The registrar will also notify any interested parties when a change is made to its tables. Certain NewWave infrastructure services monitor the registrar and use lease expirations as information about the state of the environment. Different types of monitoring services take different actions, such as restarting services or replicating registrations outside of the domain of the registrar. [0280]
  • Remote code loading, remote configuration and remote launching of services make easier the task of keeping the NewWave infrastructure and GIB running all of its services. When a service abnormally goes down, it must be restarted without human intervention if at all possible. This is done using an Arch Angel concept—a number of agents whose job it is to watch other services, know what services should be running, and start them if they are not running. The job of the Arch Angel is made easier because services have limited constraints on where they run—if one server goes down, the services that were running on it can usually be immediately re-homed on another server. However, some services have special requirements, local resources and the like. [0281]
  • As discussed above, some services require special resources and find it necessary to maintain mirrored state information in case of a service failure. Some services cannot be re-homed on a different service because those services have some state that must be restored when restarted. If a restarted service must re-establish the previous state, then that state information must be stored or mirrored in a place that would not go away if the server the service is running fails (i.e., on a non-local resource for instance). One solution is using virtual bulletin boards that allocate space to running application or service. State information is updated to a service's space until needed to recover from a failure. One approach for maintaining this type of private state managed by a service and another is for maintaining state that is shared by multiple services. [0282]
  • When a service goes away, it is not enough to just restart it. This may restore the services to the ecosystem, but not the interconnectedness of the ecosystem. There will still be stale references to the old service. So, even if all of the services are running, the NewWave environment may still be broken because collaborative services can no longer get to each other. A simple and effective way to handle this problem is by means of smart proxies, which have been discussed above. Recall that the proxy used to access a service from a client (which may be another service) is provided by the service itself. A proxy can encapsulate any code that can be executed in the client space. Self-healing services provide proxies which handle connection-related errors and re-find their respective target services, and finally re-execute the previous request. In this way, when a service is restarted, the stale references will eventually heal themselves. [0283]
  • FIG. 14 is a diagram depicting a service failure and re-homing the service to a different server and further depicting self-healing a proxy reference using a smart proxy in a global ecosystem of interrelated services in accordance with an exemplary embodiment of the present invention, and further illustrates self-healing a proxy reference using a smart proxy. FIG. 15A is a flowchart depicting a service restarting process in a global ecosystem of interrelated services in accordance with the present invention, while FIG. 15B is a flowchart depicting a process for self-healing stale references using a smart proxy in accordance with the present invention. With respect to FIGS. 14 and 15A, a monitoring service known as an “Arch Angel” is configured with information about the services for which it has the responsibility of monitoring. At a minimum, [0284] Arch Angel 1412 must know the identity of the services being monitored, their VM container requirements (what type of local resources, server platform, etc.), and the location of their service code (an address or reference for the remote HTTP server holding the service's code). Arch Angel 1412 is charged with attempting to restart failed services, ones that die an unnatural death for any reason. However, when a service's natural life is over, it will go away gracefully, executing normal shutdown procedures. In this case, Arch Angel 1412 recognizes that the service must not be restarted. One mechanism used to tell abnormal service failures from normal shutdowns is through enterprise leasing. A lease expiration is considered an abnormal event in the life of a service so if one occurs, the service must be re-started to bring the ecosystem back in balance.
  • Turning now to FIG. 15A, the process begins with [0285] Arch Angel 1412 performing an iterative check to determine if a service, service 1406 for instance, has failed (step 1502). Recall that this check may be precipitated by a variety of events, or even combinations of events. For example, a lease expiration where registrar 1410 notifies, or publishes, a monitor service of lease expiration. Alternatively, service 1406 might fail a healthCheck( ) request while still maintaining its lease(s). Regardless, if the service failure metric is exceeded, service 1406 must be restarted and its previous registrations cleaned up. In that case, Arch Angel 1412 identifies the service that has failed and checks its lookup for any VM container requirements required by the service (step 1504). Next, Arch Angel 1412 must find a suitable container for service 1406 and so it accesses domain registrar 1410's lookup for VM service container service attributes (step 1506). Once a VM container is found that matches the service container attribute needs of service 1406, Arch Angel 1412 retrieves a reference to that container (URL address, etc.). Next, Arch Angel 1412 must lookup the URL for the HTTP server with service 1404's service code (step 1508). Arch Angel 1412 then re-launches service 1406 by passing the service code server's URL out to the container service using the container's URL (step 1510). This is exactly the process employed for manually launching a service for an administrator's console described above with respect to FIG. 11A. The service can then register itself as shown above with respect to FIG. 11A for step 1106. However, in the case of service 1406 being restarted prior to a lease expiration, such as might occur when using the healthCheck( ) request, a number of stale references might still reside in registrar 1410 as well as the enterprise repositories, assuming that service 1406 was registered globally. Therefore, once service 1406 has been successfully re-started, Arch Angel 1412 can issue a shutdown request that appears to the registrar and enterprise repository that service 1406 has executed its normal shutdown procedure. Thus, registrar 1410 and the enterprise repositories can clean their respective lookups of stale references to service 1406 in its previous VM container.
  • FIG. 15B is a flowchart depicting a process using smart proxy for the self-healing of stale references in accordance with the present invention. This process is performed entirely by the service's smart proxy that was passed to a client during lookup, thus the process is actually performed internal to the client (unbeknownst to the client). The process begins with [0286] smart proxy 1420 performing an iterative check to determine if requests to a service, service 1406 for instance, result in a stale exception (step 1522). If not, the check continues to iterate through. If a stale exception is returned, then smart proxy 1420 attempts to relocate service 1460 in its new container (step 1524). Smart proxy 1420 looks up service 14056 in registrar 1410 for an updated URL to service 1406's location. However, merely because the service is not responding to requests from client 1408 does not necessarily mean that service 1406 has been restarted elsewhere in another VM container. If service 1406 is not listed in registrar 1410, then smart proxy 1420 will periodically recheck registrar 1410's lookup for service 1406's new URL, provided the rechecking process does not timeout (step 1528). If the process times out prior to relocating the service, the self-healing process ends and client 1408 will be forced to roll back its operation to whatever state is necessary for finding and using a different service. Returning to step 1526, once service 1406 has been looked up in registrar 1410's lookup, smart proxy reissues the request to newly restarted service 1406 in its new VM container. Once service 1406 responds, the stale reference is healed and the process ends.
  • DataBus
  • The traditional approach to data management in an enterprise was that the applications own the data. Independent stovepipe applications are based on this approach as depicted above in FIG. 4. In this approach, data scaled well (divide and conquer), but also led to incoherent data images due to each application having its own, independent view of the data. Additionally, the stovepipe approach limits an enterprise's ability to integrate business, as it tends to wall the enterprise into the current model. [0287]
  • A second approach to data management in an enterprise recognized that new applications invariably need data from older applications, thus data was replicated between applications in a peer-to-peer fashion. The peer-to-peer data transfer approach is depicted above in FIG. 1A and is often considered a type of Enterprise Application Integration (EAI). Because each application has an opportunity to access more than its traditionally owned data, this approach facilitates a more “enterprise view” of the data; however, transferring the data from its current location to where it is needed often makes it problematic. Applications using this approach often have to devote time and resources to wait for necessary data and/or caches for temporarily storing requested data during an execution cycle. Moreover, data replication approaches often require a spaghetti of data feeds between peers to effectively and harmoniously replicate data. [0288]
  • A final approach to data management in an enterprise involved another EAI between stovepipe applications and warehousing application data to make enterprise data centrally accessible to all enterprise clients. The EAI approach to data management using a hub and spoke configuration is depicted above in FIG. 1B. Application integration, using the hub and spoke configuration of feeds, is a mechanism for providing cleaner data transfer than peer-to-peer (i.e., often less spaghetti), but it still emphasizes shuttling data around the enterprise to finally end up in an enterprise data warehouse. This might be the preferred data management mechanism for integrating disparate legacy systems into an enterprise without wholesale migration to a standard enterprise system. Because the enterprise data is ultimately warehoused, the enterprise controls the data and access to it. The enterprise determines the mode of data access and handles security. While the hub and spoke EAI approach may be the best and most widespread data management approach in use, it still suffers from having duplicative data between stovepipe applications and the enterprise warehouse and bottlenecking at the hub. Improvements in the hub and spoke approach include federated architectures wherein the applications are able to statically connect to a single integration server or hub and to exchange information with each other. While the bottlenecking problem has been somewhat alleviated, data transfer is much less clean because an application can transact only with a single hub due to the constraint that each application's messages must be processed on its own hub. Thus, there is more spaghetti between hubs to get all application data to a central enterprise warehouse, a “spaghetti data warehouse.”[0289]
  • As briefly discussed above, the DataBus of the present invention provides a mechanism for alleviating the shortcomings in the prior art by decoupling data from the services and applications that historically owned the data. The DataBus makes enterprise data available to all authorized users without consulting with an “owner” application. The DataBus is a data management architecture for the NewWave service platform that presents an architecture for creating a consistent, enterprise-wide data persistence layer which allows clients to access shared enterprise data. The DataBus achieves this enterprise-wide look by decoupling shared enterprise data from specific applications (breaking down the stovepipes) and opening up the data layer to across-the-enterprise access (given proper authorization). The DataBus architecture is designed from the ground up for global scalability and accommodation of evolving business data models in a highly-distributed physical deployment. Scaling is realized predominantly through the partitioning, while individual partitions are mapped to logical data domains that are defined along more relevant dimensions than entity-type dimensions (e.g., geography, line of business, etc.), thus cutting across traditional entity boundaries. [0290]
  • Central to the DataBus data model is the notion that a data layer represents a shared asset of the corporation that is decoupled from the separate production applications requiring access to this data. This view represents a significant departure from currently dominant models where vertical applications have ownership of data described above. In accordance with the DataBus Architecture, a clean separation is made between applications (i.e., the dynamic elements of the system, which carry out use-cases) and the data resources or persistent business objects (i.e., somewhat static, passive elements) that are accessed by those applications. The data tier is an horizontal substrate underlying any and all corporate applications requiring access to that data. Where appropriate, there are, of course, exceptions to allow private data that is truly isolated to specific applications. [0291]
  • FIG. 16 is a diagram depicting a conceptual realization of the DataBus two-tier infrastructure concept for mediating data transactions and an enterprise-wide data persistence layer which allows clients to access shared enterprise data in accordance with an exemplary embodiment of the present invention. Briefly, requests for data made by applications or components from the underlying (database) storage technology are mediated in the data mediation layer, the one, pandemic DataBus. The mediation layer further provides uniform, ubiquitous access to corporately-controlled business objects, such as customer, product, service or device, by dissociating data from applications so that no service or product application controls and rations data needed by another application. In the place of application ownership, persistent objects and data are created and a steward entity is given the responsibility for owning and controlling the persistence objects and data. Finally, the DataBus provides shared copies of data and manages updates to data with globally-guaranteed transactions. [0292]
  • Transaction management, and the role of the transaction manager, has been described above with respect to FIGS. 13A and 13B which describe the two-phase commitment process and roll back contingency if all parties do not successfully implement their part of the required change. However, these functions are implemented under a process model used by applications for changing data and data associations. [0293]
  • The DataBus comprises a data layer with an object-oriented interface. All interactions with data are through methods on objects. If relational technology is used for actual backing store, then this implies that the data layer is actually two distinct tiers: 1) a persistent business object layer; and 2) the underlying relational database which stores the state of these business objects. If object-oriented database technology is used, the data layer might be realized as a single tier. In any case, we assume throughout this document that a distributed object-oriented approach is applied to the entire architecture, even if the wording of this document sometimes lapses into database terminology. [0294]
  • Any services contemplated for creating or retrieving instances of business objects must observe some fundamental principles. First, there is the notion that entity types (the nodes in an E-R diagram discussed in detail below) are deployed in runtime container processes. All access to persistent business object data is effected through remote calls to the object interface of the entity instances that are managed by the container. The entity instances are simply Java objects which conform to some strict conventions and live in a container environment. The entity instances themselves will interact with the backing data store, typically via Structured Query Language (SQL) calls to a Relational DataBase Management System (RDBMS). However, all application interaction with data is mediated through the instances, thus applications do not directly interact with the data store level of the DataBus. All entity instances must offer both a home interface and an instance interface. The home interface supports class-level functions, such as creation and initialization of new entity instances; finders allow query for existing entity instances matching specified criteria and methods for permanently deleting existing entities from persistent storage. Finally, the containers should have a sophisticated model for caching entity instances in-core, managing the life-cycle of cached instances as they move in and out of cache and are created and destroyed, management of concurrent access by multiple users, and management of security (access control) and transactions. [0295]
  • All application interactions with entity instances, as well as interactions between entity instances, transpire via remote method calls. In other words, the data objects are fixed in space, and interaction with them occurs over the wire. However, there are situations where it is more desirable to move data out to clients for a local style of interaction. Thus, the remote access mode of data access is supplemented with a mode of access entailing interaction with a local data copy. [0296]
  • The DataBus data architecture combines several main features or facets, such as partitioning, multi-hop finder strategies, externalized associations, object layer mediating access to underlying data storage, support for logical domains and transaction management. These separate facets of the architecture are briefly summarized in the following: [0297]
  • The proposed solution is Java-centric, with major systems based upon server-side Java and Application Server implementations. [0298]
  • Entity Partition Containers define a model where container processes provide an environment in which business objects live. Access to business objects is obtained via remote method calls to stationary objects that are fixed to a physical container. Each partition container provides a “home” interface which can be located and used to create or access instances of the class. [0299]
  • The Data layer allows for an alternative access style where clones of business objects may be streamed out to satellite cache servers or directly into an application's process space. Any number of satellite cache servers can be deployed as needed. [0300]
  • Loosely-coupled concurrency control idioms are provided, such as optimistic concurrency control, to detect stale data when multiple applications concurrently hold local copies of the same data. This approach allows data replication to many local sites, but operates at the business objects level rather than wholesale replication of database tables. Data is maintained in volatile storage since non-master data does not need the full robustness of a database. [0301]
  • Scalability is enhanced by the ability to partition any object class or data type across multiple, independent physical stores. Both business object containers (entity partitions) and corresponding database stores can be partitioned (horizontally) and further distributed across different operations centers if desired. Partitioning is emphasized over replication as the means for scalability. [0302]
  • A central steward assigned for each entity type provides coordination and management of unique primary keys across all partitions. Most operations, other than instance creation, involve no access to the steward. Significant effort is made to prevent the steward from becoming a bottleneck. Given its primary key, a multi-stage finder strategy allows navigation to any entity instance from anywhere in the enterprise. The first stage of the finder provides a “map” from the primary key onto the physical partition where the corresponding entity instance is stored. A second stage operation can then locate the specified object within the partition. [0303]
  • The information managed by the steward can be cached within the satellite cache servers so that, in most cases, an object is obtained without consulting the central steward. [0304]
  • The data layer architecture allows logical domains, cutting across entity-type boundaries to be defined and used to scope down the context of operations to a relevant size. Domains are conceptually orthogonal to entities, and serve as a logical overlay on top of the physical partitions. For finder operations more complex than find-by-primary-key, the specification of a domain narrows the range of a search to a small number of relevant physical partitions, thereby avoiding a broad search. Create operations can specify the logical domain to link with the object. [0305]
  • Externalized associative engines allow the creation of relationships between entity types. These constitute the literal realization of the links in an E-R diagram or object diagram. Foreign keys are not embedded within entities; rather, associations are externalized as first-class persistent objects allowing for a highly de-coupled, adaptive data/object model. [0306]
  • Existing entities can be made to participate in new associations without impacting existing links. Evolving business needs can be met by appending supplementary business objects to existing core objects through the agency of associations. Since the data storage for associations can itself be partitioned, association storage size grows independently of entity partition size and is not limited in terms of scale. At the same time, the architecture permits entities to be managed entirely from within. To the applications programmer, relationship traversal from entity to entity is completely transparent and seems centralized. [0307]
  • The proposed infrastructure supports a variety of integrity constraints upon associations, such as cardinality, as needed. [0308]
  • Subject areas are used to classify entities into broad categories of data areas in the company, such as Customer, Inventory, etc. Within each subject area, there can be many subordinate entities. These subordinate entities can be expected to evolve on a faster time scale as the details of the business evolve; however, the subject area model is expected to be much more stable. [0309]
  • Each subject area is defined by a principle entity that serves as an anchor point for the remainder of the information within the grouping. These standardized anchor objects represent major corporate elements. Subordinate data classes can be added as needed whenever required by new products and services. [0310]
  • Subordinate object classes within a given subject area may often have the character of local data; local in a logical sense of being relevant only in the context of a particular line of business. As pointed out above, externalized associations lend a great deal of flexibility for evolving the data model as new entities and relationships are added to the model. [0311]
  • Alternatively, the data administrators may choose to use more conventional, tightly-coupled intra-database relational mechanisms. However, it is intended that associations across major subject areas are exclusively built using externalized associative constructs. [0312]
  • Replication of databases using conventional commercial products can be used for purposes of fault tolerance and disaster recovery. However, in general, traditional wholesale replication of database tables is not viewed as being a sustainable basis for a scalable architecture. For example, if one database of size N served a company's current needs and the company were to grow ten-fold, the database would need to be of size 10×N. It would also need to be replicated to N distributed copies to hold access rates constant. The total amount of data storage using full replication strategies thus scales as the square of the company size. In the Data layer proposal, the extensive partitioning and distribution of business objects to form a loosely-coupled web or mesh of associated objects is considered to be the path to a sustainable, linearly-scaling data architecture. [0313]
  • Entity-Relationship Model
  • With respect to the present invention, the term “entity” will be understood in the context of a conventional entity-relationship diagram. An entity-relationship (E-R) model is a data modeling technique that creates a graphical representation of entities and the relationships between entities within an information system. The E-R model figures prominently into this data architecture in general. FIG. 17A is a traditional representation of an E-R diagram, [0314] nodes 1700, 1702, 1704, 1706 and 1708 represent entity classes for “Customers,” “Accounts,” “Account Service,” “Billing Address” and “Pending Orders,” respectively. An “entity” is any person, object, place or event for which data is collected. For example, in a business's information system, entities are business customers 1700, the customers' addresses 1702, orders 1708, etc. The entity is represented in a conventional entity-relationship model as a geometric shape, normally a rectangle, but in this case an ellipse labeled with a singular noun that describes the entity. A relationship is defined as the interaction between the entities. For instance, customer 1700 of the aforementioned business maintains account 1702 and account 1702 lists pending order 1708. Thus, the word “maintains” defines the relationship between a customer and the account or accounts that they maintain, while the word “pending” defines the relationship between an account and the pending order or orders. A relationship is normally denoted in a conventional entity-relationship diagram by either a diamond shape, or more simply, a line terminated with arrowheads which connects the entities. In either case, verbs may be used to label the relationships. Cardinality defines the association between the entities in terms of numbers. An entity may be optional or mandatory. For example, a sales representative could have no customers, or one or many customers, or there must be at least one product listed in an order. There are several different types of cardinality notation, but with respect to FIG. 17A, a single arrowhead represents a unit of one, while a double arrowhead represents a unit of many. The three main cardinal relationships are: 1) one-to-one, expressed as 1:1, representing the relationship between customer 1700 and account 1704; 2) one-to-many, expressed as 1:M, representing the relationship between customer 1700 and bill address 1706; and 3) many-to-many, expressed as M:N (not shown in the Figure).
  • A central concept of this data architecture is that the nodes and arcs of the E-R diagram are literally mapped onto entity engine processes and association engine processes on the network. FIG. 17B is a representation of nodes and arcs of the E-R diagram being mapped onto entity engine processes and association engine processes. Customer entity [0315] 1700 is mapped to customer entity engine 1710; account entity 1702 is mapped to account entity engine 1712; account service entity 1704 is mapped to service entity engine 1714; billing address entity 1706 is mapped to billing address entity engine 1716; and pending order entity 1708 is mapped to pending order entity engine 1708. Associations between entities can also be externalized. Externalized associative engines allow the creation of relationships between entity types. These relationships constitute the literal realization of the links in an E-R diagram or object diagram. With regard to FIG. 17B, these external associations between entity types are shown as boxes between each entity engine. Three types of association engines are: 1) one-to-one; 2) one-to-many; or 3) many-to-many, depending upon the cardinal relationship between the specific entity classes. For example, each customer entity in customer entity class 1700 is associated with only a single billing address entity within bill address entity class 1706, thus Cust/BillAddr association engine 1724 is a “1-1” association engine, whereas customer entity might be associated with several accounts. Thus, Customer/AccAssociation engine 1720 is a “1-M” association engine serving associations between Acc/AccCustomer entity engine 1710 and account entity engine 1712.
  • As the FIGS. 17A and 17B illustrate, the E-R diagram of a business object model is directly recognized as a web of processes linked together over the network. This model is similar is some aspects of the so-called “network databases,” and to the World Wide Web model where any object can have links to any other object. However, there is greater discipline here in that associations are structured, follow a schema defined by the E-R model, and obey integrity constraints such as cardinality. [0316]
  • Further, FIGS. 17A and 17B underscore the notion that associations and entities receive equal treatment as first class objects supported by deployed processes. Both entity engines and association engines have their own backing store as well. The backing store for entities will typically store records of attributes that represent the state of the various entity instances managed by a given entity engine. The backing store for association engines will contain tables of link records, which are pairs of foreign references to the entities that stand in relation to each other. In database language, the association storage is sometimes called a “correlation table.”[0317]
  • Further, with respect to FIG. 17B, the lines connecting the boxes representing the various engines convey two points. First, they connote the foreign references to the entities that the association links together. Second, they correspond to interprocess communication (IPC) channels that are exercised at runtime as applications establish new links between entity instances and traverse existing relationship paths among associated entities. This simplified view of the mapping of E-R diagrams onto process engines has glossed over some details that will be filled in below. In particular, the fact that each given entity class may actually have its instances partitioned horizontally across several distributed stores has been ignored. “Horizontal partitioning” is database jargon for deploying different “rows” in a table across different stores, the image being of a horizontal slice through the table, as opposed to vertical partitioning where different attributes of the same record are stored in separate physical areas. [0318]
  • Entity Partitions
  • As discussed throughout the present disclosure, the DataBus architecture relies very heavily upon data partitioning to achieve the scalability. Data is deployed throughout an enterprise network in a highly decentralized, distributed manner, but at the same time, remains logically unified. Thus, an enterprise user (service, client or even end user) can easily navigate to any data item from anywhere in the enterprise. Even though the data deployment is unconventional, conventional databases are relied upon for implementing highly-independent physical data partitions which have essentially no direct knowledge of each other. As described in detail below, external navigational mechanisms, such as finders and associations (described above and below), are the glue that binds these highly independent partitions together. [0319]
  • Separate entities will generally be housed in separate storage servers. Even a given entity is likely to be physically partitioned across many separate storages. Practically speaking, an enterprise may strive to co-locate partitions of a given entity at a single physical facility, an operations center, for instance, on separate nodes of an [0320] SP\2 multiprocessor complex. However, the same entity might often be physically partitioned across geographically-distributed sites (e.g., siting one subset of customer data in the United States, and another in Europe).
  • FIG. 18 is a diagram illustrating [0321] entity A 1802, entity B 1804 and entity C 1806 which are partitioned in accordance with an exemplary embodiment of the present invention. Each of entities A-C (1802-1806) is partitioned in as few as two and as many as four separate partitions; however, the diagram is merely illustrative. In practice, an entity might be partitioned in literally hundreds, and possibly thousands, of separate partitions. Note that the grouping of partitions within the entity boxes does not imply physical proximity in actual deployment. In fact, the deployment of some entities may be quite widespread across an enterprise. Remember, it is expected that data which is repeatedly accessed by a client will most likely be physically located proximate to that client. Thus, clients that are geographically disparate, while utilizing records or instances of the same entity, will result in the entity instances being geographically divided up by partitioning the entity.
  • Interestingly, entity partitioning is not limited to the records of the underlying database storage media. Partitioning also includes the entity instance containers that house the object representation of the business entities. In other words, both the business objects tier and the data storage tier of the N-tier DataBus architecture are partitioned. In accordance with one embodiment of the present invention, only one object container instance is deployed for each corresponding database partition. FIG. 19 is a diagram illustrating three container-database partition pair in accordance with an exemplary embodiment of the present invention. Note that VM container 1 ([0322] 1910-1) is deployed for database 1918-1; VM container 2 (1910-2) is deployed for database 1918-2; and VM container 3 (1910-3) is deployed for database 1918-3. It should be understood that while databases 1918-1-1918-3 are physically partitioned, and likely to be deployed to physically distinct server hosts, deployers may often wish to locate the database and corresponding entity partition container onto the same host. For example, to co-locate container 1910-1 and database 1918-1 on the same host, etc. In fact, it is logical to pair the object instance container and its matching database store on the same processor node so as to make container to database communications very fast.
  • DataBus Architecture
  • With DataBus entities highly partitioned across distributed data stores, a suitable strategy or set of strategies for finding any particular object of interest is needed. These strategies include using a multi-stage finder mechanism to find objects given their primary key and employing a scoping mechanism, for limiting the scope of an arbitrary, criteria-based finding operation to a subset to all partitions in which the entity must be found. The final strategy uses an externalized associative engine mechanism for following association links between entities. The multi-hop finder is especially suited for finding an entity instance by primary key from anywhere in the enterprise, regardless of where it is physically located. [0323]
  • However, before discussing the multistage finder, it might be helpful to discuss the DataBus architecture in more detail and the process for creating an entity instance in a partition in accordance with an exemplary embodiment of the present invention. FIG. 20 is a diagram depicting DataBus components necessary for creating an entity instance in accordance with an exemplary embodiment of the present invention. For each entity in an enterprise, there exists one steward service, depicted as [0324] steward 2010. This steward is logically central, but for access, availability and latency considerations, could be physically composed of federated, cooperating components constituting a logically unified steward service. Within every multicast domain, there exists a plurality of satellites, depicted as satellites 2012-2018. Steward 2010 provides a measure of central management to the present invention. With the storage and container servers for each entity being partitioned and distributed across physically separate server hosts, as described directly above, there is a need for a central manger, one for each entity class. The entity manager serves as a central authority for those aspects of the entity needing to be centralized, as represented in FIG. 20 as steward 2010. In spite of the emphasis of the DataBus architecture on decentralization and distribution, however, is in situations where there is no way of avoiding some central control. This is where the central manager comes into play. While the central manager is necessary, we go to great lengths to avoid this manager becoming a bottleneck to throughput, and avoid excessive accesses to this central steward or manager.
  • Roles of the Entity Manager
  • One of the main roles of this central manager is to provide coordination and management of unique primary keys (PKs) across all partitions. In the present architecture, all entities follow the convention of defining a candidate primary key consisting of a unique 64-bit integer called the UID (unique identifier). This UID provides a convenient foreign key that is used by externalized association engines to store references to entity instances, as will be further described below. In accordance with one exemplary embodiment of the present invention, one of the primary responsibilities of [0325] central entity manager 2010 is to maintain a block-up counter for generating new UIDs when a new block of primary keys is called for by any of satellites 2012-2018. Satellites 2012-2018 actually issue a primary key whenever an entity instance is created and not steward 2010. This approach avoids the necessity of accessing the manager upon every creation of a new entity instance. The satellite need only consult the steward during entity creation in the event that the satellite runs out of keys in its allocated block of keys. It must then go back to the steward to request another block of keys. This approach avoids the necessity of accessing the manager upon every creation of a new entity instance. In accordance with another exemplary embodiment of the present invention, steward 2010 validates that a primary key proposed by a user for a new instance is not already in use by an existing instance. This latter sort of PK contrasts with the block-up UID generated by the central manager in that its form is dictated by the type of business object it represents. For example, the PK for a given entity might be a string or an integer, or it might be a composite key having more than one component. These domain-specific PKs would often be proposed by the application, or by custom logic within the entity implementation, and checked for uniqueness by the central entity manager, using for example, a hashing or directory service.
  • In accordance with another exemplary embodiment of the present invention, [0326] steward 2010 serves as a place to keep the master data for the mapping of primary keys onto partition identifiers that indicate where each given object is stored. This is an alternative embodiment and is discussed more below with respect to multi-stage finders. However, in that case, when a cache miss is suffered out at a satellite server, the finder service faults over to the master data managed by steward 2010 to determine which partition contains the entity having a given PK. When a new entity is created, steward 2010 places a new entry in its master copy of the PK-to-partition map. This role of steward 2010, as the master record for this mapping, assumes that the multi-hop finder is based on distributed caches. If, as is discussed with respect to another embodiment of the present invention, enterprise repository 2030 is used for storing PK-to-partition maps, then burden for this data management shifts entirely to enterprise repository 2030. However, if, and only if, the embodiment requires steward 2010 to generate new primary keys when new instances are created, and its responsibility for recording the PK-to-partition association, then the central logic of the home interface's create operation can also be located within steward 2010.
  • Finally, [0327] steward 2010 is responsible for finding an instance's partition container if the guidance stage of the find operation fails. As will be discussed above, a find operation may consist of a guidance stance and a local find stage. Steward 2010 issues parallel query to all entity partition containers if a PK-partition map is not listed in the satellite or enterprise repository for the partition holding the instance for the primary key.
  • Avoiding Entity Manager becoming a Bottleneck
  • Despite the central nature of the entity manager within a federation of entity partitions, one is not to think of the steward as being strictly layered over the physical partitions in a top-down sense. In other words, all operations on an entity instance or on the entity home interface are not channeled through the manager. On the contrary, we seek to avoid, as far as we can, directing traffic through the manager, turning only to the entity manager in those situations, such as instance creation, where consulting it cannot be avoided. This point is key to the scalability of the proposed architecture. We wish to avoid having the central entity manager turn into a constriction point. [0328]
  • It should be mentioned that, in contrast with the prior art, when the client application holds a proxy or handle to an entity instance and invokes methods on that instance, [0329] steward 2010 is completely bypassed, and the remote invocation goes directly to the partition container where the instance is stored. Thus, instance-level operations entirely short circuit both steward 2010 and satellite 2012-2018.
  • The find-by-primary-key methods in the entity's home interface are handled by the satellite cache servers as discussed above in the section on multi-hop finders. These caches are consulted first to find the partition where a desired entity instance is located; the entity manager is consulted only whenever there is a cache miss. The hope is that most of the find operations will never need to consult the central entity manager. Association traversal and association creation (link) operations likewise never need to touch the central entity manager. [0330]
  • Finally, in accordance with another exemplary embodiment of the present invention, [0331] steward 2010 is responsible for allocating blocks of primary keys to the satellites for its entity class and for locating the partition containing an entity instance, given the instance's primary key in case of cache faults in enterprise repository 2030 and/or at satellites 2012-2018. In accordance with this embodiment, steward 2010 issues parallel query to all entity partition containers only if a PK-partition map does not have a copy of its own or the PK-partition map is not listed in enterprise repository 2030 and/or satellites 2012-2018. In that case, the parallel query is issued and steward 2010 retains a copy for itself prior to sending it to satellites 2012-2018, possibly saving a parallel query in the future.
  • Satellites [0332] 2012-2018, on the other hand, are responsible for two class level tasks. The first is finding a suitable container for a new partition. Satellites 2012-2018 select a specific partition container to place the entity instance based on some algorithm, such as proximity to the creating client, partition container loading, distribution leveling or some combination of the above. Satellites 2012-2018 also cache the PK-partition map and may pass that information on the steward 2010 after creating an instance.
  • In addition to [0333] client 2030, steward 2010 and satellites 2012-2018, the local multicast domain also contains a plurality of domain registers 2032 for registering and looking up local NW services. External to the local multicast domain is enterprise repository 2030 which maintains enterprise level service and data registration as described above with respect to the processes described in FIGS. 10A, 11C, 12A and 12C. Additionally, enterprise repository may contain PK-partition mapping information as described immediately above.
  • Also shown in FIG. 20 are servers [0334] 2002A-2002D which may be physically located in the local domain, but are more probably scattered throughout the geography of the enterprise. For instance, server 2002A might be situated in Paris, while server 2002B is situated in Moscow. Also depicted in FIG. 20 are arrows depicting the interaction between DataBus components. For the reader's convenience, these lines represent the correspondingly-numbered step in the flowchart depicted in FIG. 25, which will be described below.
  • FIG. 21 is a flowchart depicting a process for creating an entity instance in accordance with an exemplary embodiment of the present invention. The process begins with client [0335] 1920 accessing an interface for interacting with a satellite by finding a satellite service for the entity class in domain registrar 1932 (step 2102). Client 1920 looks up and retrieves the proxy (or a smart proxy) for satellite 1912. It should be understood that because each local domain should have satellite services for each entity class running, it should never be necessary for the client to hop to the enterprise repository for a non-local satellite. Of course, if a satellite service is not found in registrar 1932, client 1920 can find enterprise repository 1930 and then look up a non-local registrar with a listing for a satellite service as described above with respect to FIG. 12C. If client 1920 already has the interface to satellites 1910, then steps 2102 and 2104 can be omitted.
  • Next, client [0336] 1910 requests an entity instance be created in a partition (step 2106). Once the request is received by satellite 2112, it checks its cache for primary keys (step 2108). If satellite 1910 does not have a primary key on hand for creating a new entity instance, it requests a block of key from steward 1910, which is forwarded to satellite 1912 (step 2110). Once satellite 1912 has a key, it determines the best entity container partition to create an entity instance in step 2112. Satellite 1912 might base the decision on proximity to client 1920, container loading or some other quantifiable factor. The partition container may also be specified explicitly by the caller. Or the caller may specify a logical domain where the new entity instance is to be located. In this latter usage, the satellite would query an enterprise mapping of logical domains onto qualifying entity partitions. The steward would select from the set of qualifying partitions belonging to a domain a given partition to house the new entity instance. This selection could be random round-robin or based upon available capacity, determined by policy. Then, satellite 1912 caches the PK-partition mapping, passes it to steward 1910 and forwards the create(PK) request to the selected partition container (step 2112). From there, the partition container creates the entity instance and passes a proxy for the instance to client 2014. Additionally, the newly-created data object can register itself with the enterprise, like services as described above with respect to FIG. 12A. The process then ends.
  • Once the entity instance has been created, there must be a coherent strategy to find it again when needed by a client. A multi-stage finder strategy allows the navigation to any entity instance from anywhere in the enterprise, given its primary key. The basic idea is that a first stage is used to map the primary key (PK), or candidate PK, onto the partition number where the entity is stored. The second stage is to invoke the “local” finder interface out at the relevant physical partition to produce the actual entity instance of interest. This second stage of the find operation is implemented with a SQL select statement for backing store that uses a RDBMS. However, before discussing the multi-finder strategy, in might be useful to review various protocols employed by the DataBus for accessing and safeguarding data objects. [0337]
  • Modes of Data Access
  • The present invention envisions three distinct types of data access: 1) remote calls to fixed entities; 2) streaming copies of the data to client; and 3) moving a mobile agent into the entity's space. The core strategy has all client access to business objects effected by remote method calls into stationary data locations, the containers. This mode is similar to that described above with respect to services where a client intending to interact with an entity acquires a proxy to the entity instance and uses the proxy to interact with the instance. [0338]
  • With respect to the data-movement approach, copies of data objects are moved out to the locales of the clients, thereby allowing client applications to exercise the business objects locally. By locale, we might mean a process close to the client, say on the same LAN, or even the process address space of the client application, where there is room for variations. At some point, changes to the copies need to be synchronized back to a master copy of the data. This approach generally implies the possibility that multiple copies corresponding to the same underlying objects may exist concurrently in different users' application spaces. Therefore, this approach to data access requires the adoption of well-thought-out concurrency control strategies. [0339]
  • The third style of access to data, in addition to remote calls to stationary business objects and moving of object copies out to clients, is to again keep the business objects stationary, but dispatch client code in the form of mobile agents out to the business objects. The agent does work on behalf of the client then reports back to the client when there are results. This is somewhat similar in spirit to the familiar stored procedures from the relational database world where an application can install functionality inside the database engine. [0340]
  • Remote Access to Stationary Business Objects [0341]
  • As the remote calls to fixed entities mode of data access has been thoroughly discussed above, the notion is that clients obtain (using create, find, or association methods) remote handles to entity instances. These remote handles are similar in some respects to the familiar RMI proxies or CORBA proxies from ORB computing. However, the remote handles to entity instances are implemented with their own code which may be remotely loaded and hidden from the client in accordance with an exemplary embodiment of the present invention. These handles of remotely-loaded code are the smart proxies discussed above with respect to NewWave services. Recall that a smart proxy is a local object streamed to the client's process space which may contain both local data, logic and behavior, as well as references to remote server-side objects. In accordance with another exemplary embodiment of the present invention, the smart proxy that serves as a remote handle to entity instances encapsulates local state (i.e., the entity primary key), the name of the entity class or the partition number where the entity instance is actually stored. Additionally, the smart proxy will also encapsulate an RMI proxy to the container managing the entity instance. [0342]
  • Streaming Data Copies to Client: Two Variations [0343]
  • In the second mode of access to entities, a copy or clone of the business object is streamed out to the locale of the client application. Two modes of streaming supported by the present invention are direct streaming of a clone object into the process space of the client application and caching the clone object in a satellite cache server. FIGS. 22 and 23 are diagrams depicting both modes of streamed data copies in accordance with an exemplary embodiment of the present invention. FIG. 22 is a diagram showing a read/write copy of the entity instance being streamed directly to the client, while FIG. 23 shows the cache server approach where a copy of the entity instance is streamed to a cache server rather than the copy being directly steamed to the client. In the latter approach, the client accesses the copy via the cache server. With respect to FIG. 22, a copy or [0344] clone 2206 is shown streaming from container 2212 directly to client 2204 for the client's use. Client 2204 issues a getClone( ) to container 2212 which obliges with clone 2206. Client 2204 can then interact with the clone of entity instance 2202 including updating the instance using a updateFromClient( ). Here client 2204 is implemented in Java and therefore has the space to accommodate clone 2206.
  • By contrast, with respect to the cache server approach depicted in FIG. 23, [0345] client 2314 does not interact directly with clone 2306. Instead, clone 2306 is streamed to satellite 2310 rather than directly to client 2314. The cache server approach is mandatory if the client application is non-Java client 2314. Some Java “proxy” space is needed to store the clone object on behalf of client 2314.
  • In order to support this streaming of clones out to the client, the entities must support a convention of supplying a getClone( ) method and an updateFromClone( ) method. For each entity type, there also must also be a serializable clone class defined (sometimes called a state object) which represents the thing that actually gets streamed out to the client. The entity's getClone( ) method creates a ( )clone object reflecting the entity's current state, then streams the clone object out to the caller's address space. The updateFromClone( ) method of the entity takes the clone instance as an argument and updates the state of the master to match the attributes of the clone object. [0346]
  • The above approach of having each entity support a getClone( ) method implies that there is one fixed type of clone object for each entity. In an enterprise, different applications may have differing needs for making up the exact internal data in a clone object (e.g., nested entities to varying levels.) The DataBus architecture accommodates these varying needs by offering a factory mechanism whereby clients can stream a factory object into an entity container during the request to create a clone of an entity. The entity container will ask the custom factory to create the clone, passing a reference to itself (i.e., to the entity) in order that the factory may call back the entity to extract entity state information during the construction of the clone. With this methodology, clients can create customized copies suitable for their purposes. By streaming factory code from clients into the entity containers at runtime, the entity container's abilities for stamping out data copies becomes extensible, much as a computer-controlled machining tool's behavior is extensible through uploading instructions. Note that the factory can imbed, within the primary copy, any number of copies of associated entities to whatever depth of recursion the application deems desirable. Clients can thereby stream into a custom factory that tailors copies to the clients' specific needs. The DataBus uses the approach of streaming client code into “the system” in another context, apart from clone factories. The DataBus also allows the client to provide a filter object during association traversal or find-by-criteria method calls. The filter implements custom Java code that can narrow a result set. In so doing, primarily only “good” objects are returned to the client, rather than all objects that match a “find” or “get” request. Recall that the “getAccountsForCustomer( )” method returns all destination objects that are associated with a given source object and that the solution requires either extra remote calls and data passing, or the client sequencing through the unfiltered array of accounts and performing its own filtering. By contrast, with the factory, the client streams objects into DataBus that act like the SQL “where” clause to perform custom filtering inside the entity container. Thus, the entity containers (the partition services), as well as the association engines, can apply filter objects to narrow results based on some preset criteria determined by the client. [0347]
  • Concurrency Control [0348]
  • Clearly, the streaming of clones to the client mode of data access has potential problems under concurrent usage scenarios. For example, in the lost update problem, two users fetch a copy of an entity instance. The first user modifies one copy and submits the changes. Thereafter, the second user modifies another copy and submits the changes, thus eliminating the modifications made to copy by the first user. The present invention solves the concurrent user problems by implementing one of two mechanisms. The first approach is used in scenarios where the client is using the data copies in a read-only fashion. That approach involves notifying the user of a read-only copy that a modification has been made to the original data and notifies the user of the changes in accordance with one embodiment of the present invention. The second approach is used in scenarios where the client is using the data copy in a read/write fashion. The second approach involves tracking version number of clones and rejecting any updates from clones that are not current in accordance with one embodiment of the present invention. [0349]
  • FIGS. 24 and 25 are diagrams depicting both approaches for maintaining concurrency control implemented by DataBus in accordance with an exemplary embodiment of the present invention. FIG. 24 is a diagram showing the event notification approach where the client is using only read-only copies of the entity instance and receiving change notifications whenever an update is received. The optimistic concurrency approach in FIG. 25, on the other hand, depicts the client using a read/write copy that must stay in sync with a master copy in order for updates to be accepted. [0350]
  • With respect to FIG. 24, client [0351] 2404 is using read-only clone 2406, while client 2405 is using a second copy, clone 2406, which is not read only. In the read-only scenario, event services keep the client copy reasonably in sync with the master data 2402. Whenever client 2404 obtains a clone copy 2406, the system registers with the event service the interest of client 2404 in obtaining refresh events whenever the master data gets updated by anyone else. A flag is also set on entity 2402 so that every time an update gets stored to the database, the system publishes a change event to the event bus so that the client is notified of the change. Here, client 2404 takes out an enterprise lease on the event service which, as described above, requires that client 2404 actively renew the lease if interested. Essentially, the event service publishes event notification to any service or clients wanting to subscribe and stay interested as long to the enterprise lease is current. Should client 2404 lose interest and let the lease expire, client 2404's subscriptions of interest are purged. As discussed previously, if client 2404 disappears ungracefully, the lease is expunged from the record; however, should client 2404 eloquently shut down or decide not to take a data copy, the lease is removed gracefully. Recall from the description of FIGS. 13A and 13B that the transaction process implemented by the transaction manager is a two-step commit process. All invited participants must join in the transaction prior to the transaction manager issuing the “prepare” and “commit” commands. Therefore, in accordance with an exemplary embodiment of the present invention, the change notification to client 2404 depends on the update transaction actually being committed. Should all participants in a transaction actually commit to the transaction, as opposed to joining it, the change notification is sent to client 2404. Conversely, should the participants only confirm that the update transaction has been received to (tentative) store back to the database, the change notification is withheld, no matter how certain the impending change looks.
  • With respect to FIG. 24, client [0352] 2404 is using read/write clone 2408, as is client 2405. Thus, either of clients 2404 and 2405 can update master entity instance 2402. The second approach to concurrency control is when there are clone copies in the so-called optimistic concurrency control strategy. This strategy assumes a lack of locking due to the fact that there is optimism that collisions will be infrequent. In the optimistic concurrency-control idiom, a version number (a one-up count will do) is maintained on every entity instance. Each time an update to an instance occurs, the counter is incremented. Whenever a client obtains an entity clone, the clone contains the version number among its attributes. Whenever the client does a copy-back, using the updateFromClone( ) method, the system compares the clone's version number with the current version in the database. If there is an inconsistency, this means that some other user has performed an update since the first user originally fetched their copy. Under these conditions, the updateFromClone( ) method throws a “StaleData” exception and the update is aborted. With respect to FIG. 25, when client 2504 takes clone 2508, the copy comes with a version number. It is assumed that client 2504 will be able to make any necessary modifications to clone 2508 prior to another client, for instance client 2505, taking a clone of entity instance 2502, and thus another version. If so, client 2504 can update instance 2502 without incident. If, however, client 2505 does take out another copy, now clone copy 2509, then updated clone 2508 from client 2504 will not be accepted and a StaleData exception is returned because clone 2508 is not in sync with instance 2502. In that case, client 2504 merely rolls back the entire transaction and runs internal application logic that redoes the use-case on a new version of instance 2502. There is the possibility that the transaction cannot be successfully rolled back and client 2504 is then forced to re-key clone 2508 (i.e., create another instance with its unique primary key). It should be noted that under the optimistic idiom, one generally fetches the clone under one transaction, works with the clone under no transactional control, and then finally updates the original data store from the clone state under a second transaction.
  • Multi-Hop Finder Process
  • One aspect of the present invention is that, despite the fact that two stages are involved in the find operation, this fact is hidden from the applications programmer. The find operation appears to the user as a single seamless operation. There is quite a range of possible implementation strategies and technologies that could be used for building the first stage of the finder, sometimes referred to as the guidance stage, for example, relational database tables to correlate keys and partition identifiers. This would really be overkill for a number of reasons. First, there is no real need for the first stage data store to be transactional. Less than 100% clean data is acceptable in the first stage. If the guidance stage occasionally points one to the wrong place, or to nowhere, the find procedure is backed up by a brute force parallel query to all entity class partition containers. Thus, the system can always find out where, if anywhere, the desired object is actually stored. Moreover, directing all find queries to the same database invites bottlenecks. [0353]
  • Additionally, in accordance with an exemplary embodiment of the present invention, a non-transactional guidance stage can be self-healing. Strictly speaking, the guidance stage does not even need to be persistent, but instead can take on the form of cache held in volatile memory. This is so because guidance data is, in principle, recoverable using the parallel query approach outlined above. The PK-partition mapping results returned from the parallel query are replicated down to each entity class satellite. The idea is that distribution and replication of the guidance data (which allows availability and scaling to meet access volumes) is more important than transactional integrity or absolute fault tolerance. [0354]
  • One approach to building a guidance stage of the multi-hop finder is to use an enterprise level directory service, such as an LDAP-based service or the enterprise repository, to store the mapping from PK onto partition number or whatever information uniquely identifies the relevant container where the entity is stored. This approach has the advantage of being automatic because newly-created entity objects can register themselves similar to services whenever they are started. However, due to the increased traffic to the enterprise repository, more repositories must be utilized and the PK-partition mapping replicated across all the enterprise lookups in order to guard against bottlenecking at the enterprise lookup (or LDAP-based service). [0355]
  • An alternative to the enterprise lookup approach is to incorporate a cache architecture in certain entity class components, such as the steward and/or the satellites. In this approach, a cache of PK-to-partitionId entries is maintained in volatile storage out in the various satellite servers that has already been configured for holding streamed object clones. The guidance cache is in the form of a finite size, in-core hash table, following LRU (least recently used) chain semantics typical of caches. One feature is that the satellite caches exist in any number across the enterprise, as appropriate, to prevent the guidance stage from becoming a bottleneck (similar to how the problem of bottlenecking at the domain registrars is handled). The cached guidance stages are largely self-maintaining and present one level of a multi-level faulting approach to handle cache misses. When a find-by-PK operation is invoked by the user, the satellite cache is checked for a match. If found, the find request is sent to the relevant entity partition container. If there is a cache miss at the satellite, the process faults over to a centralized master store of the complete set of guidance data. This store may actually be present in two locations, the enterprise repository and the steward. Thus, the enterprise repository, populated with PK-partition mapping from data object registrations, is free. The other central store of guidance data is maintained by an entity management engine (the steward). It is expected that some embodiments of the present invention will utilize the guidance data in the steward, while others will use the guidance data in both the enterprise lookup and the steward. However, it should be noted that if the enterprise repository is checked, then the steward should also be checked because the process faults over to the steward automatically. [0356]
  • However, if for whatever reason a match is not found in either the steward or enterprise lookup, the process then faults over to a brute force parallel query out to all known entity partitions to find who has the data. Note that it is the steward who remains aware of all current partitions and who is responsible for initiating this brute-force query to all known partitions. Also note that this query to all partitions proceeds in parallel in concurrent threads. In accordance with exemplary alternative embodiments of the present invention, the query takes one of two forms. First, query all known partitions for the partition holding the data that is identified by the specific primary key being sought. Alternatively, the query might instead be a request for all partitions to declare their primary key identifier of all entity instances. In that case, the response will repopulate all guidance data held by the steward, along with PK-partition mapping information held in the satellites. [0357]
  • FIG. 27 is a flowchart depicting a multi-hop find process in accordance with an exemplary embodiment of the present invention described above. FIG. 26 is a diagram depicting DataBus components necessary for performing the multi-hop find process described in the flowchart of FIG. 27. Each of the relevant process steps is depicted in FIG. 26 as an arrow accompanied with the corresponding step number for FIG. 27. The process begins with [0358] client 2620 looking up satellite service 2612 in domain registrar 2632 (step 2702). As discussed above with respect to FIG. 12A, a NW service can be found in the lookup table by its attributes rather than by its interface. Client 2620 returns the proxy object for interacting with satellite 2612 (step 2704). Should client 2720 already have the interface for satellite 2612, then steps 2702 and 2704 can be omitted.
  • The find operation is a two-step process wherein the first step locates the partition holding the entity instance and the second step is a local find where the partition is requested to return an interface for the entity instance. The process begins with [0359] client 2620 issuing a findByPk( ) to satellite 2612 via the satellite's proxy (step 2706). If satellite 2612 has the PK-partition mapping listed, the satellite identifies the partition holding the entity instance and the process moves on to the second step wherein the satellite performs the local find (step 2708). If, however, the PK-partition map is not in the satellite 2612's cache, the satellite looks up the primary key in enterprise repository 2630 (step 2710). (Note that the satellite will cache the new information.) If, at this point, satellite 2612 finds the primary key in enterprise repository 2630, the satellite retrieves partition information and performs a local find in that partition (step 2712). If, however, the primary key is not listed in the enterprise repository, the process faults over to steward 2610. Here Steward 2610 can perform various alternative processes. First, if steward 2610 has a listing for the primary key in its cache, it merely passes the partition identifier to satellite 2612. Alternatively, steward 2612 executes a parallel query for the partition holding the primary key. Once the partition identifies itself to steward 2610, that information is again passed to satellite 2612. Further, in accordance with another embodiment of the present invention, steward 2610 executes a parallel query for all entity-class partitions to report the primary keys for their entity instances. In that case, steward 2610 can repopulate its own cache with the PK-partition mappings received from the individual partitions. That information is then passed down to the entity-class satellites (2612-2618) which repopulate their caches with the PK-partition mappings (step 2714).
  • In any case, at this [0360] point satellite 2612 will have identified the partition holding the entity instance and performs a local find (step 2716). Satellite 2612 makes the findByPk( ) to the home interface of the partition identified as having the entity instance. The partition container returns a proxy for the entity instance to client 2620 for interacting with the instance (step 2718). The process then ends.
  • Logical domains are used to narrow the context of an operation to a scope that is smaller than the entire enterprise. FIG. 28 is a diagram representing a logical domain boundary defined from partitions in each of several entities in accordance with one embodiment of the present invention. Domains are, in a sense, orthogonal to the dimension of entity type or subject area cutting across different entity boundaries. Individual domains may be defined along with any pertinent grouping, for example, along geographic lines or along lines of business, or according to some other classification. Logical domains supplement the methods of finding entity instances, such as by using either multi-stage finder strategy using primary keys described above, or to chase relationship paths from a known entity to related entities using the mechanism of externalized associative engines, the description of which follows. [0361]
  • Logical domains are particularly useful with respect to situations in which a user needs to locate one or more entities, starting cold, by criteria that are more complex than a search by primary key. In these situations, the where clause of the SQL select query may be used for the more complex find-by-criteria operations and can be performed in parallel out at the separate partition containers for a given entity, and then the results can be coalesced. However, there is no need to perform these parallel find operations at entity partitions where the entity could not possibly be located by searching a U.K. customer base when trying to find a U.S. customer. In these situations, it is desirable to scope the range of an operation to a logical subset of all partitions. Logical domains provide the means to perform this narrowing of scope. [0362]
  • In formal terms, the organization of data into logical domains is represented by a mapping from the pair [0363]
  • (entity class name, domain common-name)
  • onto the set of all partitions where entities of that type and logical domain are stored: [0364]
  • D: (entity type, domain name)|→{partitions}
  • Domains are closely related to the notion of data partitions serving as a logical overlay on top of the physical partitions. In the simplest form, a domain could amount to nothing more than an alias for a specific partition of some entity providing a more user-friendly common-name in place of a physical partition identifier. For example, domain “UK” might map onto partition #8 for the Customer entity. However, a given domain for a given entity may span several partitions. More than one domain could coexist and overlap to represent the dissection of the enterprise along different dimensions (e.g., geographic and line of business). [0365]
  • Logical domain mapping may be stored in a directory service that would be used during find operations to identify all the physical partitions that are relevant for a given entity within a desired logical domain. When a partition is created after the fact, the partition can be assigned to one or more logical domains. [0366]
  • At runtime, the use of the logical domains is particularly relevant in the entity creator methods and the entity finder methods. It can be understood from the description of creating an entity as described with respect to FIG. 21 above, that there is no explicit notion of where to create it; the “where” question is answered implicitly by the entity container that the client has an interface to. With respect to the present invention, creator methods are introduced that allow the specification of where to create the instance. Each entity's create interface (implemented by the satellites) needs to supply a createInPartition( ) method that explicitly indicates the physical partition in which the new instance should be created. Also required is a createInDomain(String domain) method that allows the user to specify in which domain the instance should be created. This method would first use directory services to map the specified domain name onto the set of partitions that belonged to that domain. It would then use some policy (e.g., random selection or greatest available capacity) to select one physical partition from the set of qualifying partitions; the new instance would then be created in that partition. In accordance with a further embodiment of the present invention, a createInDomains(String[ ] domains) method searches the directory for all partitions belonging to all specified domains (intersection) to deploy a new entity instance in a partition that concurrently belonged to two or more domains (e.g., placing an entity simultaneously in Europe and Internet LOB domains). [0367]
  • In accordance with another embodiment of the present invention, another major area where domains would be visible in the user interfaces is in the complex finders for an entity. These find-by-criteria methods are given an extra argument for naming one or more domains to be intersected. The find operation is then performed in parallel out at all partitions matching the specified domain(s). The results of the parallel queries would then be coalesced and returned to the requester. [0368]
  • Externalization of Associations
  • The above-described data architecture externalizes relationships between entities using association data storage that is completely de-coupled from the participating entities themselves. This model departs from traditional relational practice of using foreign keys within entity tables to represent relationships, or the analogous object-oriented practice of “burying” object references within other objects. In essence, the entities themselves have no immediate awareness of the associations in which they participate. This knowledge is completely encapsulated within an outside authority, the association engine that manages the association and ensures that integrity constraints are not violated. [0369]
  • The externalization of associations is extremely flexible in that new associations may be added to existing entities as business models evolve. Thus, new entities can be introduced and associated with existing entities without any impact upon those existing entity classes or the instances themselves. This externalization is possible because neither the entity class nor the entity instance internally track any information relating to associating, or linking through association, to other entities. Rather, the external association engine is modified with association information (the links) for the additional entities which makes for an extremely loosely-coupled fabric of business objects. As an example of this flexibility, a new association can be easily defined to append supplementary information to an existing entity to support the needs of a new service. This is somewhat like object subclassing (inheritance), but is in some ways, more powerful. The supplementary information can even be applied after the fact to entity instances already in deployment which is not possible with object inheritance. Furthermore, externalized associations allow any objects housed in any store across the enterprise to be linked together with any other object in the enterprise. Externalized associations also have less rigidity in the face of evolving business models than does the conventional approach of realizing a data schema as foreign keys within entity tables. [0370]
  • The association engines that manage relationships between entities are built from reusable infrastructure. A number of different specialized association engines are supplied to support the different common association types. For example, specialized association engines will support the common cardinalities of one-to-one, one-to-many and many-to-many relationships. Another possible variation is the addition of an ordering property to one-to-many or many-to-many relationships which is useful in, for example, ordering the circuit legs that comprise the end-to-end path of a complete circuit. Other more specialized associations are possible, such as ternary associations linking triplets of entities. [0371]
  • The following pseudo-code gives a sketch of how an application programmer might find a Customer instance by primary key, then traverse a one-to-many association to fetch all the Account instances belonging to that customer: [0372]
    //
    // We assume an interface to a lookup service:
    Lookup lookup;
    // The Customer PK:
    long customerId = 1234L;
    // Use the lookup service to get a finder interface for
    // the Customer entity:
    CustomerFinder finder = (CustomerFinder)
    lookup.getService (“entity.finder.Customer”);
    // Use the lookup service to get the interface to the
    // Customer/Account association engine:
    CustomerAccountAssoc assoc (CustomerAccountAssoc)
    Lookup.getservice (“assoc.1-m.customer.account”);
    // Use the finder interface to obtain remote reference to
    // relevant Customer entity:
    Customer cust = finder.findByPkrcustomerId);
    // Traverse the association from the Customer source object
    // to obtain an array of all associated Account objects:
    Account [] accounts = assoc.getAccountsForCustomer(cust);
    // Exercise the functionality of the Customer and Account
    // objects through their remote interfaces:
    cust.dosomething ();
    // etc.
  • This sample code illustrates the use of class-level entity functionality through an entity's finder interface, the exercising of association functionality through an association engine interface, and the use of an entity's instance-level interface (i.e., cust.doSomething( )). The most striking aspect about this sample code is that the program asks the association interface to return the Accounts related to the Customer, rather than the more familiar object-oriented practice of asking the Customer object for its Accounts. Note that the entity and association engines and their storage might be physically located anywhere across the enterprise, while access should, nevertheless, remain this simple and transparent. Finally, the entity and association engines appear to the client as centralized services deployed somewhere “out there.” This centralization is purely logical . . . an illusion that hides the distributed, de-centralized nature of the implementation. [0373]
  • The above-described routine for navigating to all the Account instances belonging to a particular Customer instance based on the Customer's primary key will now be described in the NewWave environment with respect to FIGS. 29 and 30. FIGS. 29 and 30 are a diagram and a flowchart, respectively, depicting a process for fetching all the Account instances belonging to that Customer instance based on the Customer's primary key in accordance with an exemplary embodiment of the present invention. [0374]
  • With reference to FIG. 29, a diagram of NW service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention. There, [0375] entity servers 2902A and 2902B are shown with the respective databases 2904A and 2906A for server 2902A, while databases 2904B and 2906B are hosted by server 2902B. In the depicted Figure, each server has two VM containers 2908 and 2910 running, and each container has two NW partition services running within. Partitions 2908 and 2910 are responsible for two main things—retrieving one or more instances of a business object and creating a new instance of a business object. Typically, client 2940 would not directly invoke methods of the partition, but would utilize instead a satellite service. Notice that the Figure depicts four entity classes, A-D, representative of, for example, Customer, Account, Billing Address and Pending Order entity classes. Notice also that each of the entity classes is partitioned. With respect to the present Figure, each entity has two partitions, but in practice, most entities would have many more partitions. Each partition is responsible for a plurality of entity instances which are identifiable by a primary key. Also depicted is registrar 2930 which may be a domain registrar as described above with respect to FIG. 9. It is expected that the business objects normally used by a client are proximate to that client, thus a fair assumption is that all components represented in FIG. 29 are in a local domain, such as the local domains defined by a multicast radius as further described above with respect to FIG. 9. However, as has been alluded to above, and which will be described in greater detail below, a client may interact with business objects located anywhere in the enterprise, locally or non-locally. Thus, servers 2902A and 2902B may or may not be local, while registrar 2930 and finder 2932 are local to client 2940. However, the operations that each of these services perform might lead to hops in other non-local domains.
  • Also shown in FIG. 29 is 1:M entity [0376] A-B association engine 2934 which provides the logic and table resources for tracking all instances of class A (Customer class) to instances of class B (Account calls) through 1:M associations between Customer entity instances and Account entity instances. In practice, an association engine service will be available for the enterprise for each association between entities (similar to the association engines depicted in the E-R diagram on FIG. 16B). The table resource list links the instance between the Customer entity class A and the Account entity class B. Each time a customer makes a new enterprise account, a new Account entity is created in a partition and a link is added to engine 2934 from the customer instance to the newly-created account instance.
  • [0377] Finder service 2932 may be a satellite service which will be described below. Briefly stated, a satellite is responsible for two main things, finding existing entity instances and creating new entity instances of the business object. Satellites are helper services to a steward service that allocates blocks of primary keys to the satellites and locates a partition based on a specific primary key. It should be understood that in the enterprise there is only one steward for each entity class in the enterprise, but there might be many satellites distributed across the domain for that entity class whose purpose is to help the steward. Finally, FIG. 29 further depicts the interaction between components with lines that are representative of the correspondingly-numbered step in the flowchart depicted in FIG. 30.
  • With respect to the process depicted on the flowchart illustrated in FIG. 30, the process begins with [0378] client 2940 possessing a primary key that identifies a Customer entity instance for a customer. Client 2940, needing account information for the client, looks up the address (URL, URI) of the finder service 2932 in registrar 2930's lookup (step 3002). As discussed in great detail above, the registrar returns a proxy to finder service 2932 which allows client 2940 to interact with finder service 2932 (step 3004). A similar lookup is performed for the Customer/Account Association Engine service 2934 (step 3006) where an appropriate proxy is returned for client 2940 to interact with engine 2934 (step 3008). Client 2940 then uses the finder service to obtain a remote reference to the customer entity instance identified by the primary key (step 3010). With a reference to the Customer instance, client 2940 can access the data using one of the data access modes to be described below. Next, client 2940 conveys the Customer instance primary key to Association Engine 2934 which traverses its association table and returns references to all Account entity instances associated with (link to) the Customer primary key (step 3012). Alternatively, Association Engine 2934 might pass the primary keys to all associated Account entity instances making client 2940 responsible for looking up each key. Finally, client 2940 uses the reference to the Customer and client entity instances to exercise the functionality of the entity instances (step 3014).
  • Due to the pattern of relationship traversal implicit in a method like “getAccountsForCustomer( ),” the method returns all destination objects that are associated with a given source object. The complete set of entity instances may be more than necessary. A lack of filtering during a relationship traversal is a shortcoming of the proposed network-style of distributed data management in comparison to the full expressive power of the SQL “where” clause to narrow a join operation. One way of compensating for this shortcoming is to adopt the pattern of implementing narrowing or filtering methods at the class level in entity implementations. A narrowing method would take as an input an array of entity instance references, apply filtering criteria (probably using a SQL select), and return the filtered array of the subset of entities matching the criteria. With such a narrowing method available, the more restricted relationship traversal would be effected by calling upon the association engine to perform the initial traversal, then passing the resulting array of destination objects to the entity home interface for the narrowing operation resulting in extraneous remote calls and data passing. This pattern is illustrated in the following pseudo-code: [0379]
    // Find all accounts for given customer:
    Account [] accounts = assoc.getAccountsForCustomer (cust);
    // Look up the Account home interface:
    AccountHome acctHome =
    lookup.getservice (“entity.home.account”);
    // Filter the accounts to those older than 48 months:
    acctHome.narrowToOlderThan (accounts, 48);
  • As an alternative, a client could also sequence through the unfiltered array of accounts and perform its own filtering via some criteria; however, this approach is very network intensive. [0380]
  • A third alternative, mentioned above, is for the client to pass in a Java filter object to the association engine during association traversal. The filter is a serializable Java object, whole code is fetchable at runtime by the Java language infrastructure from its codebase URL. The association engine can apply the client-supplied, custom filter to an association traversal result set before returning the result set to the client. [0381]
  • Merely gathering a suitably-filtered solution set of entity instances is not the only challenge of the process described above. Another challenge to be overcome is that the architecture depicted in FIG. 29 is not overly scalable. Two factors thwart scalability after a certain point. First, there is an absolute threshold number of entity instances in an entity class that can be supported by [0382] association engine 2934. Beyond that number, performance is rapidly reduced. Secondly, the quantity of links between the entity instances is reduced. Obviously, this is not a concern with 1:1 cardinality association engines, but the performance of 1:M and N:M cardinality association engines drops off as the number of links increases. Moreover, 1:M and N:M cardinality association engine performance decreases as a nonlinear rate with increased entity loading because the possible number of links increases by M with the addition of a single entity instance to the data. However, before discussing solutions to the above-described shortcomings, data access and the role partitioning plays in system scalability will be discussed.
  • The Scaling Problem
  • As described above, extensive entity partitioning and distribution is central to the DataBus scalability strategy. Entities are scaled to nearly unlimited volumes of data by simply adding more and more partitions of relatively constant size in accordance with the present invention. However, as the volume of data grows, the central association engine must also expand to accommodate the new data and associations. However, at some point this growth becomes constrictive. The centralized nature of the external association engine architecture results in an overall reduction in DataBus navigation capacity due to bottlenecking inefficiencies inherent in handling the shear quantity of entity association requests with a correspondingly scaled central association engine for the data size. [0383]
  • In accordance with one embodiment of the present invention, the bottlenecking problem is alleviated by applying some of the same concepts in the central association engine that are applied to entities for scaling (i.e., the association engine is partitioned, or more properly, “fragmented” by partition). Fragmenting the association does two things. It decentralizes the association engine, allowing the association links to be kept proximate to clients that would normally use them, and reduce to a manageable amount the quantity of association links kept in any one location. [0384]
  • It should be understood that a link record exists to represent every pair of entities involved in an association describes an association relationship between two instances from the respective entities. Of course, with respect to the present invention, each of these instances must be contained in a separate partition (i.e., from the separate entities). Therefore, in accordance with an exemplary embodiment of the present invention, each of these link records is redundantly stored in two locations. The first link record is stored in an association engine fragment that is physically proximate to the entity partition where the source object is located. In fact, the engine fragment is logically coupled to that entity partition. The duplicate link is stored in a second location that is physically proximate to the entity partition in which the destination object is located. It is also referenced or coupled to the entity partition where the destination object resides. Thus, there is a fragment of the association link records co-located with respect to each entity partition. The association engine is logically central, but physically composed of fragments that may be widely dispersed. To traverse a relationship from a specific source object, the association fragment coupled to that source object's partition is used. Likewise, the association storage fragment coupled to the destination entity's partition is used for traversing the relationship in the backward direction. This approach to partitioning the associations allows both the association and entity storage to remain relatively constant in size as one adds more and more partitions. [0385]
  • The precise structure of the association engine fragments might be better understood with resect to the description of FIG. 31 which is a diagram showing external [0386] central association engine 3102 consisting of a plurality of link records which describe associative relationships between Customer entity instances and Account entity instances. A client merely accesses engine 3102 with a unique identifier for a Customer entity and utilizes the association link records to find any association relationships that might exist to any and all Account entity instances. In accordance with an exemplary embodiment of the present invention, external central entity association engine 3102 is “fragmented” into association engine fragments 3112, 3114, 3116, 3118, 3122 and 3124, one for each entity partition from the participating entities. Each association engine fragment is proximately coupled to a specific entity partition. In practice, a partition references its association engine fragment, though this record of links should remain physically close to the partition as the partition will call on the engine fragment for association link records. Association links between entity instances recorded in central engine 3102 are divided up between the partitions' engine fragments resulting in twice as many link records as in central engine 3102. This occurs because each link that was previously recorded for an association between two instances is now recorded in the partition's association engine fragment for each instance's partition. Notice t, although entity instances in central engine 3102 are identified only by their unique identifier (primary key), the entity instances in the engine fragments 3112, 3114, 3116, 3118, 3122 and 3124 are associated with a particular entity partition. It should be understood that this is merely an exemplary embodiment and that destination instances might be identified only by their unique identifiers because the client can always look up the partition container with a find service from the instance's identity as described elsewhere and above.
  • Storing link records in engine fragments for both the source instance and the destination instance results in doubling the amount of records to be stored. [0387] External association engine 3102 is depicted as having sixteen links between instances from two entity classes (thirteen instances in the Customer entity class and nine instances in the Account entity class). Thus, resultant association engine fragments 3112, 3114, 3116, 3118, 3122 and 3124 contain thirty-two association link records, thirteen link records for instances in partition containers for the Customer entity and thirteen link records instances in partition containers for the Account entity.
  • The quantity of association engine fragments corresponds with the total number of partitions between the entities. If, for instance, one of the participating entities (i.e., Customer) is divided into four partitions, and the other, Account, is partitioned two ways, then six association engine fragments would result. It should be understood that it might be possible for the instances in one or more entity partitions to not have associations with the instances in one or more partitions of a second entity. In that case, the total amount of records would still be twice that of the non-fragmented engine, but one or some of the resultant engine fragments would not have association link records. [0388]
  • With reference now to FIG. 32, a diagram of NW service platform infrastructure of interrelated services relating to an enterprise is illustrated in accordance with an exemplary embodiment of the present invention. FIG. 32 is identical to FIG. 29 and therefore will not be described further except to add that arrows depicting the interaction between DataBus components are shown with regard to the process described in FIG. 33. [0389]
  • FIG. 33, on the other hand, is a flowchart depicting a process for getting all accounts instances that are associated with an identified customer instance in accordance with an exemplary embodiment of the present invention. It is assumed that the client has already found an association service and has [0390] association proxy 3230 to interface with the service. The process begins by identifying the partition container holding the entity instance (step 3302). Although this might be accomplished via finder service 3232, as described above, this extra lookup is not necessary. The smart proxy that serves as a remote handle to an entity actually encapsulates a remote reference (typically an RMI stub) to the entity partition container, as well as other information like PK. In either case, the partition container must be found for the entity instance in order to locate the association engine fragment that is coupled to it (step 3304). Once the container is found, the interface to the coupled association engine fragment is gotten (typically via local registrar service lookup) and the Customer/Account association engine fragment traversed starting from the Customer instance to find all associated Account instances (step 3306). Those instances are then returned to the association engine (step 3308) which passes them on to client 3240 (step 3310). At step 3308, it is assumed that the remote interfaces are returned for the Account instances and the client interacts with the Account instances as need be. In one embodiment of the present invention, the link records held in the association fragment engines consist of the triplets (primary key, entity type, partition number) for both source entity and destination entity that are linked. In traversing the association, the association fragment engine must query its link record store for all link records matching a given source entity. Then, given a set of link records, it must resolve the PK, entity type and partition number for destination entities into remote smart proxies for those entities. This could be done via the multi-hop find-by-PK. In practice, we optimize this by caching, in the association fragment engine, a map from (entity-type, partition #) onto the remote RMI stub to the corresponding entity partitions. Should this stub lookup suffer a cache “miss,” the interface to the partition service is fetched via enterprise service lookup described above via a partition naming convention formed from the entity type and partition number. In either case, once remote reference to destination partition or partitions is available, the association fragment engine can request those partitions to return smart proxies corresponding to all the destination entities matching the destination PKs.
  • In accordance with another embodiment of the present invention, the client need only to be able to identify a particular entity instance to efficiently navigate to all data stores associated with that instance using the association engine fragments. Thus, a client merely invokes an assoc.getAccountsForCustomer(cust) method, just as described above with respect to the process depicted in FIG. 30. It appears to the user that they are exercising a remote interface to a central association engine, while there is in fact no such central association engine. This slight-of-hand is accomplished by using smart proxies, a concept we have already mentioned in a number of other contexts above. Thus, many of the steps described in the process immediately above are being performed out of view from [0391] client 3230.
  • Now, by way of contrast, the process described above from the flowchart in FIG. 33 will be described below, but using smart proxies. FIG. 34 is a flowchart depicting a process for getting all accounts instances that are associated with an identified customer instance using smart proxies in accordance with an exemplary embodiment of the present invention. The process begins with the client invoking a traversal method, assoc.getAccountsForCustomer (aCustomer), with the association engine (not shown). This method invokes logic local to the association smart proxy that queries the Customer entity argument (which is itself a smart proxy) for its primary key, partition identifier and its remote interface to the entity container where the actual Customer entity instance is stored (step [0392] 3402). The association smart proxy then makes a remote request to the Customer entity's partition container to traverse the “assoc.1-m.customer.account” association from the source entity with the given PK (step 3404). The Customer entity container has no built-in knowledge of how to traverse a Customer/Account association. Remember that in loosely coupled DataBus architecture, entities know nothing of associations, and new associations can be added at any time without breaking existing entities in deployment. The entity partition container can look up the interface to the association engine fragment for the association named “assoc.1-m.customer.account” which is paired with that entity partition (step 3406). The entity partition can also keep a cache of references to these association fragments so it does not have to go out to a lookup service every time. Once the entity partition has found the remote interface to the relevant association engine fragment, it forwards the association traversal request to that association engine fragment, which in turn can accomplish the relationship traversal (step 3408). The association engine fragment queries association database based on Customer PK and requests remote interface (Smart Proxy) for the separate account partition that holds instances associated with the customer. After the Account remote references are passed to the association engine fragment, they get passed back the invocation chain all the way to the requesting client (step 3410), thus ending the process.
  • One aspect of one embodiment of the association approach of the current invention is the novel use of smart proxies in the interfaces to the logical association engine services. In this embodiment, the association engines are accessed through a service interface that is implemented with a smart proxy that, itself, contains no inherent remote references (proxies in stubs) to a remote object. The association engine smart proxies “piggyback” on the communications channels of the entity smart proxies that are passed to it as parameters in “link( )” or “traverseAssociation( )?” requests. For example, when the association interface is told to “link” entities A and B, the association smart proxy will extract from A and B their remote handles to their respective partition containers. The smart proxy will then proceed to send parallel link requests (in separate threads) to these two entity containers, which in turn forward the requests to the appropriate association fragments. This is a highly novel and a typical example of the use of a smart proxy. It has no communications “channels” of its own, but rather “parasitically” employs the communications channels of objects with which it comes into contact. [0393]
  • Another feature of one embodiment of the present invention is the manner in which the virtual association engine deals with violations of cardinality integrity. Specifically, when a client requests that a one-to-many association add a new link record, the system must check for cardinality violations. Due to the asymmetric nature of a one-to-many association and the DataBus approach of partitioning entities, only the fragment engine on the “many” side can reliably detect a cardinality violation. A simple-minded implementation would serialize the link requests to the association fragments on either side of the relation, first to the “many” side, then only if successful, sending the link request to the “one” side. In one embodiment of the current invention, these link requests are forwarded in parallel (using two background threads) to the two “sides” of the association. If the “many” side detects a cardinality violation, it will throw an exception. The “one” side will, in any case, proceed to add a link record, all-the-while ignorant of whether doing so violates cardinality constraints. But all such link operations are performed under the oversight of a global transaction. Thus, when the caller of the (illegal) link request catches the cardinality exception, they will (according to the “contract” they are expected to obey) “roll back” the global transaction. The “one” side's inappropriate adding of an illegal link record will be effectively undone. [0394]
  • Management Operations Center Overview
  • The Management Operations Center (MOC) is an application for providing support for people addressing problems similar to those handled in a Network Operations Center (NOC), but not limited to only network problems. As such, it is intended to support problem management in many forms, including those typically handled by customer support centers and tactical assistance centers. The MOC represents a tool that assumes a fundamental re-engineering of the processes and tools used in these environments. It should not be compared directly against the tools that currently support these environments (trouble tickets, workflows, network management consoles, etc.), but should be analyzed as to how it supports the new re-engineered process. As such, it will not support many things currently expected in these environments because some activities are not needed. [0395]
  • The current NOC environment can be described in simple terms as an approach involving monitoring of activity, identification of problems, selection of problems to work on off of a queue, and resolving the problem. By contrast, in accordance with an exemplary embodiment of the present invention, the MOC monitors and identifies problems based on rules set up by experts. Additionally, rather than an ad hoc personnel deployment, the MOC determines the best available personnel for a particular problem based on circumstances and policy rules and then directly invites those persons to work on the problem. Therefore, the work team is composed based on differing roles and skill sets required for the problem, and might involve people from different organizations. Because the MOC is an integration of services, the MOC is able to handle problem cases that are not limited to one area, as is the practice of Network Operations, but to any affected areas. For instance, a problem may bind together a network event, customer tickets, application events, etc. Finally, in accordance with an exemplary embodiment of the present invention, a work event can be worked on and accessed by anyone with connectivity to the NewWave environment, so people involved do not have to be in one center, but could be at home, on the other side of the world, etc. Thus, in stark contrast with prior art attempts, the MOC's emphasis is on collaboration tools and world-wide access. [0396]
  • Operations support systems today tend to be large, closed applications that perform part of the work needed by OSS personnel. OSS personnel usually end up using several systems that overlap and do not talk to each other. As opposed to a closed application that provides merely a partial solution, the MOC of the present invention represents an example of a new way of designing applications: the inside-out design. In this approach to building systems, rather than building monolithic application systems, the “application” is a collaboration of many smaller units acting on common objects, possibly without knowledge of each other, but with their actions affecting each other. This design also makes heavy use of rules external to code executed by rules engines or policy specific objectives. This allows for changing the behavior of the system without changing the code. Those behaviors which represent organizational policy are removed into rules, and can then be managed by experts in those organizations. [0397]
  • FIG. 35 is a diagram of the MOC and associated NewWave services necessary for collecting events into policy-based work documents, and then directly routing work to the best currently available operations staff that is automatically assembled based on the individual staff members' aptitude for particular tasks in a process flow in accordance with an exemplary embodiment of the present invention. The primary MOC component services are [0398] assessor 3504, aggregator 3506, workspace 3502, dispatcher 3508, distributor 3510, avatar 3512, archive 3514 and work rendezvous 3516. Before describing the other aspects of the MOC, the functionality of each of the above identified MOC services will be briefly described. Assessor 3504 initially receives most events from pub/sub bus 3528 and applies operations-specified policy to the treatment of those events using, for example, a rules agent in a commonly shared rule server. Authorized operation staff can change and update policy rules in near-real time using behavior service 3530 described below. Highly distributed and individually customizable, typically many (customized) assessors will exist in the MOC system, thus allowing different treatment of events by different operations teams.
  • [0399] Aggregator 3506 receives event information from pub/sub bus 3528 and assessor 3504 which it associates and binds together according to an operation's requested organization of work integration to produce work document 3630. Aggregator 3506 also provides real-time binding of associated corporate business objects to the document including binding an event to many different documents. To that end, aggregator 3506 contains the templates for documents for, for example, different functional areas/teams. Additionally, many different aggregators will exist and run simultaneously providing different work documents to different teams. Dispatcher 3508 applies current policy rules to associate work documents and events with specific operators, customer contacts and other service care staff. Dispatcher 3508 assigns work with an understanding of who is free and able to do that work and implements priority rules for understanding relative priority, thus dispatcher 3508 can bump work in progress for higher priority tasks. Additionally, dispatcher 3508 implement alternates strategies to handle cases where work is refused or overdue. Distributor 3510 handles outbound and remote communication notifications for the MOC based on decisions from dispatcher 3508.
  • Each [0400] avatar object 3512 represents a virtual image of a specific operator's or customer contact's skills and responsibilities. Operators, provisions, customer contacts, service support staff and any other management-tasked staff in the customer and network care environment will have an avatar. Avatar 3512 provides the MOC with a skills assessment of care staff including reference to a history of past work, interactions and success ratings and a means for contacting and communicating with these individuals.
  • [0401] Archive service 3514 updates and otherwise modifies work documents for or in storage based on recent experiences. Finally, work rendezvous 3516 associates later arriving processed events with events that initially generated a work stream/task. With this service, different people working on the same route or associated task can learn of the complementary work going on. Rendezvous 3516 notifies different work documents about all other references to a common event and associates processed events with a work document that contain a reference to the source event. With respect to FIG. 35, the GIB services have been discussed thoroughly above and will not be discussed again.
  • The key features of the MOC design are: [0402]
  • Rather than a single monolithic application, the MOC employs an inside-out design in which many small components act largely independently of each other, but affecting each other by: [0403]
  • directly interacting with shared resources; [0404]
  • registering for notification of updates to shared resources; [0405]
  • finding each other and communicating via the GIB services of registration and lookup; and [0406]
  • publishing messages over the GIB publish/subscribe bus; [0407]
  • Providing a mechanism wherein automation and current policy can be applied to managing process; [0408]
  • Providing a team to analyze the situation and effect the solution, rather than a succession of individuals, doing a piece and handing off to the next in line; [0409]
  • Providing a server side, peer-to-peer interaction environment in which all participants can access the same, real-time information. [0410]
  • In general, the overall behavior of the MOC can be changed by adding new components, work templates, or changing policy rules, without directly modifying existing components. All MOC components are NewWave services, using the NewWave registration, lookup and enterprise lookup services. The MOC extends the behavior of its code through the use of external rules engines using the NewWave behavior service. This allows organizations with the expert knowledge of operations support to be in control of the behaviors implementing operations support policy, instead of programming organizations. The MOC must communicate with systems outside of its direct control. It uses XML messages sent over the GIB publish/subscribe buses to do so in a highly decoupled way. In this way, it uses a common approach for receiving events from disparate sources: external sources such as the network, customer service systems and legacy systems; and internal sources such as MOC or NewWave components. Events received are assessed by an assessing component. It is the job of this assessor to apply organizational policy dealing with how a event should be addressed. [0411]
  • Work documents are constructed by an aggregating component. It is the job of this aggregating component to put together a document (a software construct) containing what information is needed to resolve the problem, including aggregating related network, customer and application events, setting initial milestones, applying rules which deal with the understanding or categorization of the problem, and binding in related information (such as necessary topology information). Work documents are first class objects accessible through the NewWave DataBus. They are not just data, as they have a controlling feature that allows state changes throughout its life. All components are able to interact with and change it using distributed transaction semantics. [0412]
  • People are invited to participate in work groups by a dispatching component running dispatching rules. It is the job of this dispatcher to apply organization policy dealing with who should deal with a problem. [0413]
  • People are represented by in-memory “avatars” which are responsible for knowing the manner in which to communicate with the person, that person's current workload and information about the person. Technologies for communication are encapsulated within the avatar, allowing other components to not be knowledgeable about or bound to those technologies. An avatar is a first-class object running as a service and can be found and interacted with using standard NewWave techniques. A workspace (FIG. 39) is the interaction, peer-to-peer, of those services about a single work item. [0414]
  • FIG. 36 is a functional diagram of the MOC depicting interactions between key MOC components which interact in accordance with an exemplary embodiment of the present invention. Note that FIG. 36 contains component representations from the MOC, NewWave infrastructure and [0415] rule agents 3632. The MOC is responsible for coordinating the response to events which occur within individual components bound into workspace 3640 developed for the NewWave environment. Components in workspace 3640 might be NewWave-enabled devices, and applications and services developed on NewWave or are detected by NewWave surrogates for external systems, for instance, agents monitoring devices or other resources, and bridges to legacy (non-NewWave) systems. None of these components and surrogates have any special knowledge of the MOC or its functionality and thus are not modified in any special way to interact with the MOC. These components and surrogates are responsible only for knowing when a problem has occurred, and for publishing an XML document describing the problem on the publish/subscribe bus. The only coordination which occurs between the MOC and components 3630 is in the definition of the XML document and the topic that it is published with it.
  • To make any component able to be supported by the MOC, it must be able to interact with the MOC components, even though [0416] components 3630 do not have any specific know-upon format and transmission media. To that end, any component wishing to be supported by the MOC must publish events to the GIB publish/subscribe bus, or to an external publish/subscribe bus with a bridge to the GIB, shown generally as pub/sub service 3618. Each event message must use an agreed-upon XML schema for the format and follow an agreed-upon structure for the topic of the event message.
  • The precise XML document standards are not important for the purposes herein, but some exemplary events are listed below. [0417]
  • FMEvent XML (Fault Management Event) XML document, topic ngn.nfp.fm; [0418]
  • Application Event XML document, topic ngn.service.admin; [0419]
  • Customer Service Event XML document, topic ngn.customerservice; and [0420]
  • UUNet Ping Alarm FMEvent XML document, topic ngn.uunet.fm. [0421]
  • Building a Work Document Describing an Event
  • Assessing Events [0422]
  • When events are received by the MOC over publish/[0423] subscribe bus 3618, they are optionally received by assessor 3604. An assessor is responsible for applying organizational policy dealing with how the organization responds to events of that type. An organization may set policy saying that certain events are ignored; others are problems that must be addressed immediately, etc.
  • Simply put, [0424] assessor 3604 runs rules agent 3632 against an incoming event received from publish/subscribe bus 3618. In accordance with an exemplary embodiment of the present invention, assessor 3604 determines, based on the rules, whether the event is a primary event, which must be investigated and then classified by type. The function of assessor 3604 is then entirely dependent upon the rules that are set up and executed by the rules engine. These rules would be defined by experts in an organization or set of organizations responsible for handling problem events. An exemplary rules engine for implementing policy based rules is Brokat Advisor and the Brokat Advisor Server (both available form Brokat Aktiengesellschaft Industriestrasse 3, D-70565 Stuttgart, Germany). Because the present invention is supported by the NewWave infrastructure, and relies on remote loading of services which in some forms rely on the Java programming language, a rule engine that is also written in Java would better match the operating environment of the MOC in its use of the mobile rules agents.
  • Referring to FIG. 37, an assessor is depicted for assessing events based on organizational rules in accordance with an exemplary embodiment of the present invention. Notice that the present invention envisions implementing rules in the normal manner by developers in [0425] development 3710. However, the present invention recognizes that the developers are not always the best implementers for rules, nor the timeliest, especially those based on organizational policy, such as from operations 3712. Therefore, the rules may be adjusted, modified, supplemented or even replaced by experts in an organization or set of organizations responsible for handling problem events at, for instance, code server 3720. Code server 3720 then serves up the rules to rules agents in behavior service 3730, which are fired whenever an event is received.
  • Work Item Aggregation
  • The primary process involves building the case, involving the separate activities of: [0426]
  • 1. the correlation of the primary event and related events into a single bundle; [0427]
  • 2. the building of a work document containing the bundled events and the other related information; [0428]
  • 3. the running of rules designed to help determine the cause of the problem; and [0429]
  • 4. the control of the life of the work to be done including coordinating the actors involved in the process. [0430]
  • A common approach used in both cases to alert the MOC of an anomalous condition is the NewWave publish/subscribe service. As described elsewhere, the publish/subscribe service is part of the NewWave GIB and represents a contract between components for sharing information. [0431]
  • Many separate aggregators will be generally deployed within the MOC. It is entirely reasonable for an aggregator to begin work before the assessor, bringing the case up to a certain point to give the assessor adequate information to make its assessment. Then, it could continue its work conditional on the assessment. [0432]
  • The basic design of an aggregator is shown in FIG. 38 in accordance with an exemplary embodiment of the present invention. FIG. 38 also describes the basic workings of [0433] aggregator 3606 in accordance with the present invention. Accordingly, events flow into aggregator 3806 and pass through a “gate,” logic gate 3748, which applies some logic to determine whether this event represents a new or existing opportunity for packaging work. Logic gate 3748 acts as a logical IF to determine if the event represents new or existing opportunities.
  • If new, [0434] aggregator 3606 starts a new state machine, and the associated bucket for collecting events and data, depicted as state machine 3850, for controlling the work. It must select a template 3848 (FIG. 38) for the state machine that is appropriate for the particular event. For instance, a failure of a Sonet Ring would be handled differently than a failure of a modem. In the MOC, the state machine is a micro-workflow and description of the life cycle of a telecommunications process. State machine 3850 performs a number for functions regarding the event, including determining other related events needing to be bundled with the primary event and what events would signify closure of the primary event. Additionally, the state machine might need additional information so the state machine must be equipped to determine the additional information that is needed, such as topology or customer service level agreement (SLA). Finally, the state machine 3850 must determine what milestones in the life of a particular event are important. The state machine, the events that are to be associated, the milestones, the means of gathering additional information is represented in the template.
  • If, on the other hand, the event represents an existing opportunity, [0435] aggregator 3606 joins the incoming event to running state machine 3850 that has expressed interest in it. At some point, the state machine ultimately produces a work document and makes this document known (publishes it) to other components via distributor 3810. In accordance with another embodiment of the present invention, a behavior engine (rules engine) can be used both to implement logic gate 3848 and by the state machine to control its actions or to provide some root cause analysis of the problem.
  • FIG. 39 is a diagram of a simplified version of a workspace showing a controlling state machine in accordance with an exemplary embodiment of the present invention. Many separate workspaces may exist simultaneously. [0436] State machine 3850 controls the actual work in the aggregator.
  • As can be seen in FIG. 39, [0437] state machine 3950 is responsible for receiving incoming events, binding them together (the tree of E's in the figure) and responding to any state change as a result of the new event, or binding information into the work document (the network of circles in the figure). State machine 3950 continues operating until closure conditions are reached, which may be based on completeness or time elapsed. Then, state machine 3950 publishes the work document in some manner (for instance, persist on DataBus or publish via publish/subscribe) and in some agreed-upon form (for instance, XML document or Java objects).
  • The aggregator may be implemented in a number of different ways, even by the functional workings of the other services (i.e., in accordance with one embodiment of the present invention, there is no physical component called the aggregator). When a work task is always present, a resource manager can create the required number of workspaces and state machines. In that case, [0438] state machine 3950 subscribes with the publish/subscribe bus for the events in which it is interested. As such, state machine 3950 receives the events directly without going through a “gate,” thus performing the join function implicitly. Additionally, the MOC rendezvous service, discussed below, is used to prevent an event which has gone directly to state machine 3950 from also causing the creation of a new state machine, thereby also performing the gate function. Finally, the assessor is allowed to create the state machine if the event is determined to be primary and the rendezvous service says it is not being handled already, thus performing the start function of the aggregator.
  • State machines are a common way of handling a process that goes through many states and responds to events, with the response being dependent upon the current state. Many implementations of state machines exist and many that may be applicable to the present invention could have been used here. The MOC implementation follows along somewhat non-traditional lines because the state transactions are not complex, but the determination of the event coming in is. The implementation, then, does not optimize the state transition (as one would see in, for instance, a source code parser). [0439]
  • In the normal course of action, the state machine continues operating for the life of the work. This is necessary because, even after the document is produced, related events will still keep coming in and need to be joined to the existing work document. Rather than create a new component for doing this function after the work document was created, the state machine continues to live on its own for: [0440]
  • care staff—skills assessment; [0441]
  • customer and network care staff—a reference to history of past work; [0442]
  • interactions and success ratings (knowledge base); [0443]
  • data on domains of responsibility (assignments); [0444]
  • physical location; and [0445]
  • availability. [0446]
  • One exemplary state machine is implemented as an extension of the base class WorkItemActor. The particulars of this exemplary implementation are that the publication of the document is done through publish/subscribe and after publishing the document, the state machine does not go away. [0447]
  • With respect to a given enterprise, many [0448] state machine templates 3852 should be developed to handle different classes of problems for the enterprise that share characteristics. With respect to the WorkItemActor state machine example where the enterprise is a telecommunications company, state machines might be developed to handle, for example, SonetLinearFailure, ModemReset, StandbyRequest, and ApplicationRestartFailure. An XML template can then be used to describe the control differences between state machines. The template document contains the settings for milestones, related events, and information to be bound in.
  • Event and Work Item Rendezvous
  • As mentioned above, the MOC depends on a rendezvous service to tell if an event is being handled by a work item (or a state machine controlling a work item), represented in FIG. 36 as [0449] rendezvous 3616. A rendezvous service is responsible for determining if a given event is already being handled and if the problem represented by a work item document overlaps with an existing work item document. It then routes that event to the proper work item. The client role of the rendezvous service dynamically registers work-items for subscriptions to related events. It also finds if any specific event is already registered in the service register as being processed by a state machine/workspace. The server side continuously skims the service register for work items which should be informed of each other or joined into one work process unit.
  • As with many other MOC components, many rendezvous services can be deployed simultaneously in a MOC environment. [0450] Rendezvous service 3616 can use rules to make its determinations, or any appropriate logic. Different rendezvous services may be deployed with different rules for determining overlap by different parameters. For instance, different services could consult different views of topology, for instance, one service could look at layer 2, a second a layer 3, a third looking only at cross domain interactions. By deploying many such rendezvous services, and by allowing work documents already started to be merged together, it is not necessary to apply all rendezvous rules before starting work. Therefore, some rendezvous rules could be quite slow and still result in alerting people to the fact that a problem spans multiple areas. Asynchronous processing allows parallel work to occur in a dynamic environment, at its own pace, and then be merged with other work upon reaching a certain resolution.
  • In accordance with an uncomplicated implementation of [0451] rendezvous service 3616, it applies simple rules to determine if an event has been handled and if there is overlap between different work item documents. Rendezvous service 3616 dynamically subscribes with publish/subscribe services to be made aware of any new work item document as the item is created (but before it is published for all). Rendezvous service 3616 pulls the events off of the document and keeps an index of events based on their type and based on the network element affected. Whenever it is asked about a new event, it can compare the new event against the network element to see if any existing work item document references that element.
  • The Work Document
  • [0452] WorkItem 3630 in FIG. 36 holds all of the objects, or references to the objects, associated with the item of work (i. e., the problem described in the initial event that is being addressed). In accordance with an exemplary embodiment of the present invention, WorkItem 3630 will have many types of objects, bound in, including:
  • events—the primary event and associated/correlated events; [0453]
  • status information describing the current state of the problem resolution, for instance, status, probable cause, priority, time to resolve, actual cause; [0454]
  • informational objects, such as: [0455]
  • customer information and service level agreement information; [0456]
  • topology information; [0457]
  • basic instructions regarding the problem; [0458]
  • progress notes; and [0459]
  • sundry information such as configuration information on the elements in question; [0460]
  • user avatars for the people participating in the work group; [0461]
  • proxies to devices or services related to the problem, for instance, a proxy to the device or agent for the device that is reporting the problem; and [0462]
  • tools needed to resolve the problem, including collaboration tools for interacting with the work group, or getting information about the problem elements. [0463]
  • It should be understood that some of the information in [0464] Workspace 3940 and Work Item 3630 are required to be persisted permanently, or for some time, while other objects need only be in memory where they can be accessed. In accordance with one embodiment of the present invention, the work document is the DataBus-enabled WorkItem (implemented, according to DataBus standards, as the WorkItemBean class and related classes). There, WorkItem 3630 is completely persisted on the DataBus. With respect to an alternative embodiment, a technique similar to the Jini Registrar and the Jini JavaSpace is employed for storing any serializable object and also attaching external “attributes” to be used when looking for the object (a serializable object, as described above, is an object which Java is able to “serialize” the object in a form suitable for storing or transporting across processes—this is a standard Java technique). The external attributes are selected by the storer.
  • The Workspaces
  • Similar to [0465] WorkItem 3630, the MOC design has the concept of the work group space Workspace 3940, a space for the work group collaborating on a problem to share relevant objects. This allows the client's avatars to interact as if the workspace were a peer-to-peer environment. One implementation is to convert WorkItem 3630 into an in-memory work group space with a simple interface for finding objects and retrieving them, and a persistent work item document for persisting data about the work item. This is an in-memory shared space capable of holding objects that the participants may need, including:
  • the work item document itself; [0466]
  • proxies to user avatars for communicating with other participants; [0467]
  • work flow objects; [0468]
  • an active object controlling the lifecycle; [0469]
  • proxies to intelligent devices and agents for devices to directly interact with these devices; [0470]
  • user interfaces to access the work item information (allowing different user interfaces for different roles—technical support, customer support, etc.); and [0471]
  • collaboration tools. [0472]
  • The work group space must support the putting of objects into and the getting of objects from the space, the remote downloading of the classes needed to use the objects, the registration for and notification of events relating to the objects, and the tailoring of the contents of the space to the particular problem using rules. These concepts are features of the NewWave infrastructure and GIB architecture, and are easily implemented. Alternatively, with the exception of the rules, this resembles the responsibilities of a Jini JavaSpace, which could be also used as a component in implementing a workspace. [0473]
  • [0474] WorkItem 3630 is very similar to the work space concept of the present invention and performs most functions of the work this function; however, as a DataBus object, WorkItem 3630 is not practical to support those objects that are not really intended to be persistent. In accordance with an exemplary embodiment of the present invention, there are three alternative implementations of the work group space. The first implementation is a NewWave service, described in detail above, registers itself in the domain registrar and the enterprise repository. This implementation allows the work group to be accessed via normal administrative tools for services; however, large numbers of work group spaces could get unwieldy. A second implementation involves creating an in-memory DataBus object. This would scale well to large numbers, but would not be directly accessible via normal service administrative methods. Finally, the work group can be implemented as a JavaSpace. This would require the addition of proxies so that one JavaSpace could service a number of work group spaces.
  • Creating a Work Group to Handle the Event User Avatar Service (User Proxy)
  • In accordance with an exemplary embodiment of the present invention, contacts (e.g., Operators, Provisions, Customer Contacts, Service Support staff, any other management-tasked staff in the customer and network care environment, Customers, etc.) may participate in the resolution of, or may need notification of, [0475] WorkItem 3630. As such, it is necessary to understand what the operations staff is currently working on real-time, what the task priority is, and when is it due to be completed—workload, and how to route messages and work to a contact.
  • In some cases, additional information is needed in order to support the dispatching function of the MOC: [0476]
  • for care staff—skills assessment; [0477]
  • for customer and network care staff—a reference to history of past work, interactions, and success ratings (knowledge base); [0478]
  • data on domains of responsibility (assignments); [0479]
  • physical location; and [0480]
  • availability. [0481]
  • Contact data can then be saved in an appropriate location, for instance, persisted within a Contact DataBus Entity. [0482]
  • The user avatar is a representation of a person as a service, invoke-able by other software services; a virtualization of the individual, the current state of the individual and the current interface to the individual. In accordance with an exemplary embodiment of the present invention, a user avatar, depicted as [0483] user avatar 3604 on FIG. 36 represents a virtual image of a specific operator's or customer contact's skills and responsibilities. A user avatar is depicted as user avatar 3604 on FIG. 36 that serves as a proxy for a contact within the MOC. Optimally, each contact has an associated user avatar. This concept is better understood with respect to FIG. 40 that depicts a user avatar in accordance with an exemplary embodiment of the present invention.
  • Lookup [0484]
  • Each [0485] UA 4012 registers in registration service 4022, which may be a domain registrar, started with group “Users.” UA 4012 is registered with attributes including primary key (PK), login ID and name. Any service requesting information from, or sending messages or work to, UA 4012 locates this proxy using existing NewWave protocols for lookup described above.
  • Contact DataBus Entity [0486]
  • [0487] UA 4012 is initially populated from the Contact DataBus Entity stored in DataBus 4024. Once created, UA 4012 has the ability to synchronize its data with the DataBus. Additionally, UA 4012 provides “helper” convenience methods so that data persisted with the Contact DataBus Entity can be accessed through UA 4012.
  • Contact Means [0488]
  • As a proxy to the contact, the User Avatar knows all available contact means for a contact and is responsible for forwarding all communications, messages and work to the contact via the appropriate contact mean(s). All logon/logoff requests from the WorkSpace applet (GUI) will be made through [0489] UA 4012. A remote proxy to the WorkSpace will be retained as an available contact mean after a “logon” request from the WorkSpace GUI has been successfully processed. Likewise, all logon/logoff requests from the PDA service will be made through UA 4012. Again, a proxy to the PDA Service will be retained as an available contact mean once a “logon” request from the PDA service is successfully processed. Other contact means supported by the current implementation include text messages sent to pagers via email, text messages sent to cellular phones via email, and email.
  • [0490] UA 4012 is also responsible for determining whether a message should be sent via one or more available contact means. This determination is made by evaluating the priority of the message or work. More urgent messages may be distributed via multiple, or even all, available contact means.
  • Workload [0491]
  • In addition to providing a communication vehicle for a Contact, [0492] UA 4012 knows what a Contact is currently working on (workload). Workload is primarily used by dispatching function 3608 to determine the “most available” Contact to participate in the resolution of a WorkItem. Workload is provided by the UserAvatar as XML. Again, workload is defined as what the operations staff is currently working on real-time, the task priority, and when is it due to be completed. Individuals can be participants in more than one workspace at the same time. The UA sees/stores this collection of work of an individual and the workspace client for an individual can reference any work-item for which an invitation is active and/or accepted.
  • Subscriptions [0493]
  • [0494] UA 4012 has the ability to publish and subscribe via the GIB's pub/sub bus 3618. In the MOC, UA 4012 subscribes for WorkItem status changes so that UA 4012 can forward status change messages to the Contact via the available contact means. Contacts also subscribe for items of interest within the MOC via their established contact means. These subscriptions are established with UA 4012 as profile information. Once UA 4012 receives a subscribed item, it is responsible for forwarding the corresponding messages in the proper format to the Contact via the established contact mean(s).
  • Statistics [0495]
  • [0496] UA 4012, just as every other MOC service, implements the MOC's Service Admin interface, and provides statistics as XML including health/heartbeat, and additionally, the MOC specific statistics such as workload and profile information (current subscriptions, contact means, etc.).
  • Avatar Service (Generic Service)
  • In the MOC, [0497] avatar service 4013 serves as a container for UA(s) 4012. Optimally, one avatar service is deployed for each Contact logical domain. Avatar service 4013 has all of the behavior associated with a NewWave service and therefore can initially create and register (with the domain registrar) the user avatar(s), in addition to maintaining user avatar(s) leases with the registrar. Finally, avatar service 4013 provides convenience methods to the DataBus for the user avatar synchronization functions.
  • Dispatcher Service [0498]
  • As discussed above, the GIB architecture implements “policy-based” rules that can be modified in “near-real-time” to handle predicate logic requirements. Various off-the-shelf services might be integrated into the GIB architecture to provide this functionality (i.e., the Brokat product(s), Advisor Builder and Advisor Rule Engine). Below is an exemplary description of the function of the dispatching rules in accordance with an exemplary embodiment of the present invention. It should be understood that the account detailed below is merely exemplary and any specific policy might be applied to any policy based MOC component. Also, policy can be implemented in any rules agent as a relocatable service, including as a java object. [0499]
  • It should also be noted that the data, rules, subscriptions, and templates for this described exemplary implementation of the dispatcher service have been limited in scope to a particular telecommunications challenge business scenario to aid in explanation (actual rule sets can be quite large). As such, this explanation is intended to describe this service as a participant in the Management Operations Center (MOC). No attempt has been made to describe all data, rules, subscriptions, and templates needed to support all policy functions necessary for the MOC. [0500]
  • The Dispatcher Service (GenericGIBService) provides the MOC the ability to: [0501]
  • 1. apply current policy rules to associate work documents and events with specific operators, customer contacts and other service care staff; [0502]
  • 2. assign work (WorkItems) with an understanding of who is free and able to do that work; [0503]
  • 3. understand relative priority and can bump work in progress for higher priority tasks; and [0504]
  • 4. identify Customer Contact(s) that should be notified of WorkItems based on their Service Level Agreement (SLA). [0505]
  • The Dispatcher Service accomplishes the above stated objectives by implementing the following functions: [0506]
  • 1. Register to Receive WorkItem Change Events via the Publish/Subscribe Bus. [0507]
  • As a GenericGIBService, the Dispatcher Service inherits the ability to participate in the publish/subscribe bus. Upon service start-up, the Dispatcher Service registers as a subscriber for WorkItem Events that include, but are not limited to: [0508]
  • WorkItems that have had a status change such as “opened” or “escalated”; [0509]
  • WorkItems whose key information has changed requiring a rerun of the dispatching rules; [0510]
  • Invitations to participate in a WorkItem that have been “declined” by a candidate Contact; and [0511]
  • Invitations that have “expired” (i.e., not accepted or declined by a candidate contact), and need to have an alternate contact assigned to the associated role. [0512]
  • Once the Dispatcher Service receives a WorkItem Event, it is ready to run the dispatching rules. As a GenericGIBService, the Dispatcher Service inherits the ability to directly interface with a behavior (rules) engine. The current Dispatcher Service implements the Brokat products to define, via Brokat Advisor, and then process, via Brokat Rules Engine, the dispatching rules. [0513]
  • 2. Run Dispatching Rules. [0514]
  • The Dispatcher Service passes the WorkItem to the rules engine for processing. Upon receipt of the WorkItem, the dispatching rules must determine which rules, e.g. rules agent, to run based on the type of WorkItem Event. It is important to understand that this function would run at every milestone in the controlling state machine. In most cases, the first task is for the rule engine to determine: [0515]
  • 1. Identification of Contacts that need to Participate in the WorkItem. [0516]
  • The dispatching rules are responsible for determining which contacts need to be invited to participate in, and ultimately resolve, the WorkItem. In order to define the participation needed to resolve the WorkItem, rules identify roles to be filled by “appropriately skilled” Contact(s). The roles are determined by rules that evaluate the WorkItem's data. Although the WorkItem contains comprehensive information, the event data currently evaluated by the dispatching rules for the purpose of determining roles includes: [0517]
  • the primary event type; [0518]
  • the primary event location; [0519]
  • the type of equipment involved; and [0520]
  • the severity of the primary event. [0521]
  • An example of the roles identified, via rules, for a Sonet Linear Failure network event have been included BELOW: [0522]
  • if the currentWorkItem.primaryEventType “Sonet Linear Failure”[0523]
  • assign role=“Router Technician”[0524]
  • assign role=“Customer Service Representative”[0525]
  • assign role=“Transport Engineer”[0526]
  • assign role=“Dispatch Truck”[0527]
  • assign role=“Supervisor”[0528]
  • end if [0529]
  • In addition to evaluating the event data on the WorkItem, the dispatching rules evaluate customers who have been impacted by the event(s). Impacted customers and their corresponding Service Level Agreement information have been bound into the WorkItem prior to receipt of the WorkItem by the Dispatcher Service. The dispatching rules determine whether direct customer participation in the WorkItem is required. Additionally, the dispatching rules determine whether it is necessary to assign a Contact specifically to the impacted customer. The customer participation rules evaluate: [0530]
  • the customer's Service Level Agreement (SLA) to determine whether their notification of the WorkItem is required; or [0531]
  • whether the customer has been located on the customer service special handling list. [0532]
  • A WorkItem status change may identify additional roles through the involvement of additional rules. In the case of the milestone, WorkItem “escalated” status change, management and more highly-skilled personnel may be invited to participate in the WorkItem via the dispatching rules. [0533]
  • Once the roles have been identified by the dispatching rules, a second set of rules are run to determine the “most appropriate” Contact(s) to fill the roles. Contacts can be defined as interested parties, not limited to people, that have been identified by the dispatching rules as being available for participation in a particular WorkItem. In order to determine the “most appropriate” Contact(s), the dispatching rules perform pattern matches on Contacts' characteristics. In this exemplary Dispatcher Service implementation, the dispatching rules define Contact characteristics as: [0534]
  • skills—Does the Contact possess the appropriate skill type and level to fulfill the role?[0535]
  • experiences—Has this Contact solved this problem or a problem like this before—history?[0536]
  • assignments—Is this Contact currently assigned to this Customer, Vendor, System, or piece of equipment?[0537]
  • physical location—Does the fulfillment of this role require physical proximity to the event location?[0538]
  • availability—Does the Contact's current workload allow participation in the WorkItem?[0539]
  • 2. Invitation Creation [0540]
  • As each candidate Contact is identified by the rules, a function is invoked to create an Invitation object and bind it to the WorkItem. Each Invitation contains base WorkItem information, such as event type, priority, contact's proposed role, contact's ID and WorkItem ID. The initial invitation status is “ready for dispatch.”[0541]
  • 3. Instructions/Scripts Bound into the WorkItem [0542]
  • The dispatching rules evaluate the roles, customers' SLAs, and event information to determine whether instructions or scripts need to be bound into the WorkItem for the candidate contacts. Once all contacts have been identified, invitations have been created, and instructions have been bound into the WorkItem, the dispatching rules engine returns to the Dispatcher Service for further processing. [0543]
  • 3. Dispatch the Invitation to the Contact's Proxy. [0544]
  • The Dispatcher Service queries the WorkItem for a list of invitations that need to be dispatched and then performs a registrar lookup for the Contact's proxy (UserAvatar) by Contact ID. Upon return of the contact proxy from lookup, the Dispatcher Service performs a “send” request passing the invitation. The contact proxy is responsible for determining where the invitation should be sent and how it should be formatted. [0545]
  • Distributor Services [0546]
  • In accordance with an exemplary embodiment of the present invention, messages in the Management Operations Center (MOC) need to be distributed to contacts. Within the MOC, messages take several formats: XML, HTML, text, and direct communication with a remote proxy. The messages may be disbursed via a variety of communication mechanisms: PDA, email (WorkSpace servlet), pager, mobile phone, and WorkSpace GUI Client (applet). [0547]
  • In order to support the MOC requirement of distributing messages to Contacts using such varied communication mechanisms, adapters have been developed by the team. Adapters are Generic Services that register with a domain registrar. As Generic Services, they inherit all associated behavior. Two such adapters are described below. [0548]
  • Distributor Message Service [0549]
  • The Distributor Message Service of the MOC is responsible for distributing messages via email. This exemplary implementation of the Distributor Service implements the Java Mail classes and distributes messages to mobile phones, pagers, and email. [0550]
  • The Distributor Service implements a simple interface with one public method for sending messages. The send method takes two parameters, the first indicating whether the message is to be sent in HTML or text format, and the second parameter is the message to be sent. [0551]
  • PDA Adapter Service [0552]
  • The PDA Adapter, a service of the MOC, is responsible for distributing messages to a PDA client. This exemplary implementation of the PDA Adapter distributes XML messages to the PDA. [0553]
  • The PDA Adapter implements a simple interface with one public method for sending messages. The send method takes a single parameter which is the message to be sent. [0554]
  • Archiving Work Documents [0555]
  • When a work item is closed, the experience of the people who participated in the work group needs to be updated. An archive service is provided for this and any other cleanup activity that is needed. In fact, multiple archive services could be deployed, each doing different activities such as one concentrating solely on updating experiences; packaging up the work item for long-term storage; calculating statistics for trend analysis, etc. [0556]
  • The exemplary archive service implementation for the MOC performs a simple calculation on the experience level of each person in the role played in the work group. Each time a person participates in a successful resolution of the problem, that person's experience level is modified according to the following formula: current+((max−current)*0.5). This gives the person a lot of credit the first time that person is successful, but less credit each time until the score is close to the maximum. [0557]
  • The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application of the invention and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated. [0558]

Claims (20)

What is claimed is:
1. A data processing system implemented method for realizing an avatar as a shared resource among clients in an enterprise comprising:
defining an avatar as information related to at least some of communication, skills, responsibilities, experience, physical location, availability, workload and history of work success, wherein the information is based on attributes for a contact;
registering the avatar in the enterprise; and
interacting with a service based on the information defining the avatar.
2. The method recited in claim 1, wherein interacting with a service based on one of the information defining the avatar further comprises:
receiving a request for the contact to participate with a work group from a client;
conveying the request to the contact using the communication information; and
updating the workload information to reflect an affirmative response to the request.
3. The method recited in claim 1, wherein interacting with a service based on one of the information defining the avatar further comprises:
receiving a request for the contact to participate with a work group from a client;
conveying the request to the contact using the communication information; and declining the request for the contact to participate based on a negative response to the request from the contact.
4. The method recited in claim 2 further comprises:
updating the skill and history of work success information for the avatar based on completion of the participation with the work group.
5. The method recited in claim 1, wherein the contact is one of an enterprise person and a customer person.
6. The method recited in claim 1, wherein interacting with a service based on the information defining the avatar further comprises:
receiving a request for the contact to participate with a work group from a client, wherein the request is based on the skill, experience, physical location, availability, workload and history of work success of the contact, wherein the contact is a service person.
7. The method recited in claim 1, wherein the enterprise having a plurality of avatars being registered therein, each of the plurality of avatars being defined as information related to at least some of communication, skill, experience, physical location, availability, workload and history of work success based on attributes for a contact.
8. The method recited in claim 2, wherein the client is a service associated with a Management Operations Center (MOC) and conveying the request to the contact using the communication information further comprises:
binding the request to a WorkItem representing work being addressed by the work group;
binding a proxy avatar for the avatar to the WorkItem; and
communicating the conveying the request and at least some information pertaining to the work being addressed by the work group to the contact using the proxy avatar.
9. The method recited in claim 1 further comprises:
deploying an avatar service in the enterprise, wherein the avatar is contained within the avatar service.
10. The method recited in claim 9, wherein registering the avatar in the enterprise further comprises:
registering the avatar with a registrar within the enterprise, wherein registering is performed by the avatar service; and
requesting an enterprise lease for the avatar from the registrar, wherein requesting an enterprise lease is performed by the avatar service.
11. A data processing system implemented program product embodied on a data processing system readable medium for realizing a method for implementing an avatar as a shared resource among clients in an enterprise, said program product comprising:
instructions for defining an avatar as information related to at least some of communication, skill, responsibilities, experience, physical location, availability, workload and history of work success, wherein the information is based on attributes for a contact;
instructions for registering the avatar in the enterprise; and
instructions for interacting with a service based on the information defining the avatar.
12. The program product recited in claim 11, wherein the instructions for interacting with a service based on one of the information defining the avatar further comprises:
instructions for receiving a request for the contact to participate with a work group from a client;
instructions for conveying the request to the contact using the communication information; and
instructions for updating the workload information to reflect an affirmative response to the request.
13. The program product recited in claim 11, wherein the instructions for interacting with a service based on one of the information defining the avatar further comprises:
instructions for receiving a request for the contact to participate with a work group from a client;
instructions for conveying the request to the contact using the communication information; and
instructions for declining the request for the contact to participate based on a negative response to the request from the contact.
14. The program product recited in claim 12 further comprises:
instructions for updating the skill and history of work success information of for the avatar based on completion of the participation with the work group.
15. The program product recited in claim 11, wherein the contact is one of an enterprise person and a customer person.
16. The program product recited in claim 11, wherein the instructions for interacting with a service based on the information defining the avatar further comprises:
instructions for receiving a request for the contact to participate with a work group from a client, wherein the request is based on the skill, experience, physical location, availability, workload and history of work success of the contact, wherein the contact is a service person.
17. The program product recited in claim 11, wherein the enterprise having a plurality avatars being registered therein, each of the plurality of avatars being defined as information related to at least some of communication, skill, experience, physical location, availability, workload and history of work success based on attributes for a contact.
18. The program product recited in claim 12, wherein the client is a service associated with a Management Operations Center (MOC) and the instructions for conveying the request to the contact using the communication information further comprises:
instructions for binding the request to a WorkItem representing work being addressed by the work group;
instructions for binding a proxy avatar for the avatar to the WorkItem; and
instructions for communicating the conveying the request and at least some information pertaining to the work being addressed by the work group to the contact using the proxy avatar.
19. The program product recited in claim 11 further comprises:
instructions for deploying an avatar service in the enterprise, wherein the avatar is contained within the avatar service.
20. The program product recited in claim 19, wherein the instructions for registering the avatar in the enterprise further comprises:
instructions for registering the avatar with a registrar within the enterprise, wherein registering is performed by the avatar service; and
instructions for requesting an enterprise lease for the avatar from the registrar, wherein requesting an enterprise lease is performed by the avatar service.
US10/113,662 2000-05-22 2002-03-29 Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services Granted US20030004774A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US10/113,691 US7401131B2 (en) 2000-05-22 2002-03-29 Method and system for implementing improved containers in a global ecosystem of interrelated services
US10/113,662 US20030004774A1 (en) 2000-05-22 2002-03-29 Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services
US10/112,373 US6868441B2 (en) 2000-05-22 2002-03-29 Method and system for implementing a global ecosystem of interrelated services
US13/100,624 US8843386B2 (en) 2000-05-22 2011-05-04 Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services
US15/040,700 US20160241565A1 (en) 2000-05-22 2016-02-10 Conveying requests to service persons using avatars acting as proxies

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US20656400P 2000-05-22 2000-05-22
US09/863,456 US6922685B2 (en) 2000-05-22 2001-05-22 Method and system for managing partitioned data resources
US10/113,662 US20030004774A1 (en) 2000-05-22 2002-03-29 Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services

Related Parent Applications (4)

Application Number Title Priority Date Filing Date
US09/863,456 Division US6922685B2 (en) 2000-05-22 2001-05-22 Method and system for managing partitioned data resources
US10/113,471 Division US8856087B2 (en) 2000-05-22 2002-03-29 Method and system for realizing a rendezvous service in a management operations center implemented in a global ecosystem of interrelated services
US10/113,543 Division US7428723B2 (en) 2000-05-22 2002-03-29 Aggregrating related events into a single bundle of events with incorporation of bundle into work protocol based on rules
US13/100,624 Division US8843386B2 (en) 2000-05-22 2011-05-04 Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services

Related Child Applications (4)

Application Number Title Priority Date Filing Date
US10/113,691 Division US7401131B2 (en) 2000-05-22 2002-03-29 Method and system for implementing improved containers in a global ecosystem of interrelated services
US10/113,543 Division US7428723B2 (en) 2000-05-22 2002-03-29 Aggregrating related events into a single bundle of events with incorporation of bundle into work protocol based on rules
US13/100,624 Continuation US8843386B2 (en) 2000-05-22 2011-05-04 Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services
US15/040,700 Continuation US20160241565A1 (en) 2000-05-22 2016-02-10 Conveying requests to service persons using avatars acting as proxies

Publications (1)

Publication Number Publication Date
US20030004774A1 true US20030004774A1 (en) 2003-01-02

Family

ID=26901465

Family Applications (14)

Application Number Title Priority Date Filing Date
US09/863,456 Expired - Lifetime US6922685B2 (en) 2000-05-22 2001-05-22 Method and system for managing partitioned data resources
US10/113,472 Expired - Lifetime US8626877B2 (en) 2000-05-22 2002-03-29 Method and system for implementing a global information bus in a global ecosystem of interrelated services
US10/113,471 Active 2027-05-29 US8856087B2 (en) 2000-05-22 2002-03-29 Method and system for realizing a rendezvous service in a management operations center implemented in a global ecosystem of interrelated services
US10/112,373 Expired - Lifetime US6868441B2 (en) 2000-05-22 2002-03-29 Method and system for implementing a global ecosystem of interrelated services
US10/113,662 Granted US20030004774A1 (en) 2000-05-22 2002-03-29 Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services
US10/110,000 Expired - Lifetime US7802264B2 (en) 2000-05-22 2002-03-29 Method and system for implementing a databus in a global ecosystem of interrelated services
US10/113,543 Expired - Lifetime US7428723B2 (en) 2000-05-22 2002-03-29 Aggregrating related events into a single bundle of events with incorporation of bundle into work protocol based on rules
US10/113,968 Abandoned US20020174191A1 (en) 2000-05-22 2002-03-29 Method and system for using mobile code in a global ecosystem of interrelated services
US10/113,969 Active 2024-03-15 US7856486B2 (en) 2000-05-22 2002-03-29 Method and system for implementing a global lookup in a global ecosystem of interrelated services
US10/113,213 Abandoned US20020169644A1 (en) 2000-05-22 2002-03-29 Method and system for implementing a management operations center in a global ecosystem of interrelated services
US11/165,326 Active 2025-02-11 US7822781B2 (en) 2000-05-22 2005-06-24 Method and system for managing partitioned data resources
US13/100,624 Expired - Fee Related US8843386B2 (en) 2000-05-22 2011-05-04 Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services
US15/040,700 Abandoned US20160241565A1 (en) 2000-05-22 2016-02-10 Conveying requests to service persons using avatars acting as proxies
US15/195,642 Abandoned US20160308982A1 (en) 2000-05-22 2016-06-28 Method and system for implementing a management operations center in a global ecosystem of interrelated services

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US09/863,456 Expired - Lifetime US6922685B2 (en) 2000-05-22 2001-05-22 Method and system for managing partitioned data resources
US10/113,472 Expired - Lifetime US8626877B2 (en) 2000-05-22 2002-03-29 Method and system for implementing a global information bus in a global ecosystem of interrelated services
US10/113,471 Active 2027-05-29 US8856087B2 (en) 2000-05-22 2002-03-29 Method and system for realizing a rendezvous service in a management operations center implemented in a global ecosystem of interrelated services
US10/112,373 Expired - Lifetime US6868441B2 (en) 2000-05-22 2002-03-29 Method and system for implementing a global ecosystem of interrelated services

Family Applications After (9)

Application Number Title Priority Date Filing Date
US10/110,000 Expired - Lifetime US7802264B2 (en) 2000-05-22 2002-03-29 Method and system for implementing a databus in a global ecosystem of interrelated services
US10/113,543 Expired - Lifetime US7428723B2 (en) 2000-05-22 2002-03-29 Aggregrating related events into a single bundle of events with incorporation of bundle into work protocol based on rules
US10/113,968 Abandoned US20020174191A1 (en) 2000-05-22 2002-03-29 Method and system for using mobile code in a global ecosystem of interrelated services
US10/113,969 Active 2024-03-15 US7856486B2 (en) 2000-05-22 2002-03-29 Method and system for implementing a global lookup in a global ecosystem of interrelated services
US10/113,213 Abandoned US20020169644A1 (en) 2000-05-22 2002-03-29 Method and system for implementing a management operations center in a global ecosystem of interrelated services
US11/165,326 Active 2025-02-11 US7822781B2 (en) 2000-05-22 2005-06-24 Method and system for managing partitioned data resources
US13/100,624 Expired - Fee Related US8843386B2 (en) 2000-05-22 2011-05-04 Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services
US15/040,700 Abandoned US20160241565A1 (en) 2000-05-22 2016-02-10 Conveying requests to service persons using avatars acting as proxies
US15/195,642 Abandoned US20160308982A1 (en) 2000-05-22 2016-06-28 Method and system for implementing a management operations center in a global ecosystem of interrelated services

Country Status (1)

Country Link
US (14) US6922685B2 (en)

Cited By (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030004956A1 (en) * 2001-07-02 2003-01-02 Sun Microsystems, Inc. Methods and system for efficient association traversals
US20030031164A1 (en) * 2001-03-05 2003-02-13 Nabkel Jafar S. Method and system communication system message processing based on classification criteria
US20040107114A1 (en) * 2002-11-15 2004-06-03 Curtis Peter M. System and method for processing, organizing and accessing mission critical facilities information and intellectual capital
US20040152512A1 (en) * 2003-02-05 2004-08-05 Collodi David J. Video game with customizable character appearance
US20040176996A1 (en) * 2003-03-03 2004-09-09 Jason Powers Method for monitoring a managed system
US20040179037A1 (en) * 2003-03-03 2004-09-16 Blattner Patrick D. Using avatars to communicate context out-of-band
US6807569B1 (en) * 2000-09-12 2004-10-19 Science Applications International Corporation Trusted and anonymous system and method for sharing threat data to industry assets
US20040216107A1 (en) * 2003-01-24 2004-10-28 Bea Systems, Inc. Method for transaction processing with parallel execution
US20040221224A1 (en) * 2002-11-21 2004-11-04 Blattner Patrick D. Multiple avatar personalities
US20040249972A1 (en) * 2003-06-04 2004-12-09 Sony Computer Entertainment Inc. System and method for notification within decentralized network
US20050015362A1 (en) * 2003-07-16 2005-01-20 Manfred Ostertag Information exchange tool
US20050165935A1 (en) * 2004-01-22 2005-07-28 Moody Paul B. Method and system for providing information regarding recently accessed documents of a remote user through an awareness client program
US20050188082A1 (en) * 2003-07-11 2005-08-25 Computer Associates Think, Inc. System and method for standarizing clocks in a heterogeneous networked environment
US20060028475A1 (en) * 2004-08-05 2006-02-09 Tobias Richard L Persistent, immersible and extractable avatars
WO2006021944A1 (en) * 2004-08-12 2006-03-02 Leanway Automatic Areanas Ltd. Enhanced database structure configuration
US20060178898A1 (en) * 2005-02-07 2006-08-10 Babak Habibi Unified event monitoring system
US20060182261A1 (en) * 2005-02-15 2006-08-17 Siemens Aktiengesellschaft Method and system for providing a service
US20070073666A1 (en) * 2005-09-28 2007-03-29 Brother Kogyo Kabushiki Kaisha Data Transmission System, Data Transmission Method, Data Transmission Apparatus, and Computer Usable Medium Therefor
US20070113181A1 (en) * 2003-03-03 2007-05-17 Blattner Patrick D Using avatars to communicate real-time information
US20080040198A1 (en) * 2004-04-07 2008-02-14 Siemens Aktiengesellschaft Device and Method for Modeling Electronic Business Transactions
WO2008115234A1 (en) * 2007-03-20 2008-09-25 John Caporale A system and method for control and training of avatars in an interactive environment
US20080235581A1 (en) * 2007-03-20 2008-09-25 Caporale John L System and method for control and training of avatars in an interactive environment
US20090144228A1 (en) * 2007-11-29 2009-06-04 Microsoft Corporation Data parallel production and consumption
US20090259948A1 (en) * 2008-04-15 2009-10-15 Hamilton Ii Rick A Surrogate avatar control in a virtual universe
US20090267948A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Object based avatar tracking
US20090267960A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Color Modification of Objects in a Virtual Universe
US20090267950A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Fixed path transitions
US20090271422A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Object Size Modifications Based on Avatar Distance
US20090267937A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Floating transitions
US20090287728A1 (en) * 2008-05-15 2009-11-19 International Business Machines Corporation Tag along shopping
US20090327219A1 (en) * 2008-04-24 2009-12-31 International Business Machines Corporation Cloning Objects in a Virtual Universe
US20100001993A1 (en) * 2008-07-07 2010-01-07 International Business Machines Corporation Geometric and texture modifications of objects in a virtual universe based on real world user characteristics
US20100005423A1 (en) * 2008-07-01 2010-01-07 International Business Machines Corporation Color Modifications of Objects in a Virtual Universe Based on User Display Settings
US7680818B1 (en) * 2002-12-18 2010-03-16 Oracle International Corporation Analyzing the dependencies between objects in a system
US20100122267A1 (en) * 2004-08-05 2010-05-13 Elite Avatars, Llc Persistent, immersible and extractable avatars
US20100125543A1 (en) * 2008-11-20 2010-05-20 Motorola, Inc. Method and Apparatus to Facilitate Using a Hierarchical Task Model With Respect to Corresponding End Users
US20100125483A1 (en) * 2008-11-20 2010-05-20 Motorola, Inc. Method and Apparatus to Facilitate Using a Highest Level of a Hierarchical Task Model To Facilitate Correlating End User Input With a Corresponding Meaning
US20100153585A1 (en) * 2003-07-11 2010-06-17 Computer Associates Think, Inc. Standardizing Clocks in a Networked Computing Environment
US20100180047A1 (en) * 2002-12-13 2010-07-15 Peter Surma Native Format Tunneling
US20100177117A1 (en) * 2009-01-14 2010-07-15 International Business Machines Corporation Contextual templates for modifying objects in a virtual universe
US20100325642A1 (en) * 2009-06-22 2010-12-23 Microsoft Corporation Automatically re-starting services
US7908554B1 (en) 2003-03-03 2011-03-15 Aol Inc. Modifying avatar behavior based on user action or mood
US7913176B1 (en) 2003-03-03 2011-03-22 Aol Inc. Applying access controls to communications with avatars
US8041740B1 (en) * 2008-03-04 2011-10-18 Amdocs Software Systems Limited Database system, method, and computer program product for recording entity state and type information for use during subsequent processing of data
US20120303673A1 (en) * 2011-05-27 2012-11-29 International Business Machines Corporation Data stewardship in federated multi-level master data management systems
CN103179004A (en) * 2011-12-22 2013-06-26 英业达股份有限公司 Container topology production method
US20130191328A1 (en) * 2012-01-25 2013-07-25 Sap Ag Standardized framework for reporting archived legacy system data
US20140168269A1 (en) * 2005-01-19 2014-06-19 International Business Machines Corporation Morphing a data center in a virtual world
US9215095B2 (en) 2002-11-21 2015-12-15 Microsoft Technology Licensing, Llc Multiple personalities
US20170103362A1 (en) * 2015-04-24 2017-04-13 Delta Pds Co., Ltd Apparatus for processing work object and method performing the same
US9652809B1 (en) 2004-12-21 2017-05-16 Aol Inc. Using user profile information to determine an avatar and/or avatar characteristics
CN107318049A (en) * 2017-06-13 2017-11-03 北京比利信息技术有限公司 Launcher fusion methods by all kinds of means
US10706710B2 (en) * 2016-11-08 2020-07-07 Delta Pds Co., Ltd. Method and apparatus for providing reminder based on chat room
US10765948B2 (en) 2017-12-22 2020-09-08 Activision Publishing, Inc. Video game content aggregation, normalization, and publication systems and methods
US10868719B2 (en) 2017-04-28 2020-12-15 Oracle International Corporation System and method for federated configuration in an application server environment
US10981069B2 (en) 2008-03-07 2021-04-20 Activision Publishing, Inc. Methods and systems for determining the authenticity of copied objects in a virtual environment
US11218386B2 (en) * 2019-09-23 2022-01-04 Microsoft Technology Licensing, Llc Service ticket escalation based on interaction patterns
US11334343B1 (en) * 2021-02-09 2022-05-17 Citrix Systems, Inc. Systems and methods for managing releases of applications in a computing environment
US11380094B2 (en) * 2019-12-12 2022-07-05 At&T Intellectual Property I, L.P. Systems and methods for applied machine cognition
US11403572B2 (en) * 2017-07-20 2022-08-02 Mian Ahmed Method and system for requesting service providers in real time
US11712627B2 (en) 2019-11-08 2023-08-01 Activision Publishing, Inc. System and method for providing conditional access to virtual gaming items

Families Citing this family (1026)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5850518A (en) * 1994-12-12 1998-12-15 Northrup; Charles J. Access-method-independent exchange
JP3466125B2 (en) * 1999-11-17 2003-11-10 インターナショナル・ビジネス・マシーンズ・コーポレーション Mobile agent management apparatus and method
US7002924B2 (en) * 2000-02-04 2006-02-21 Matsushita Electric Industrial Co., Ltd. Zero configuration networking
US7331035B2 (en) * 2000-05-05 2008-02-12 @ Hand Corporation System and method for mobile software application development and deployment
US6922685B2 (en) 2000-05-22 2005-07-26 Mci, Inc. Method and system for managing partitioned data resources
US7401131B2 (en) * 2000-05-22 2008-07-15 Verizon Business Global Llc Method and system for implementing improved containers in a global ecosystem of interrelated services
US6868539B1 (en) * 2000-06-28 2005-03-15 Microsoft Corp. System and method providing single application image
US6961681B1 (en) * 2000-09-12 2005-11-01 Microsoft Corporation System and method providing virtual applications architecture
US7278103B1 (en) * 2000-06-28 2007-10-02 Microsoft Corporation User interface to display and manage an entity and associated resources
EP1316011A4 (en) * 2000-06-30 2008-01-23 Information Bionics Inc System for linking data cells through permutation
US6721779B1 (en) * 2000-07-07 2004-04-13 Softwired Ag Messaging proxy system
NO313680B1 (en) * 2000-07-17 2002-11-11 Ericsson Telefon Ab L M Information event in SDH and SONET networks
JP5085831B2 (en) * 2000-07-27 2012-11-28 オラクル・インターナショナル・コーポレイション System and method for request concentration and load balancing
US20020038450A1 (en) * 2000-08-03 2002-03-28 International Business Machines Corporation Method and system to run stored procedures as workflow activity implementations
WO2002013068A1 (en) * 2000-08-04 2002-02-14 Carr Scott Software Incorporated Automatic transaction management
US6971085B1 (en) * 2000-08-31 2005-11-29 International Business Machines Corporation Object oriented structured query language (OOSQL) support for enterprise java beans
US7814198B2 (en) 2007-10-26 2010-10-12 Microsoft Corporation Model-driven, repository-based application monitoring system
US7127492B1 (en) * 2000-10-31 2006-10-24 International Business Machines Corporation Method and apparatus for distributed application acceleration
CN100339846C (en) * 2000-11-01 2007-09-26 斯雷普内姆斯·Com公司 Domain Name acquisition and management system and method
US8516054B2 (en) 2000-12-20 2013-08-20 Aurea Software, Inc. Message handling
US7197505B2 (en) * 2000-12-22 2007-03-27 Star Bridge Systems, Inc. Multi-dimensional recursive wavefront behavioral synthesis
FR2819601B1 (en) * 2001-01-16 2003-07-18 Canon Kk COMPUTER PROGRAM PARTITION METHOD AND DEVICE
US6901409B2 (en) * 2001-01-17 2005-05-31 International Business Machines Corporation Mapping data from multiple data sources into a single software component
AU2002234258A1 (en) * 2001-01-22 2002-07-30 Sun Microsystems, Inc. Peer-to-peer network computing platform
US7346632B2 (en) * 2001-02-22 2008-03-18 International Business Machines Corporation Mechanism for executing nested transactions in an execution environment supporting flat transactions only
USH2201H1 (en) * 2001-03-19 2007-09-04 The United States Of America As Represented By The Secretary Of The Air Force Software architecture and design for facilitating prototyping in distributed virtual environments
US7319979B2 (en) * 2001-03-29 2008-01-15 Intel Corporation Dynamically interacting with an internet service using a client-specified communication proxy and protocol
US20020147687A1 (en) * 2001-04-06 2002-10-10 International Business Machines Corporation Method and computer system for program recording service
US7783568B1 (en) * 2001-05-01 2010-08-24 Visa International Service Association Payment services for multi-national corporations
US6983395B2 (en) * 2001-05-23 2006-01-03 Hewlett-Packard Development Company, L.P. Multi-agent cooperative transaction method and system
US7269632B2 (en) * 2001-06-05 2007-09-11 Xdyne, Inc. Networked computer system for communicating and operating in a virtual reality environment
US8205193B2 (en) * 2001-06-11 2012-06-19 Hewlett-Packard Development Company, L.P. Runtime updating of virtual machine class files
US7693970B2 (en) * 2001-06-14 2010-04-06 Savvis Communications Corporation Secured shared storage architecture
US20030014478A1 (en) * 2001-06-29 2003-01-16 Noble Alan C. Dynamically distributed client-server web browser
US7305492B2 (en) * 2001-07-06 2007-12-04 Juniper Networks, Inc. Content service aggregation system
US7200662B2 (en) * 2001-07-06 2007-04-03 Juniper Networks, Inc. Integrated rule network management system
US7734781B2 (en) 2001-07-09 2010-06-08 Savvis Communications Corporation Methods and systems for shared storage virtualization
JP3788281B2 (en) * 2001-07-09 2006-06-21 日本電気株式会社 Session establishment method
US20030033379A1 (en) * 2001-07-20 2003-02-13 Lemur Networks Intelligent central directory for soft configuration of IP services
US6996601B1 (en) * 2001-07-26 2006-02-07 Sprint Communications Company L.P. Process for managing change within an enterprise
US7152094B1 (en) * 2001-07-31 2006-12-19 Sprint Communications Company L.P. Middleware brokering system adapter
US7216181B1 (en) * 2001-07-31 2007-05-08 Sprint Communications Company L.P. Middleware brokering system
US7174342B1 (en) * 2001-08-09 2007-02-06 Ncr Corp. Systems and methods for defining executable sequences to process information from a data collection
US7080066B1 (en) 2001-08-09 2006-07-18 Ncr Corporation Systems and methods for refining a decision-making process via executable sequences
US7672924B1 (en) 2001-08-09 2010-03-02 Teradata Us, Inc. Systems and methods for generating information from a data collection to support decision-making
GB2378781B (en) * 2001-08-16 2005-06-01 Sun Microsystems Inc Message brokering
GB2381336B (en) * 2001-08-21 2005-09-28 Silicon Infusion Ltd Object orientated heterogeneous multi-processor platform
US6892337B1 (en) * 2001-08-22 2005-05-10 Cypress Semiconductor Corp. Circuit and method for testing physical layer functions of a communication network
GB2379296B (en) * 2001-09-01 2005-05-25 Ibm A data storage system having a unified container layer for an active data store
CA2404550C (en) * 2001-09-21 2010-02-09 Corel Corporation System and method for web services packaging
US20030065761A1 (en) * 2001-09-28 2003-04-03 Nevton Cereja System and method of creating and maintaining a replicated naming service to support a telecommunications network
US7213025B2 (en) * 2001-10-16 2007-05-01 Ncr Corporation Partitioned database system
US7721193B2 (en) * 2001-10-18 2010-05-18 Bea Systems, Inc. System and method for implementing a schema object model in application integration
US20030084423A1 (en) * 2001-10-26 2003-05-01 Dai Clegg Automatic source code generation
EP1444631A2 (en) * 2001-11-07 2004-08-11 SAP Aktiengesellschaft Multi-purpose configuration model
US7149761B2 (en) * 2001-11-13 2006-12-12 Tadpole Technology Plc System and method for managing the synchronization of replicated version-managed databases
US7080072B1 (en) 2001-11-14 2006-07-18 Ncr Corp. Row hash match scan in a partitioned database system
US7844688B2 (en) * 2001-11-20 2010-11-30 P-Cube Ltd. Apparatus, method, and software for analyzing network traffic in a service aware network
US20030126234A1 (en) * 2001-11-20 2003-07-03 P-Cube Ltd. Apparatus, method, and software for analyzing network traffic in a service aware network
US7319991B2 (en) * 2001-12-11 2008-01-15 International Business Machines Corporation Computerized cost estimate system and method
US7523208B2 (en) * 2001-12-14 2009-04-21 International Business Machines Corporation Message filtering
DE10163533A1 (en) * 2001-12-21 2003-07-17 Siemens Ag Persistent storage of network management data using object references
US20030149771A1 (en) * 2002-02-04 2003-08-07 Wookey Michael J. Remote services system back-channel multicasting
US20030177259A1 (en) * 2002-02-04 2003-09-18 Wookey Michael J. Remote services systems data delivery mechanism
US7167448B2 (en) * 2002-02-04 2007-01-23 Sun Microsystems, Inc. Prioritization of remote services messages within a low bandwidth environment
US20030149889A1 (en) * 2002-02-04 2003-08-07 Wookey Michael J. Automatic communication and security reconfiguration for remote services
US20030163544A1 (en) * 2002-02-04 2003-08-28 Wookey Michael J. Remote service systems management interface
US20030149740A1 (en) * 2002-02-04 2003-08-07 Wookey Michael J. Remote services delivery architecture
WO2003071444A1 (en) * 2002-02-15 2003-08-28 Tridium, Inc. Component model for real time system control
US7516447B2 (en) 2002-02-22 2009-04-07 Bea Systems, Inc. Methods and apparatus for building, customizing and using software abstractions of external entities
US7260559B1 (en) * 2002-03-01 2007-08-21 Shuck L Zane Method for simultaneously improving educational, economic, ecological, environmental, and other processes vital to communities
US20030182361A1 (en) * 2002-03-22 2003-09-25 Sun Microsystems, Inc. Business-model agnostic service deployment management service
US20030182460A1 (en) * 2002-03-25 2003-09-25 Atul Khare Managed code modules dynamically invoking unmanaged code modules at arbitrary locations
US7693830B2 (en) 2005-08-10 2010-04-06 Google Inc. Programmable search engine
US7716199B2 (en) 2005-08-10 2010-05-11 Google Inc. Aggregating context data for programmable search engines
US7743045B2 (en) 2005-08-10 2010-06-22 Google Inc. Detecting spam related and biased contexts for programmable search engines
US7571221B2 (en) * 2002-04-03 2009-08-04 Hewlett-Packard Development Company, L.P. Installation of network services in an embedded network server
US7379970B1 (en) * 2002-04-05 2008-05-27 Ciphermax, Inc. Method and system for reduced distributed event handling in a network environment
WO2003088142A2 (en) * 2002-04-10 2003-10-23 Instasolv, Inc. Method and system for managing computer systems
US6811777B2 (en) * 2002-04-13 2004-11-02 Allan Mishra Compositions and minimally invasive methods for treating incomplete connective tissue repair
US7608258B2 (en) * 2002-04-13 2009-10-27 Allan Mishra Method for treatment of tendinosis using platelet rich plasma
BR0309384A (en) * 2002-04-19 2005-03-08 Computer Ass Think Inc System and method for native application data management
US7330880B1 (en) * 2002-04-22 2008-02-12 Network Appliance, Inc. Method and apparatus for reliable download to a network cache while limiting origin server load
US7774791B1 (en) * 2002-04-24 2010-08-10 Informatica Corporation System, method and computer program product for data event processing and composite applications
US7155438B2 (en) * 2002-05-01 2006-12-26 Bea Systems, Inc. High availability for event forwarding
US7222148B2 (en) * 2002-05-02 2007-05-22 Bea Systems, Inc. System and method for providing highly available processing of asynchronous service requests
US7493628B2 (en) * 2002-05-02 2009-02-17 Bea Systems, Inc. Shared common connection factory
US7350184B2 (en) * 2002-05-02 2008-03-25 Bea Systems, Inc. System and method for enterprise application interactions
US7676538B2 (en) * 2002-05-02 2010-03-09 Bea Systems, Inc. Systems and methods for application view transactions
US20030212738A1 (en) * 2002-05-10 2003-11-13 Wookey Michael J. Remote services system message system to support redundancy of data flow
US7610404B2 (en) * 2002-05-22 2009-10-27 Cast Iron Systems, Inc. Application network communication method and apparatus
US8296433B2 (en) * 2002-05-22 2012-10-23 International Business Machines Corporation Virtualization method and apparatus for integrating enterprise applications
US20030236874A1 (en) * 2002-06-04 2003-12-25 Timo Hotti Method and arrangement for providing an information management system
US20030232618A1 (en) * 2002-06-12 2003-12-18 Vuico, L.L.C. System and method for implementing virtual mobile messaging services
US7599983B2 (en) * 2002-06-18 2009-10-06 Wireless Ink Corporation Method, apparatus and system for management of information content for enhanced accessibility over wireless communication networks
US7711728B2 (en) * 2002-06-20 2010-05-04 Guidance Software, Inc. System and method for searching for static data in a computer investigation system
US20030236863A1 (en) * 2002-06-25 2003-12-25 Johnson Peter E. Just-in-time multicasting
US7260623B2 (en) * 2002-06-27 2007-08-21 Sun Microsystems, Inc. Remote services system communication module
US7240109B2 (en) * 2002-06-27 2007-07-03 Sun Microsystems, Inc. Remote services system service module interface
US7181455B2 (en) * 2002-06-27 2007-02-20 Sun Microsystems, Inc. Bandwidth management for remote services system
US6988099B2 (en) * 2002-06-27 2006-01-17 Bea Systems, Inc. Systems and methods for maintaining transactional persistence
US8266239B2 (en) * 2002-06-27 2012-09-11 Oracle International Corporation Remote services system relocatable mid level manager
CN1464401B (en) * 2002-06-28 2010-05-26 国际商业机器公司 Object oriented system and method using shadow object for verification control
US7475107B2 (en) * 2002-07-08 2009-01-06 Electronic Evidence Discovery, Inc. System and method for managing distributed computer processes
GB0215808D0 (en) * 2002-07-09 2002-08-14 Ibm A system and method for managing transactions in a messaging system
US7614059B2 (en) * 2002-07-11 2009-11-03 Topia Technology System and method for the discovery and usage of local resources by a mobile agent object
US7107592B2 (en) * 2002-07-25 2006-09-12 Sun Microsystems, Inc. Method, system, and program for making objects available for access to a client over a network
US7120633B1 (en) * 2002-07-31 2006-10-10 Cingular Wireless Ii, Llc Method and system for automated handling of alarms from a fault management system for a telecommunications network
US7266582B2 (en) * 2002-08-09 2007-09-04 Sun Microsystems, Inc. Method and system for automating generation of web services from existing service components
US7266822B1 (en) * 2002-08-14 2007-09-04 Sun Microsystems, Inc. System and method for controlling and managing computer farms
US7448066B2 (en) * 2002-09-19 2008-11-04 International Business Machines Corporation Application server object-level security for distributed computing domains
US7933891B2 (en) * 2002-09-26 2011-04-26 International Business Machines Corporation Web services data aggregation system and method
US20040064558A1 (en) * 2002-09-26 2004-04-01 Hitachi Ltd. Resource distribution management method over inter-networks
US7114148B2 (en) * 2002-09-30 2006-09-26 Microsoft Corporation Runtime services for network software platform
US8117264B1 (en) 2002-10-07 2012-02-14 Yahoo! Inc. Email system
BR0304946A (en) * 2002-10-16 2004-08-31 Xerox Corp Method and apparatus to enable distributed subscription services, automated maintenance of supplies, implementation of device-independent service, including device model agent, add-on component, method and apparatus for low-cost embedded platform for side device, enabling of distributed services and platform integrated server for the autonomous provision of device services
US7353521B1 (en) * 2002-10-19 2008-04-01 Borland Software Corporation Object oriented distributed software system with methodology for piggybacked reflective callbacks
GB2394808A (en) * 2002-11-01 2004-05-05 Canon Europa Nv E-Maintenance System
US20040205240A1 (en) * 2002-11-21 2004-10-14 International Business Machines Corporation Method, system, and computer program product for providing a four-tier corba architecture
US7299244B2 (en) * 2002-12-10 2007-11-20 Hewlett-Packard Development Company, L.P. System and method for dynamic sequencing of a requirements-based workflow
US7856454B2 (en) 2002-12-20 2010-12-21 Siebel Systems, Inc. Data model for business relationships
US8538840B2 (en) 2002-12-20 2013-09-17 Siebel Systems, Inc. Financial services data model
CN1173524C (en) 2002-12-20 2004-10-27 联想(北京)有限公司 Method for service call among equipments in home network
US7962545B2 (en) * 2002-12-27 2011-06-14 Intel Corporation Dynamic service registry for virtual machines
US7213037B2 (en) * 2003-01-13 2007-05-01 I2 Technologies Us, Inc. Master data management system for centrally managing cached data representing core enterprise reference data maintained as locked in true state read only access until completion of manipulation process
US7650591B2 (en) 2003-01-24 2010-01-19 Bea Systems, Inc. Marshaling and un-marshaling data types in XML and Java
US7912902B2 (en) * 2003-02-13 2011-03-22 Telcordia Licensing Company, Llc Application service peering and aggregation
US7171470B2 (en) * 2003-02-20 2007-01-30 International Business Machines Corporation Grid service scheduling of related services using heuristics
US7774697B2 (en) * 2003-02-25 2010-08-10 Bea Systems, Inc. System and method for structuring distributed applications
US8225224B1 (en) 2003-02-25 2012-07-17 Microsoft Corporation Computer desktop use via scaling of displayed objects with shifts to the periphery
US7536650B1 (en) 2003-02-25 2009-05-19 Robertson George G System and method that facilitates computer desktop use via scaling of displayed objects with shifts to the periphery
US8230359B2 (en) * 2003-02-25 2012-07-24 Microsoft Corporation System and method that facilitates computer desktop use via scaling of displayed objects with shifts to the periphery
US7707564B2 (en) * 2003-02-26 2010-04-27 Bea Systems, Inc. Systems and methods for creating network-based software services using source code annotations
US8032860B2 (en) 2003-02-26 2011-10-04 Oracle International Corporation Methods for type-independent source code editing
US7636722B2 (en) * 2003-02-28 2009-12-22 Bea Systems, Inc. System and method for describing application extensions in XML
GB2398895A (en) * 2003-02-28 2004-09-01 Swapstream Ltd Real time trading involving financial instruments
US20050044173A1 (en) * 2003-02-28 2005-02-24 Olander Daryl B. System and method for implementing business processes in a portal
US8473399B2 (en) * 2003-03-04 2013-06-25 Siebel Systems, Inc. Invoice data object for a common data object format
US8392298B2 (en) * 2003-03-04 2013-03-05 Siebel Systems, Inc. Invoice adjustment data object for a common data object format
US8308567B2 (en) * 2003-03-05 2012-11-13 Wms Gaming Inc. Discovery service in a service-oriented gaming network environment
US20040242328A1 (en) * 2003-03-05 2004-12-02 Blackburn Christopher W. Boot service in a service-oriented gaming network environment
US20040243848A1 (en) * 2003-03-06 2004-12-02 Blackburn Christopher W. Authentication service in a service-oriented gaming network environment
US20050032577A1 (en) * 2003-03-17 2005-02-10 Blackburn Christopher W. Message director service in a service-oriented gaming network environment
US8414397B2 (en) * 2003-03-17 2013-04-09 Wms Gaming Inc. Gaming terminal network with a message director
US20040242331A1 (en) * 2003-03-17 2004-12-02 Blackburn Christopher W. Time service in a service-oriented gaming network environment
US20080170260A1 (en) * 2003-03-19 2008-07-17 Michael Haller Output transform brokerage service
JP2006523353A (en) 2003-03-24 2006-10-12 シーベル システムズ,インコーポレイティド Common common object
US8489470B2 (en) 2003-03-24 2013-07-16 Siebel Systems, Inc. Inventory location common object
WO2004086197A2 (en) * 2003-03-24 2004-10-07 Siebel Systems, Inc. Custom common object
US7912932B2 (en) 2003-03-24 2011-03-22 Siebel Systems, Inc. Service request common object
US8510179B2 (en) 2003-03-24 2013-08-13 Siebel Systems, Inc. Inventory transaction common object
US9704120B2 (en) 2003-03-24 2017-07-11 Oracle International Corporation Inventory balance common object
US7904340B2 (en) 2003-03-24 2011-03-08 Siebel Systems, Inc. Methods and computer-readable medium for defining a product model
US7457815B2 (en) * 2003-03-27 2008-11-25 Apple Inc. Method and apparatus for automatically providing network services
US7299478B2 (en) * 2003-03-28 2007-11-20 Sbc Knowledge Ventures, L.P. Integration service and domain object for telecommunications operational support
US8700753B2 (en) * 2003-03-28 2014-04-15 Denis L. Bagsby Distributed computer system for telecommunications operational support
US7216123B2 (en) * 2003-03-28 2007-05-08 Board Of Trustees Of The Leland Stanford Junior University Methods for ranking nodes in large directed graphs
US20040215706A1 (en) * 2003-03-31 2004-10-28 Lavender Scott D. System and method for updating software and version control in a production printer
GB0308035D0 (en) * 2003-04-08 2003-05-14 Ibm Liveness monitoring in a publish/subscribe messaging system
US7284054B2 (en) * 2003-04-11 2007-10-16 Sun Microsystems, Inc. Systems, methods, and articles of manufacture for aligning service containers
US20040259640A1 (en) * 2003-04-16 2004-12-23 Gentles Thomas A. Layered security methods and apparatus in a gaming system environment
CA2464797A1 (en) * 2003-04-16 2004-10-16 Wms Gaming Inc. Remote authentication of gaming software in a gaming system environment
US20040266533A1 (en) * 2003-04-16 2004-12-30 Gentles Thomas A Gaming software distribution network in a gaming system environment
US20040266523A1 (en) * 2003-04-16 2004-12-30 Gentles Thomas A Secured networks in a gaming system environment
US7464385B1 (en) * 2003-05-09 2008-12-09 Vignette Corporation Method and system for performing bulk operations on transactional items
AU2003204108B1 (en) * 2003-05-09 2004-11-11 Majitek Pty Ltd Interface for distributed objects and development platform therefor
US7941453B1 (en) * 2003-05-09 2011-05-10 Vignette Software Llc Method and system for deployment of content using proxy objects
US8321590B2 (en) 2003-05-22 2012-11-27 International Business Machines Corporation Application network communication
US20050227768A1 (en) * 2003-05-27 2005-10-13 Blackburn Christopher W Gaming network environment having a language translation service
US7673307B2 (en) * 2003-05-29 2010-03-02 International Business Machines Corporation Managing transactions in a messaging system
US7437458B1 (en) * 2003-06-13 2008-10-14 Juniper Networks, Inc. Systems and methods for providing quality assurance
US7792795B1 (en) * 2003-06-17 2010-09-07 Microsoft Corporation Context service system
US20040267887A1 (en) * 2003-06-30 2004-12-30 Berger Kelly D. System and method for dynamically managing presence and contact information
EP1494394A1 (en) * 2003-06-30 2005-01-05 Sony International (Europe) GmbH Distance-aware service mechanism for determining the availability of remote services in wireless personal area networks
US7650338B2 (en) * 2003-07-03 2010-01-19 Ebay Inc. Method and system for managing data transaction requests
US7536673B2 (en) * 2003-07-22 2009-05-19 Sap Ag Application business object processing
US7840943B2 (en) * 2003-08-08 2010-11-23 Oracle America, Inc. Method and apparatus for transferring data in a distributed testing system
US8131739B2 (en) 2003-08-21 2012-03-06 Microsoft Corporation Systems and methods for interfacing application programs with an item-based storage platform
US8238696B2 (en) 2003-08-21 2012-08-07 Microsoft Corporation Systems and methods for the implementation of a digital images schema for organizing units of information manageable by a hardware/software interface system
US8166101B2 (en) 2003-08-21 2012-04-24 Microsoft Corporation Systems and methods for the implementation of a synchronization schemas for units of information manageable by a hardware/software interface system
US7590643B2 (en) 2003-08-21 2009-09-15 Microsoft Corporation Systems and methods for extensions and inheritance for units of information manageable by a hardware/software interface system
US8060553B2 (en) 2003-08-27 2011-11-15 International Business Machines Corporation Service oriented architecture for a transformation function in a data integration platform
US20060010195A1 (en) * 2003-08-27 2006-01-12 Ascential Software Corporation Service oriented architecture for a message broker in a data integration platform
US20050232046A1 (en) * 2003-08-27 2005-10-20 Ascential Software Corporation Location-based real time data integration services
US8041760B2 (en) 2003-08-27 2011-10-18 International Business Machines Corporation Service oriented architecture for a loading function in a data integration platform
US20050235274A1 (en) * 2003-08-27 2005-10-20 Ascential Software Corporation Real time data integration for inventory management
US20050234969A1 (en) * 2003-08-27 2005-10-20 Ascential Software Corporation Services oriented architecture for handling metadata in a data integration platform
WO2005022417A2 (en) 2003-08-27 2005-03-10 Ascential Software Corporation Methods and systems for real time integration services
US20050240354A1 (en) * 2003-08-27 2005-10-27 Ascential Software Corporation Service oriented architecture for an extract function in a data integration platform
US7814470B2 (en) * 2003-08-27 2010-10-12 International Business Machines Corporation Multiple service bindings for a real time data integration service
US20050262189A1 (en) * 2003-08-27 2005-11-24 Ascential Software Corporation Server-side application programming interface for a real time data integration service
US20050223109A1 (en) * 2003-08-27 2005-10-06 Ascential Software Corporation Data integration through a services oriented architecture
US7814142B2 (en) * 2003-08-27 2010-10-12 International Business Machines Corporation User interface service for a services oriented architecture in a data integration platform
US20050228808A1 (en) * 2003-08-27 2005-10-13 Ascential Software Corporation Real time data integration services for health care information data integration
EP1678606A2 (en) * 2003-09-17 2006-07-12 Research In Motion Limited System and method for management of mutating applications
US20050071135A1 (en) * 2003-09-30 2005-03-31 Vredenburgh David W. Knowledge management system for computer-aided design modeling
US8321278B2 (en) * 2003-09-30 2012-11-27 Google Inc. Targeted advertisements based on user profiles and page profile
US20050222989A1 (en) * 2003-09-30 2005-10-06 Taher Haveliwala Results based personalization of advertisements in a search engine
US8751950B2 (en) 2004-08-17 2014-06-10 Ice Edge Business Solutions Ltd. Capturing a user's intent in design software
US7591015B2 (en) * 2003-10-23 2009-09-15 Microsoft Corporation Secure kernel transactions
US7448028B2 (en) * 2003-10-23 2008-11-04 Sap Ag System and method for selective local object retrieval
US7539999B2 (en) * 2003-10-23 2009-05-26 Microsoft Corporation Kernel-level transactions
US20050108331A1 (en) * 2003-10-31 2005-05-19 Osterman Lawrence W. Presence tracking for datagram based protocols with search
US7536421B2 (en) * 2003-10-31 2009-05-19 Landmark Technology Partners, Inc. Intelligent client architecture computer system and method
US20050210272A1 (en) * 2003-11-17 2005-09-22 Fotta Keith A Method and apparatus for regulating unsolicited electronic mail
US7930149B2 (en) * 2003-12-19 2011-04-19 Sap Aktiengesellschaft Versioning of elements in a configuration model
US7293267B1 (en) * 2003-12-22 2007-11-06 Sun Microsystems Inc System and method for performing speculative initialization of application models for a cloned runtime system process
FR2864283B1 (en) * 2003-12-22 2006-05-05 Canon Kk METHOD AND DEVICE FOR CONTROLLING ACCESS TO A SHARED DOCUMENT IN A POST-TO-POST COMMUNICATION NETWORK
US8190780B2 (en) * 2003-12-30 2012-05-29 Sap Ag Cluster architecture having a star topology with centralized services
KR100567825B1 (en) * 2004-01-08 2006-04-05 삼성전자주식회사 Apparatus and method for sharing services on network
JP5101887B2 (en) * 2004-01-13 2012-12-19 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Home network content filtering method and system
JP4141391B2 (en) * 2004-02-05 2008-08-27 株式会社日立製作所 Storage subsystem
US8782024B2 (en) * 2004-02-12 2014-07-15 International Business Machines Corporation Managing the sharing of logical resources among separate partitions of a logically partitioned computer system
EP1723521A2 (en) * 2004-02-25 2006-11-22 Siemens Medical Solutions Health Services Corporation An executable application configuration system
US7698383B2 (en) * 2004-02-27 2010-04-13 Research In Motion Limited System and method for building component applications using metadata defined mapping between message and data domains
US8862570B1 (en) * 2004-03-02 2014-10-14 Rockstar Consortium Us Lp Method and apparatus for open management of multi-media services
US7493563B2 (en) * 2004-03-05 2009-02-17 International Business Machines Corporation Using content aggregation to build administration consoles
US7444633B2 (en) 2004-03-05 2008-10-28 International Business Machines Corporation Federating legacy/remote content into a central network console
US8589564B2 (en) * 2004-03-11 2013-11-19 International Business Machines Corporation Method and apparatus for maintaining compatibility within a distributed systems management environment with a plurality of configuration versions
US8782654B2 (en) 2004-03-13 2014-07-15 Adaptive Computing Enterprises, Inc. Co-allocating a reservation spanning different compute resources types
US20050251533A1 (en) * 2004-03-16 2005-11-10 Ascential Software Corporation Migrating data integration processes through use of externalized metadata representations
US7761406B2 (en) * 2004-03-16 2010-07-20 International Business Machines Corporation Regenerating data integration functions for transfer from a data integration platform
US20050216600A1 (en) * 2004-03-23 2005-09-29 Jonathan Maron System and method for providing a service in a controlled run-time environment
US8549541B2 (en) * 2004-03-26 2013-10-01 Intellectual Ventures Ii Llc Bridging local device communications across the wide area
US7716223B2 (en) * 2004-03-29 2010-05-11 Google Inc. Variable personalization of search results in a search engine
US8327290B2 (en) 2004-04-06 2012-12-04 International Business Machines Corporation User task interface in a web application
US7283986B2 (en) * 2004-04-08 2007-10-16 International Business Machines Corporation End-to-end business integration testing tool
US20060095483A1 (en) * 2004-04-23 2006-05-04 Waratek Pty Limited Modified computer architecture with finalization of objects
US7844665B2 (en) 2004-04-23 2010-11-30 Waratek Pty Ltd. Modified computer architecture having coordinated deletion of corresponding replicated memory locations among plural computers
GB2413655A (en) * 2004-04-30 2005-11-02 Hewlett Packard Development Co Method and system for updating hierarchical data structures
US7596788B1 (en) * 2004-05-11 2009-09-29 Platform Computing Corporation Support of non-trivial scheduling policies along with topological properties
US7587414B2 (en) * 2004-05-11 2009-09-08 Sap Ag Componentized content delivery
US7624193B2 (en) * 2004-05-14 2009-11-24 International Business Machines Corporation Multi-vendor mediation for subscription services
US20050262094A1 (en) * 2004-05-20 2005-11-24 Bea Systems, Inc. Systems and methods for enterprise collaboration
US20050273714A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Systems and methods for an embedded collaboration client
US8205254B2 (en) * 2004-05-20 2012-06-19 International Business Machines Corporation System for controlling write access to an LDAP directory
US20060031497A1 (en) * 2004-05-21 2006-02-09 Bea Systems, Inc. Systems and methods for collaborative content storage
US20060030292A1 (en) * 2004-05-20 2006-02-09 Bea Systems, Inc. Client programming for mobile client
US20050262075A1 (en) * 2004-05-21 2005-11-24 Bea Systems, Inc. Systems and methods for collaboration shared state management
US7530111B2 (en) 2004-05-20 2009-05-05 International Business Machines Corporation Write-access control system
US20060004690A1 (en) * 2004-05-21 2006-01-05 Bea Systems, Inc. Systems and methods for dynamic configuration of a collaboration
US20060031234A1 (en) * 2004-05-21 2006-02-09 Brodi Beartusk Systems and methods for a collaborative group chat
US20060010205A1 (en) * 2004-05-21 2006-01-12 Bea Systems, Inc. Systems and methods for collaboration impersonation
US20050262185A1 (en) * 2004-05-20 2005-11-24 Bea Systems, Inc. Systems and methods for a collaboration messaging framework
US20050262007A1 (en) * 2004-05-21 2005-11-24 Bea Systems, Inc. Systems and methods for a collaborative call center
US20050273382A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Systems and methods for collaborative co-navigation
US20050262093A1 (en) * 2004-05-20 2005-11-24 Bea Systems, Inc. Systems and methods for a collaboration client
US20050262006A1 (en) * 2004-05-20 2005-11-24 Bea Systems, Inc. Systems and methods for a collaboration server
US20050273668A1 (en) * 2004-05-20 2005-12-08 Richard Manning Dynamic and distributed managed edge computing (MEC) framework
US7650432B2 (en) 2004-05-20 2010-01-19 Bea Systems, Inc. Occasionally-connected application server
US20060031431A1 (en) * 2004-05-21 2006-02-09 Bea Systems, Inc. Reliable updating for a service oriented architecture
US20050273520A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Service oriented architecture with file transport protocol
US20050273517A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Service oriented architecture with credential management
US20050273521A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Dynamically configurable service oriented architecture
US20050273847A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Programmable message processing stage for a service oriented architecture
US20060031353A1 (en) * 2004-05-21 2006-02-09 Bea Systems, Inc. Dynamic publishing in a service oriented architecture
US7310684B2 (en) * 2004-05-21 2007-12-18 Bea Systems, Inc. Message processing in a service oriented architecture
US20060136555A1 (en) * 2004-05-21 2006-06-22 Bea Systems, Inc. Secure service oriented architecture
US7516127B2 (en) * 2004-05-21 2009-04-07 Computer Associates Think, Inc. Reporting module definition language system and method
US8112296B2 (en) 2004-05-21 2012-02-07 Siebel Systems, Inc. Modeling of job profile data
US20060031930A1 (en) * 2004-05-21 2006-02-09 Bea Systems, Inc. Dynamically configurable service oriented architecture
US7653008B2 (en) 2004-05-21 2010-01-26 Bea Systems, Inc. Dynamically configurable service oriented architecture
US20050273502A1 (en) * 2004-05-21 2005-12-08 Patrick Paul B Service oriented architecture with message processing stages
US20050270970A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Failsafe service oriented architecture
US7774485B2 (en) 2004-05-21 2010-08-10 Bea Systems, Inc. Dynamic service composition and orchestration
US8615601B2 (en) * 2004-05-21 2013-12-24 Oracle International Corporation Liquid computing
US20060010125A1 (en) * 2004-05-21 2006-01-12 Bea Systems, Inc. Systems and methods for collaborative shared workspaces
US20050267947A1 (en) * 2004-05-21 2005-12-01 Bea Systems, Inc. Service oriented architecture with message processing pipelines
US20050273516A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Dynamic routing in a service oriented architecture
US20050273497A1 (en) * 2004-05-21 2005-12-08 Bea Systems, Inc. Service oriented architecture with electronic mail transport protocol
US7865390B2 (en) 2004-05-21 2011-01-04 Siebel Systems, Inc. Modeling of employee performance result data
US20060069791A1 (en) * 2004-05-21 2006-03-30 Bea Systems, Inc. Service oriented architecture with interchangeable transport protocols
US20050267892A1 (en) * 2004-05-21 2005-12-01 Patrick Paul B Service proxy definition
US20060007918A1 (en) * 2004-05-21 2006-01-12 Bea Systems, Inc. Scaleable service oriented architecture
US20050278374A1 (en) * 2004-05-21 2005-12-15 Bea Systems, Inc. Dynamic program modification
US20060031354A1 (en) * 2004-05-21 2006-02-09 Bea Systems, Inc. Service oriented architecture
US20060031432A1 (en) * 2004-05-21 2006-02-09 Bea Systens, Inc. Service oriented architecture with message processing pipelines
US20050278335A1 (en) * 2004-05-21 2005-12-15 Bea Systems, Inc. Service oriented architecture with alerts
US20060080419A1 (en) * 2004-05-21 2006-04-13 Bea Systems, Inc. Reliable updating for a service oriented architecture
US7721283B2 (en) 2004-05-24 2010-05-18 Sap Ag Deploying a variety of containers in a Java 2 enterprise edition-based architecture
US8762981B2 (en) * 2004-05-24 2014-06-24 Sap Ag Application loading and visualization
US7735097B2 (en) * 2004-05-24 2010-06-08 Sap Ag Method and system to implement a deploy service to perform deployment services to extend and enhance functionalities of deployed applications
US7877735B2 (en) * 2004-05-25 2011-01-25 Sap Ag Application cloning
US7831724B2 (en) * 2004-05-25 2010-11-09 International Business Machines Corporation Services layer model for providing standards-based communications
US7747698B2 (en) * 2004-05-25 2010-06-29 Sap Ag Transaction model for deployment operations
US7882502B2 (en) * 2004-05-25 2011-02-01 Sap Ag Single file update
US7565630B1 (en) 2004-06-15 2009-07-21 Google Inc. Customization of search results for search queries received from third party sites
US20070266388A1 (en) 2004-06-18 2007-11-15 Cluster Resources, Inc. System and method for providing advanced reservations in a compute environment
US8161184B2 (en) * 2004-06-25 2012-04-17 Apple Inc. Method and apparatus for facilitating long-lived DNS queries
US9264384B1 (en) 2004-07-22 2016-02-16 Oracle International Corporation Resource virtualization mechanism including virtual host bus adapters
WO2009111885A1 (en) 2008-03-11 2009-09-17 Dirtt Environmental Solutions, Ltd. Automatically creating and modifying furniture layouts in design software
US7593916B2 (en) * 2004-08-19 2009-09-22 Sap Ag Managing data administration
US8176490B1 (en) 2004-08-20 2012-05-08 Adaptive Computing Enterprises, Inc. System and method of interfacing a workload manager and scheduler with an identity manager
US8312132B2 (en) * 2004-08-20 2012-11-13 Core Wireless Licensing S.A.R.L. Context data in UPNP service information
EP1782598B1 (en) * 2004-08-25 2007-12-12 Telefonaktiebolaget LM Ericsson (publ) Dynamical reconfiguration of distributed composite state machines
US7512953B1 (en) * 2004-08-31 2009-03-31 Sap Ag System and method for smart proxy creation and management within a distributed object-oriented architecture
DE102004043125B4 (en) * 2004-09-07 2017-10-05 Robert Bosch Gmbh throttling device
US20060059246A1 (en) * 2004-09-10 2006-03-16 Grove Adam J System and method for connection optimization
US9552599B1 (en) * 2004-09-10 2017-01-24 Deem, Inc. Platform for multi-service procurement
US7340672B2 (en) * 2004-09-20 2008-03-04 Intel Corporation Providing data integrity for data streams
US7475051B1 (en) 2004-09-22 2009-01-06 International Business Machines Corporation System and method for the cascading definition and enforcement of EDI rules
US7950044B2 (en) * 2004-09-28 2011-05-24 Rockwell Automation Technologies, Inc. Centrally managed proxy-based security for legacy automation systems
US7730494B1 (en) * 2005-04-20 2010-06-01 At&T Corp. Methods and apparatus for service and network management event correlation
US20060074729A1 (en) * 2004-10-02 2006-04-06 Capotosto Thomas P Managed services supply chain integration
US20060080117A1 (en) * 2004-10-12 2006-04-13 International Business Machines Corporation Maintaining integrity within an adaptive value chain involving cross enterprise interactions
US7532607B1 (en) * 2004-11-04 2009-05-12 At&T Intellectual Property Ii, L.P. Ad-hoc IP closed user group networks
US8271980B2 (en) 2004-11-08 2012-09-18 Adaptive Computing Enterprises, Inc. System and method of providing system jobs within a compute environment
US7752181B2 (en) * 2004-11-08 2010-07-06 Oracle International Corporation System and method for performing a data uniqueness check in a sorted data set
US20060106864A1 (en) * 2004-11-12 2006-05-18 International Business Machines Corporation System, computer program product and method of narrowing an enterprise Java bean (EJB) object reference to a home implementation class name
US7490316B2 (en) * 2004-12-02 2009-02-10 International Business Machines Corporation Method and apparatus to implement adaptive scripting tool
US20060123383A1 (en) * 2004-12-02 2006-06-08 International Business Machines Corporation Method and apparatus for a system management tool to adapt command interface and behavior based on installed features
US7734585B2 (en) * 2004-12-03 2010-06-08 Oracle International Corporation Updateable fan-out replication with reconfigurable master association
US20060126556A1 (en) * 2004-12-14 2006-06-15 Roundbox, Inc. Territory mapping for efficient content distribution in wireless networks using broadcast/multicast
US7415487B2 (en) * 2004-12-17 2008-08-19 Amazon Technologies, Inc. Apparatus and method for data warehousing
US8650178B2 (en) * 2005-01-07 2014-02-11 Thomson Reuters Global Resources Systems, methods and software for distributed loading of databases
US7937685B2 (en) 2005-01-13 2011-05-03 Hsbc Technology & Services (Usa) Inc. Computer software implemented framework for configuration and release management of group systems software, and method for same
US8675667B1 (en) * 2005-01-20 2014-03-18 Verizon Corporate Services Group Inc. Systems and methods for forming and operating robust communication networks for an enterprise
GB0501697D0 (en) * 2005-01-27 2005-03-02 Ibm Controlling service failover in clustered storage apparatus networks
US8108510B2 (en) * 2005-01-28 2012-01-31 Jds Uniphase Corporation Method for implementing TopN measurements in operations support systems
US7343364B2 (en) * 2005-02-04 2008-03-11 Efunds Corporation Rules-based system architecture and systems using the same
US7882236B2 (en) * 2005-02-04 2011-02-01 Microsoft Corporation Communication channel model
US20060179058A1 (en) * 2005-02-04 2006-08-10 Charles Bram Methods and systems for licensing computer software
US20060178856A1 (en) * 2005-02-04 2006-08-10 Keith Roberts Systems and methods for monitoring transaction devices
US7706895B2 (en) * 2005-02-25 2010-04-27 Rockwell Automation Technologies, Inc. Reliable messaging instruction
US7805422B2 (en) * 2005-02-28 2010-09-28 Microsoft Corporation Change notification query multiplexing
US9413687B2 (en) 2005-03-16 2016-08-09 Adaptive Computing Enterprises, Inc. Automatic workload transfer to an on-demand center
US8863143B2 (en) 2006-03-16 2014-10-14 Adaptive Computing Enterprises, Inc. System and method for managing a hybrid compute environment
US9231886B2 (en) 2005-03-16 2016-01-05 Adaptive Computing Enterprises, Inc. Simple integration of an on-demand compute environment
US7689645B2 (en) * 2005-03-24 2010-03-30 Fuji Xerox Co., Ltd. Systems and methods for brokering services
US7895594B2 (en) * 2005-03-28 2011-02-22 Freescale Semiconductor, Inc. Virtual machine extended capabilities using application contexts in a resource-constrained device
EP1866780A4 (en) * 2005-03-30 2013-07-31 Welch Allyn Inc Communication of information between a plurality of network elements
US20110258320A1 (en) * 2005-04-07 2011-10-20 Adaptive Computing Enterprises, Inc. Elastic management of compute resources between a web server and an on-demand compute environment
EP3203374B1 (en) 2005-04-07 2021-11-24 III Holdings 12, LLC On-demand access to compute resources
EP1872521A4 (en) * 2005-04-18 2008-07-02 Research In Motion Ltd System and method for generating a wireless application from a web service definition
ATE403327T1 (en) * 2005-04-19 2008-08-15 Sap Ag SYSTEM AND METHOD FOR ARRANGEMENT IN A NETWORK
US20060265704A1 (en) * 2005-04-21 2006-11-23 Holt John M Computer architecture and method of operation for multi-computer distributed processing with synchronization
US20060253455A1 (en) * 2005-05-05 2006-11-09 Microsoft Corporation Extensible type-based publication / subscription services
US7407892B2 (en) 2005-05-11 2008-08-05 Micron Technology, Inc. Deposition methods
CA2508091A1 (en) * 2005-05-20 2006-11-20 Eric Richer System and method of data brokering
US20060271552A1 (en) * 2005-05-26 2006-11-30 Venture Capital & Consulting Group, Llc. Targeted delivery of content
US20060277221A1 (en) * 2005-06-01 2006-12-07 Green Hills Software, Inc. Transactional file system with client partitioning
CA2611527A1 (en) * 2005-06-09 2006-12-21 Whirlpool Corporation Software architecture system and method for communication with, and management of, at least one component within a household appliance
US20060282502A1 (en) * 2005-06-10 2006-12-14 Koshak Richard L Method and system for translation of electronic data and software transport protocol with reusable components
US20060282287A1 (en) * 2005-06-10 2006-12-14 Mckinley Laurence M System for providing integrated healthcare management services
US20060287967A1 (en) * 2005-06-16 2006-12-21 International Business Machines Corporation Methods and apparatus for agreement-based automated service provisioning
US20070011147A1 (en) * 2005-06-22 2007-01-11 Affiniti, Inc. Systems and methods for retrieving data
US7877350B2 (en) 2005-06-27 2011-01-25 Ab Initio Technology Llc Managing metadata for graph-based computations
US20060294006A1 (en) * 2005-06-28 2006-12-28 International Business Machines Corporation Business transaction process controller for composite transactions
US10510087B2 (en) 2005-07-07 2019-12-17 Sermo, Inc. Method and apparatus for conducting an information brokering service
US7512633B2 (en) * 2005-07-13 2009-03-31 International Business Machines Corporation Conversion of hierarchically-structured HL7 specifications to relational databases
US20070022133A1 (en) * 2005-07-21 2007-01-25 International Business Machines Corporation Method and apparatus for automatically and configurably adjusting allocated database resources to avoid denial of service
US7698186B2 (en) * 2005-07-26 2010-04-13 International Business Machines Corporation Multi-level transaction flow monitoring
CN1908895B (en) * 2005-08-02 2010-05-05 国际商业机器公司 System and method for application program globalization problem verification
US20070033571A1 (en) * 2005-08-02 2007-02-08 Sap Ag Dynamic work center
US9813283B2 (en) 2005-08-09 2017-11-07 Oracle International Corporation Efficient data transfer between servers and remote peripherals
US20070035403A1 (en) * 2005-08-12 2007-02-15 Krishna Sudhir S Method and system of personal healthcare management
US7650366B1 (en) * 2005-09-09 2010-01-19 Netapp, Inc. System and method for generating a crash consistent persistent consistency point image set
US7801996B2 (en) * 2005-09-12 2010-09-21 Sap Ag Systems and methods for providing a local client proxy
US7600149B2 (en) * 2005-09-20 2009-10-06 International Business Machines Corporation Failure transparency for update applications under single-master configuration
US8448182B2 (en) * 2005-09-27 2013-05-21 Oracle International Corporation System and method for pause and resume message operations on destinations
US7739285B2 (en) * 2005-09-29 2010-06-15 Sap Ag Efficient handling of multipart queries against relational data
US10032160B2 (en) 2005-10-06 2018-07-24 Mastercard Mobile Transactions Solutions, Inc. Isolating distinct service provider widgets within a wallet container
US20130339232A1 (en) 2005-10-06 2013-12-19 C-Sam, Inc. Widget framework for securing account information for a plurality of accounts in a wallet
JP2009512018A (en) 2005-10-06 2009-03-19 シー・サム,インコーポレイテッド Transaction service
US20070089107A1 (en) * 2005-10-10 2007-04-19 Squires Steve Database communication method
US7512677B2 (en) * 2005-10-20 2009-03-31 Uplogix, Inc. Non-centralized network device management using console communications system and method
US7630991B2 (en) * 2005-10-27 2009-12-08 Microsoft Corporation Compiling join patterns using software transactional memories
GB2432752B (en) * 2005-11-29 2008-04-09 Motorola Inc Resource partitioning in a cellular communication system
US7606937B2 (en) 2005-12-02 2009-10-20 Microsoft Corporation Next site for distributed service connections
US20070130520A1 (en) * 2005-12-05 2007-06-07 Microsoft Corporation Extensible web service policy behavior
US7761573B2 (en) * 2005-12-07 2010-07-20 Avaya Inc. Seamless live migration of virtual machines across optical networks
US7747627B1 (en) * 2005-12-09 2010-06-29 Cisco Technology, Inc. Method and system for file retrieval using image virtual file system
US20070226020A1 (en) * 2005-12-22 2007-09-27 Park Song K Systems and Methods for Pre-Computing Price or Availability of a Resource
US7512880B2 (en) 2005-12-23 2009-03-31 Swift Creek Systems, Llc Method and system for presenting published information in a browser
US20070150441A1 (en) * 2005-12-23 2007-06-28 Morris Robert P Methods, systems, and computer program products for associating policies with tuples using a pub/sub protocol
US7716180B2 (en) * 2005-12-29 2010-05-11 Amazon Technologies, Inc. Distributed storage system with web services client interface
US20070156486A1 (en) * 2005-12-29 2007-07-05 Microsoft Corporation Multiple concurrent workflow persistence schemes
US8849691B2 (en) 2005-12-29 2014-09-30 Microsoft Corporation Modeling user input and interaction in workflow based applications
US20070156487A1 (en) * 2005-12-29 2007-07-05 Microsoft Corporation Object model on workflow
US8073929B2 (en) * 2005-12-29 2011-12-06 Panasonic Electric Works Co., Ltd. Systems and methods for managing a provider's online status in a distributed network
US8522194B2 (en) 2005-12-30 2013-08-27 Sap Ag Software modeling
US8396731B2 (en) 2005-12-30 2013-03-12 Sap Ag Architectural design for service procurement application software
US8448137B2 (en) * 2005-12-30 2013-05-21 Sap Ag Software model integration scenarios
US8380553B2 (en) 2005-12-30 2013-02-19 Sap Ag Architectural design for plan-driven procurement application software
US20070157155A1 (en) * 2005-12-30 2007-07-05 Peters Eric C System and method for software generation and execution
US8402426B2 (en) 2005-12-30 2013-03-19 Sap Ag Architectural design for make to stock application software
US8316344B2 (en) 2005-12-30 2012-11-20 Sap Ag Software model deployment units
US20070156752A1 (en) * 2005-12-30 2007-07-05 Ralf Becker Systems and methods for data retrieval and data maintenance for business (sub)objects
US20070162702A1 (en) * 2006-01-06 2007-07-12 Yang Lei System and method for acquiring data from a cache in a distributed network
US20070234277A1 (en) * 2006-01-24 2007-10-04 Hui Lei Method and apparatus for model-driven business performance management
US7587450B2 (en) 2006-02-01 2009-09-08 Swift Creek Systems, Llc HTTP publish/subscribe communication protocol
US8371932B2 (en) * 2006-02-07 2013-02-12 Wms Gaming Inc. Wager gaming network with wireless hotspots
WO2007092608A2 (en) * 2006-02-09 2007-08-16 Wms Gaming Inc. Wagering game server availability broadcast message system
US7730095B2 (en) * 2006-03-01 2010-06-01 Microsoft Corporation Controlling transactions in accordance with role based security
US20070245300A1 (en) * 2006-03-22 2007-10-18 Benjamin Chan Apparatus, system, and method for presenting project scheduling information in combination with workflow information
US8442850B2 (en) 2006-03-30 2013-05-14 Sap Ag Providing accounting software application as enterprise services
US7904909B1 (en) 2006-03-31 2011-03-08 Emc Corporation Architecture for using a model-based approach for managing resources in a networked environment
CN100558038C (en) * 2006-03-31 2009-11-04 国际商业机器公司 Service logger and related system and method
US8285827B1 (en) * 2006-03-31 2012-10-09 Emc Corporation Method and apparatus for resource management with a model-based architecture
US20070244904A1 (en) * 2006-04-18 2007-10-18 Kristopher Durski Method and Architecture for Goal Oriented Applications, Configurations and Workflow Solutions on-the-Fly
WO2007127812A2 (en) * 2006-04-25 2007-11-08 Pagebites Inc. Method for information gathering and dissemination in a social network
US20070263820A1 (en) * 2006-04-28 2007-11-15 International Business Machines Corporation Printing workflow services
US9792348B2 (en) * 2006-04-28 2017-10-17 Bmc Software, Inc. Overlay dataset
US8004974B2 (en) * 2006-05-09 2011-08-23 International Business Machines Corporation Virtualized computing architecture having multiple realms
US8645321B1 (en) * 2006-05-31 2014-02-04 Verizon Data Services Llc Asynchronous data integrity for enterprise computing
US8161075B1 (en) 2006-05-31 2012-04-17 Verizon Laboratories Inc. Systems and methods for managing integrated and customizable data
US20080005291A1 (en) * 2006-06-01 2008-01-03 International Business Machines Corporation Coordinated information dispersion in a distributed computing system
US7490111B2 (en) * 2006-06-07 2009-02-10 International Business Machines Corporation Efficient handling of mostly read data in a computer server
US8769065B1 (en) * 2006-06-28 2014-07-01 Emc Corporation Methods and apparatus for implementing a data management framework to collect network management data
US7865481B2 (en) * 2006-06-29 2011-01-04 International Business Machines Corporation Changing documents to include changes made to schemas
US8775930B2 (en) * 2006-07-07 2014-07-08 International Business Machines Corporation Generic frequency weighted visualization component
US8219900B2 (en) * 2006-07-07 2012-07-10 International Business Machines Corporation Programmatically hiding and displaying Wiki page layout sections
US8196039B2 (en) * 2006-07-07 2012-06-05 International Business Machines Corporation Relevant term extraction and classification for Wiki content
US20080010388A1 (en) * 2006-07-07 2008-01-10 Bryce Allen Curtis Method and apparatus for server wiring model
US20080010345A1 (en) * 2006-07-07 2008-01-10 Bryce Allen Curtis Method and apparatus for data hub objects
US7954052B2 (en) * 2006-07-07 2011-05-31 International Business Machines Corporation Method for processing a web page for display in a wiki environment
US20080010338A1 (en) * 2006-07-07 2008-01-10 Bryce Allen Curtis Method and apparatus for client and server interaction
US8560956B2 (en) 2006-07-07 2013-10-15 International Business Machines Corporation Processing model of an application wiki
US20080010387A1 (en) * 2006-07-07 2008-01-10 Bryce Allen Curtis Method for defining a Wiki page layout using a Wiki page
US20080010386A1 (en) * 2006-07-07 2008-01-10 Bryce Allen Curtis Method and apparatus for client wiring model
US7860882B2 (en) * 2006-07-08 2010-12-28 International Business Machines Corporation Method and system for distributed retrieval of data objects using tagged artifacts within federated protocol operations
US20080028086A1 (en) * 2006-07-27 2008-01-31 Chetuparambil Madhu K Method and Apparatus for Preserving Isolation of Web Applications when Executing Fragmented Requests
US9984080B2 (en) * 2006-08-01 2018-05-29 International Business Machines Corporation Efficient non-database file-expiration management for document retention
US7434010B2 (en) * 2006-08-04 2008-10-07 Microsoft Corporation Combined pessimistic and optimisitic concurrency control
US8601456B2 (en) * 2006-08-04 2013-12-03 Microsoft Corporation Software transactional protection of managed pointers
WO2008021079A2 (en) 2006-08-08 2008-02-21 Wms Gaming Inc. Configurable wagering game manager
CN103729330B (en) * 2006-08-10 2017-04-19 起元科技有限公司 Distributing services in graph-based computations
US8543808B2 (en) * 2006-08-24 2013-09-24 Microsoft Corporation Trusted intermediary for network data processing
US8295459B2 (en) * 2006-08-24 2012-10-23 Verisign, Inc. System and method for dynamically partitioning context servers
US7735051B2 (en) * 2006-08-29 2010-06-08 International Business Machines Corporation Method for replicating and synchronizing a plurality of physical instances with a logical master
US8577916B1 (en) 2006-09-01 2013-11-05 Avaya Inc. Search-based contact initiation method and apparatus
WO2008033346A2 (en) * 2006-09-12 2008-03-20 Morgan Stanley Systems and methods for establishing rules for communication with a host
KR101319491B1 (en) * 2006-09-21 2013-10-17 삼성전자주식회사 Apparatus and method for setting up domain information
US8291439B2 (en) * 2006-09-21 2012-10-16 Convergys Information Management Group, Inc. Data platform web services application programming interface
US20090210631A1 (en) 2006-09-22 2009-08-20 Bea Systems, Inc. Mobile application cache system
US7606842B2 (en) * 2006-09-27 2009-10-20 Hewlett-Packard Development Company, L.P. Method of merging a clone file system with an original file system
WO2008042907A2 (en) * 2006-10-02 2008-04-10 Presenceid, Inc. Systems and methods for managing identities in a database system
US20080082532A1 (en) * 2006-10-03 2008-04-03 International Business Machines Corporation Using Counter-Flip Acknowledge And Memory-Barrier Shoot-Down To Simplify Implementation of Read-Copy Update In Realtime Systems
US7634553B2 (en) * 2006-10-09 2009-12-15 Raytheon Company Service proxy for emulating a service in a computer infrastructure for testing and demonstration
US8150798B2 (en) 2006-10-10 2012-04-03 Wells Fargo Bank, N.A. Method and system for automated coordination and organization of electronic communications in enterprises
ATE455429T1 (en) * 2006-10-13 2010-01-15 Quipa Holdings Ltd METHOD FOR BUILDING A SECURE VIRTUAL PRIVATE NETWORK FOR PEER-TO-PEER COMMUNICATION
US20080109423A1 (en) * 2006-11-08 2008-05-08 Eric Lawrence Barsness Apparatus and method for database partition elimination for sampling queries
US8335493B2 (en) * 2006-11-10 2012-12-18 Sony Ericsson Mobile Communications Ab System and method for service selection in a portable device
US8549122B2 (en) * 2006-12-04 2013-10-01 Oracle International Corporation System and method for communication agent within a fully distributed network
US7809666B2 (en) * 2006-12-07 2010-10-05 International Business Machines Corporation Method and system for sequential compilation and execution of rules
US20080140802A1 (en) * 2006-12-08 2008-06-12 Microsoft Corporation Offsite centralized data center providing client functionality
US9330190B2 (en) 2006-12-11 2016-05-03 Swift Creek Systems, Llc Method and system for providing data handling information for use by a publish/subscribe client
US7822792B2 (en) * 2006-12-15 2010-10-26 Sap Ag Administration of planning file entries in planning systems with concurrent transactions
US7774329B1 (en) 2006-12-22 2010-08-10 Amazon Technologies, Inc. Cross-region data access in partitioned framework
US8150870B1 (en) 2006-12-22 2012-04-03 Amazon Technologies, Inc. Scalable partitioning in a multilayered data service framework
US7693953B2 (en) * 2007-01-12 2010-04-06 Microsoft Corporation Providing Web services for wireless communication devices
US8656350B2 (en) * 2007-02-06 2014-02-18 Software Ag Event-based process configuration
US20080282205A1 (en) * 2007-02-06 2008-11-13 Access Systems Americas, Inc. Unified launcher user interface system and method for integrating multiple disparate environments on an electronic device
US9009234B2 (en) 2007-02-06 2015-04-14 Software Ag Complex event processing system having multiple redundant event processing engines
US8276115B2 (en) 2007-02-06 2012-09-25 Progress Software Corporation Automated construction and deployment of complex event processing applications and business activity monitoring dashboards
US20080222659A1 (en) * 2007-03-09 2008-09-11 Microsoft Corporation Abstracting operating environment from operating system
US20080226075A1 (en) * 2007-03-14 2008-09-18 Trapeze Networks, Inc. Restricted services for wireless stations
US20080244470A1 (en) * 2007-03-30 2008-10-02 Motorola, Inc. Theme records defining desired device characteristics and method of sharing
US20080237337A1 (en) * 2007-03-30 2008-10-02 Motorola, Inc. Stakeholder certificates
US7539796B2 (en) * 2007-03-30 2009-05-26 Motorola, Inc. Configuration management of an electronic device wherein a new configuration of the electronic device is selected based on attributes of an application
US20080250407A1 (en) * 2007-04-05 2008-10-09 Microsoft Corporation Network group name for virtual machines
US8024396B2 (en) 2007-04-26 2011-09-20 Microsoft Corporation Distributed behavior controlled execution of modeled applications
US7747705B1 (en) 2007-05-08 2010-06-29 Avaya Inc. Method to make a discussion forum or RSS feed a source for customer contact into a multimedia contact center that is capable of handling emails
US8996394B2 (en) * 2007-05-18 2015-03-31 Oracle International Corporation System and method for enabling decision activities in a process management and design environment
US7865901B2 (en) * 2007-05-21 2011-01-04 International Business Machines Corporation Managing memory resident objects to optimize a runtime environment
US8028277B2 (en) 2007-05-21 2011-09-27 International Business Machines Corporation Self-healing system and method for code optimization in a computing environment
US20080300945A1 (en) * 2007-05-31 2008-12-04 Michel Shane Simpson Techniques for sharing resources across multiple independent project lifecycles
EP2168039A4 (en) * 2007-05-31 2014-11-05 Informatica Corp Distributed system for monitoring information events
US20080307036A1 (en) * 2007-06-07 2008-12-11 Microsoft Corporation Central service allocation system
US8185916B2 (en) 2007-06-28 2012-05-22 Oracle International Corporation System and method for integrating a business process management system with an enterprise service bus
US7970892B2 (en) 2007-06-29 2011-06-28 Microsoft Corporation Tuning and optimizing distributed systems with declarative models
US8239505B2 (en) 2007-06-29 2012-08-07 Microsoft Corporation Progressively implementing declarative models in distributed systems
US8180865B2 (en) * 2007-07-11 2012-05-15 International Business Machines Corporation System and method for application server/operating system network/configuration management
KR101758670B1 (en) * 2007-07-26 2017-07-18 아브 이니티오 테크놀로지 엘엘시 Transactional graph-based computation with error handling
AU2008281324B2 (en) * 2007-07-30 2010-06-10 Clear Falls Pty Ltd A method and system for reactively assigning computational threads of control between processors
US20090037700A1 (en) * 2007-07-30 2009-02-05 Clear Falls Pty Ltd Method and system for reactively assigning computational threads of control between processors
US20090037588A1 (en) * 2007-07-31 2009-02-05 Morris Robert P Method And System For Providing Status Information Of At Least Two Related Principals
US20090048894A1 (en) * 2007-08-14 2009-02-19 Michel Shane Simpson Techniques for propagating changes in projects
US8230386B2 (en) 2007-08-23 2012-07-24 Microsoft Corporation Monitoring distributed applications
US20090055466A1 (en) * 2007-08-23 2009-02-26 Prima Grid Ltd. Grid-based system for providing business services in data networks
US20090055751A1 (en) * 2007-08-24 2009-02-26 Microsoft Corporation Management System for Local and Remote Services
US7702694B1 (en) * 2007-09-07 2010-04-20 Southern Company Services, Inc. System and method for organizing managing and accessing large quantities of data from non-homogenous data sources
US20090082880A1 (en) * 2007-09-20 2009-03-26 Tridium Inc. Wireless device for a building control system
US8566338B2 (en) * 2007-09-21 2013-10-22 International Business Machines Corporation Automatically making changes in a document in a content management system based on a change by a user to other content in the document
US8041773B2 (en) 2007-09-24 2011-10-18 The Research Foundation Of State University Of New York Automatic clustering for self-organizing grids
KR20100080822A (en) 2007-09-28 2010-07-12 엑세리온 악티에볼라그 Network operating system
KR100984691B1 (en) * 2007-10-01 2010-10-01 김기미 Contents Relationship Management system By multiple internet domain
US8131663B1 (en) 2007-10-12 2012-03-06 Bonamy Taylor Apparatus for generating software logic rules by flowchart design
US8707318B2 (en) * 2007-10-12 2014-04-22 Microsoft Corporation Partitioning system including a generic partitioning manager for partitioning resources
US8266634B2 (en) * 2007-10-12 2012-09-11 Microsoft Corporation Resource assignment system with recovery notification
US7926070B2 (en) 2007-10-26 2011-04-12 Microsoft Corporation Performing requested commands for model-based applications
US8099720B2 (en) 2007-10-26 2012-01-17 Microsoft Corporation Translating declarative models
US8181151B2 (en) 2007-10-26 2012-05-15 Microsoft Corporation Modeling and managing heterogeneous applications
US8225308B2 (en) 2007-10-26 2012-07-17 Microsoft Corporation Managing software lifecycle
US7974939B2 (en) 2007-10-26 2011-07-05 Microsoft Corporation Processing model-based commands for distributed applications
US9176714B2 (en) * 2007-11-12 2015-11-03 International Business Machines Corporation Re-using legacy libraries in software
US20090125496A1 (en) * 2007-11-13 2009-05-14 B-Hive Networks, Inc Network device and method for monitoring of backend transactions in data centers
US8108522B2 (en) * 2007-11-14 2012-01-31 International Business Machines Corporation Autonomic definition and management of distributed application information
US10083420B2 (en) 2007-11-21 2018-09-25 Sermo, Inc Community moderated information
US8019795B2 (en) * 2007-12-05 2011-09-13 Microsoft Corporation Data warehouse test automation framework
US8849946B2 (en) * 2007-12-05 2014-09-30 Oracle International Corporation System and method for hypertext transfer protocol publish and subscribe server
US8266635B2 (en) * 2007-12-20 2012-09-11 Access Co., Ltd. Browser-based user interface and control architecture with priority attributes
JP5507046B2 (en) * 2007-12-27 2014-05-28 株式会社インテック Service provision system
US8447657B2 (en) 2007-12-31 2013-05-21 Sap Ag Architectural design for service procurement application software
US9600438B2 (en) * 2008-01-03 2017-03-21 Florida Institute For Human And Machine Cognition, Inc. Process integrated mechanism apparatus and program
US20090223128A1 (en) * 2008-03-06 2009-09-10 Kuschak Brian C Hydroponic Monitor And Controller Apparatus with Network Connectivity and Remote Access
US8892726B2 (en) 2008-03-30 2014-11-18 Correlsense Ltd. Apparatus and method for tracking requests in a multi threaded multi tier computerized environment
US8412542B2 (en) * 2008-04-25 2013-04-02 Peoplechart Corporation Scoring system for monitoring or measuring adherence in medical treatment
US20090276654A1 (en) * 2008-05-02 2009-11-05 International Business Machines Corporation Systems and methods for implementing fault tolerant data processing services
CN101593136B (en) * 2008-05-30 2012-05-02 国际商业机器公司 Method for obtaining high availability by using computers and computer system
US8341532B2 (en) * 2008-06-10 2012-12-25 Microsoft Corporation Automated set-up of a collaborative workspace
US8171411B1 (en) 2008-08-18 2012-05-01 National CineMedia LLC System and method for delivering content in a movie trailer
US9842004B2 (en) * 2008-08-22 2017-12-12 Red Hat, Inc. Adjusting resource usage for cloud-based networks
US20100050179A1 (en) * 2008-08-22 2010-02-25 Ajay Mohindra Layered capacity driven provisioning in distributed environments
US9411864B2 (en) * 2008-08-26 2016-08-09 Zeewise, Inc. Systems and methods for collection and consolidation of heterogeneous remote business data using dynamic data handling
US8413115B1 (en) * 2008-08-28 2013-04-02 Raytheon Company Specifying integration points of a system-of-systems
US20100057746A1 (en) * 2008-08-29 2010-03-04 Gary Brown Virtual representation
US8977673B2 (en) * 2008-08-29 2015-03-10 Red Hat, Inc. Information on availability of services provided by publish-subscribe service
US8296246B2 (en) * 2008-09-02 2012-10-23 International Business Machines Corporation Allocating virtual universe customer service
US8250195B2 (en) * 2008-09-10 2012-08-21 Microsoft Corporation Leveraging synchronous communication protocols to enable asynchronous application and line-of-business behaviors
US8407205B2 (en) * 2008-09-11 2013-03-26 Salesforce.Com, Inc. Automating sharing data between users of a multi-tenant database service
US8984046B2 (en) * 2008-09-12 2015-03-17 International Business Machines Corporation Process management using representation state transfer architecture
US8401928B2 (en) 2008-09-18 2013-03-19 Sap Ag Providing supplier relationship management software application as enterprise services
US8189583B2 (en) * 2008-09-29 2012-05-29 Motorola Solutions, Inc. System and method for peer-to-peer wide area network communication
US7822853B2 (en) * 2008-09-30 2010-10-26 Microsoft Corporation Stabilization of distributed systems
WO2010042658A1 (en) 2008-10-07 2010-04-15 Bioparadox, Llc Use of platelet rich plasma composition in the treatment of cardiac conduction abnormalities
EP2337617A4 (en) * 2008-10-09 2013-06-12 Bioparadox Llc Platelet rich plasma formulations for cardiac treatments
US8290984B2 (en) * 2008-10-21 2012-10-16 Oracle International Corporation Configuration deployment management
US8312419B2 (en) * 2008-10-30 2012-11-13 Hewlett-Packard Development Company, L.P. Automated lifecycle management of a computer implemented service
US8661056B1 (en) * 2008-11-03 2014-02-25 Salesforce.Com, Inc. System, method and computer program product for publicly providing web content of a tenant using a multi-tenant on-demand database service
WO2010054062A2 (en) 2008-11-05 2010-05-14 Savvion Inc. Software with improved view of a business process
US8229775B2 (en) 2008-11-06 2012-07-24 International Business Machines Corporation Processing of provenance data for automatic discovery of enterprise process information
US9053437B2 (en) 2008-11-06 2015-06-09 International Business Machines Corporation Extracting enterprise information through analysis of provenance data
US8209204B2 (en) 2008-11-06 2012-06-26 International Business Machines Corporation Influencing behavior of enterprise operations during process enactment using provenance data
US11049048B2 (en) * 2008-11-06 2021-06-29 International Business Machines Corporation Managing reusable business process modeling (BPM) assets
US9986279B2 (en) 2008-11-26 2018-05-29 Free Stream Media Corp. Discovery, access control, and communication with networked services
US9154942B2 (en) 2008-11-26 2015-10-06 Free Stream Media Corp. Zero configuration communication between a browser and a networked media device
US9961388B2 (en) 2008-11-26 2018-05-01 David Harrison Exposure of public internet protocol addresses in an advertising exchange server to improve relevancy of advertisements
US10419541B2 (en) 2008-11-26 2019-09-17 Free Stream Media Corp. Remotely control devices over a network without authentication or registration
US9386356B2 (en) 2008-11-26 2016-07-05 Free Stream Media Corp. Targeting with television audience data across multiple screens
US9026668B2 (en) 2012-05-26 2015-05-05 Free Stream Media Corp. Real-time and retargeted advertising on multiple screens of a user watching television
US10334324B2 (en) 2008-11-26 2019-06-25 Free Stream Media Corp. Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device
US10567823B2 (en) 2008-11-26 2020-02-18 Free Stream Media Corp. Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device
US8180891B1 (en) 2008-11-26 2012-05-15 Free Stream Media Corp. Discovery, access control, and communication with networked services from within a security sandbox
US10880340B2 (en) 2008-11-26 2020-12-29 Free Stream Media Corp. Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US9519772B2 (en) 2008-11-26 2016-12-13 Free Stream Media Corp. Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device
US10977693B2 (en) 2008-11-26 2021-04-13 Free Stream Media Corp. Association of content identifier of audio-visual data with additional data through capture infrastructure
US10631068B2 (en) 2008-11-26 2020-04-21 Free Stream Media Corp. Content exposure attribution based on renderings of related content across multiple devices
US8401908B2 (en) 2008-12-03 2013-03-19 Sap Ag Architectural design for make-to-specification application software
US8671035B2 (en) 2008-12-11 2014-03-11 Sap Ag Providing payroll software application as enterprise services
US8775651B2 (en) * 2008-12-12 2014-07-08 Raytheon Company System and method for dynamic adaptation service of an enterprise service bus over a communication platform
US8332443B2 (en) 2008-12-19 2012-12-11 Microsoft Corporation Masterless distributed batch scheduling engine
US9354847B2 (en) 2008-12-29 2016-05-31 Microsoft Technology Licensing, Llc Interface infrastructure for a continuation based runtime
US20100169289A1 (en) * 2008-12-30 2010-07-01 International Business Machines Corporation Two Phase Commit With Grid Elements
EP2392099B1 (en) * 2009-02-02 2017-10-04 Nokia Solutions and Networks Oy Communicating a network event
US9105014B2 (en) * 2009-02-03 2015-08-11 International Business Machines Corporation Interactive avatar in messaging environment
US8401992B2 (en) * 2009-02-06 2013-03-19 IT Actual, Sdn. Bhd. Computing platform based on a hierarchy of nested data structures
KR20150038758A (en) 2009-02-13 2015-04-08 아브 이니티오 테크놀로지 엘엘시 Managing task execution
US9077750B2 (en) 2009-02-27 2015-07-07 Red Hat, Inc. Using forums as a message transport in an enterprise service bus
US8849702B2 (en) * 2009-03-13 2014-09-30 Ricoh Company, Ltd. Information processing apparatus, information processing method, and image forming apparatus
US8448185B2 (en) * 2009-03-23 2013-05-21 Siemens Aktiengesellschaft Method and system for dynamic discovery of services in a communication framework
US20100250301A1 (en) * 2009-03-27 2010-09-30 Christopher Collard Automated Assessment Service-System And Solution MRI
US8140655B1 (en) * 2009-05-18 2012-03-20 Lockheed Martin Corporation Dynamic enclave computing system
US8364513B2 (en) * 2009-06-09 2013-01-29 Accenture Global Services Limited Technician control system
US8321253B2 (en) * 2009-06-09 2012-11-27 Accenture Global Services Limited Technician control system
US8145758B2 (en) * 2009-06-15 2012-03-27 Microsoft Corporation Concurrent processing with untrusted beings
US20100332622A1 (en) * 2009-06-25 2010-12-30 Sun Microsystems, Inc. Distributed Resource and Service Management System and Method for Managing Distributed Resources and Services
US10191778B1 (en) 2015-11-16 2019-01-29 Turbonomic, Inc. Systems, apparatus and methods for management of software containers
US9830566B1 (en) 2014-11-10 2017-11-28 Turbonomic, Inc. Managing resources in computer systems using action permits
US9830192B1 (en) 2014-11-10 2017-11-28 Turbonomic, Inc. Managing application performance in virtualization systems
US9852011B1 (en) 2009-06-26 2017-12-26 Turbonomic, Inc. Managing resources in virtualization systems
US11272013B1 (en) 2009-06-26 2022-03-08 Turbonomic, Inc. Systems, apparatus, and methods for managing computer workload availability and performance
US10552586B1 (en) 2015-11-16 2020-02-04 Turbonomic, Inc. Systems, apparatus and methods for management of computer-based software licenses
USRE48714E1 (en) 2009-06-26 2021-08-31 Turbonomic, Inc. Managing application performance in virtualization systems
US9858123B1 (en) 2014-11-10 2018-01-02 Turbonomic, Inc. Moving resource consumers in computer systems
US9805345B1 (en) 2014-11-10 2017-10-31 Turbonomic, Inc. Systems, apparatus, and methods for managing quality of service agreements
US9888067B1 (en) * 2014-11-10 2018-02-06 Turbonomic, Inc. Managing resources in container systems
USRE48663E1 (en) 2009-06-26 2021-07-27 Turbonomic, Inc. Moving resource consumers in computer systems
US10673952B1 (en) 2014-11-10 2020-06-02 Turbonomic, Inc. Systems, apparatus, and methods for managing computer workload availability and performance
US10346775B1 (en) 2015-11-16 2019-07-09 Turbonomic, Inc. Systems, apparatus and methods for cost and performance-based movement of applications and workloads in a multiple-provider system
US8615713B2 (en) * 2009-06-26 2013-12-24 Xerox Corporation Managing document interactions in collaborative document environments of virtual worlds
USRE48680E1 (en) * 2009-06-26 2021-08-10 Turbonomic, Inc. Managing resources in container systems
US20110010280A1 (en) * 2009-07-09 2011-01-13 Aczen Innovations Inc. System and method for creating a time sheet
US8554801B2 (en) * 2009-07-10 2013-10-08 Robert Mack Method and apparatus for converting heterogeneous databases into standardized homogeneous databases
US8370504B2 (en) * 2009-07-15 2013-02-05 Verisign, Inc. Method and system for predicting domain name registration renewal probability
US9329951B2 (en) 2009-07-31 2016-05-03 Paypal, Inc. System and method to uniformly manage operational life cycles and service levels
US9973446B2 (en) 2009-08-20 2018-05-15 Oracle International Corporation Remote shared server peripherals over an Ethernet network for resource virtualization
US20110055367A1 (en) * 2009-08-28 2011-03-03 Dollar James E Serial port forwarding over secure shell for secure remote management of networked devices
US20110055899A1 (en) * 2009-08-28 2011-03-03 Uplogix, Inc. Secure remote management of network devices with local processing and secure shell for remote distribution of information
ES2393952T3 (en) * 2009-09-18 2013-01-02 Koninklijke Kpn N.V. Provide business services in a service supply network
US8667329B2 (en) 2009-09-25 2014-03-04 Ab Initio Technology Llc Processing transactions in graph-based applications
US8732247B2 (en) * 2009-09-28 2014-05-20 Bjorn Michael Dittmer-Roche System and method of simultaneous collaboration
US8620879B2 (en) * 2009-10-13 2013-12-31 Google Inc. Cloud based file storage service
US10877695B2 (en) 2009-10-30 2020-12-29 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
US11720290B2 (en) 2009-10-30 2023-08-08 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
US20110113007A1 (en) * 2009-11-12 2011-05-12 Richard Buckley Flex Computing End-User Profiling
US9137206B2 (en) 2009-11-20 2015-09-15 International Business Machines Corporation Service registry for saving and restoring a faceted selection
US20110121108A1 (en) * 2009-11-24 2011-05-26 Stephan Rodewald Plasma polymerization nozzle
EP2504783A4 (en) 2009-11-24 2015-02-25 Ice Edge Business Solutions Inc Securely sharing design renderings over a network
US8560556B2 (en) * 2010-01-12 2013-10-15 International Business Machines Corporation Dynamic aliasing of multi-valued binary attributes in directories
US8244754B2 (en) 2010-02-01 2012-08-14 International Business Machines Corporation System and method for object searching in virtual worlds
US8990185B2 (en) * 2010-02-19 2015-03-24 International Business Machines Corporation Evaluating reference based operations in shared nothing parallelism systems
US8315977B2 (en) * 2010-02-22 2012-11-20 Netflix, Inc. Data synchronization between a data center environment and a cloud computing environment
US20110246518A1 (en) * 2010-04-01 2011-10-06 Verizon Patent And Licensing Inc. Method and system of distributed caching
US8566724B2 (en) 2010-04-14 2013-10-22 Bank Of America Corporation Online customization of information using a site management module
US8453166B2 (en) * 2010-04-14 2013-05-28 Bank Of America Corporation Data services framework visibility component
US8572023B2 (en) 2010-04-14 2013-10-29 Bank Of America Corporation Data services framework workflow processing
US8589213B2 (en) 2010-10-21 2013-11-19 Hsbc Technology & Services (Usa) Inc. Computer metrics system and process for implementing same
WO2011146711A1 (en) 2010-05-21 2011-11-24 Hsbc Technologies Inc. Account opening computer system architecture and process for implementing same
US9275360B2 (en) 2010-05-21 2016-03-01 Hsbc Technology & Services (Usa) Inc. Account opening flow configuration computer system and process for implementing same
US8843939B2 (en) 2010-10-11 2014-09-23 Hsbc Technology & Services (Usa) Inc. Computer architecture and process for application processing engine
US8645248B2 (en) 2010-10-27 2014-02-04 Hsbc Technology & Services (Usa) Inc. Integrated customer communications computer system and process for implementing same
US8799922B2 (en) * 2010-05-25 2014-08-05 Microsoft Corporation Programming model for collaborative distributed systems
CN107066241B (en) 2010-06-15 2021-03-09 起元技术有限责任公司 System and method for dynamically loading graph-based computations
US8200624B2 (en) 2010-07-20 2012-06-12 Sybase, Inc. Membership tracking and data eviction in mobile middleware scenarios
US8190640B2 (en) 2010-08-12 2012-05-29 Synopsys, Inc. Group management using Unix NIS groups
US8301477B2 (en) * 2010-08-23 2012-10-30 International Business Machines Corporation Consolidating processes for multiple variations
US8229943B2 (en) * 2010-08-26 2012-07-24 Hewlett-Packard Development Company, L.P. System and method for modifying an executing query
US20120072509A1 (en) * 2010-09-03 2012-03-22 Booth Lloyd George Method and system for integrating applications within a work process
JP5743469B2 (en) * 2010-09-22 2015-07-01 キヤノン株式会社 Information processing apparatus, control method thereof, and control program
US9331963B2 (en) 2010-09-24 2016-05-03 Oracle International Corporation Wireless host I/O using virtualized I/O controllers
WO2012050176A1 (en) * 2010-10-13 2012-04-19 株式会社エヌ・ティ・ティ・ドコモ Position information aggregation device and position information aggregation method
US9465836B2 (en) * 2010-12-23 2016-10-11 Sap Se Enhanced business object retrieval
EP2472450A1 (en) * 2010-12-28 2012-07-04 Hasso-Plattner-Institut für Softwaresystemtechnik GmbH A search method for a containment-aware discovery service
EP2472449A1 (en) 2010-12-28 2012-07-04 Hasso-Plattner-Institut für Softwaresystemtechnik GmbH A filter method for a containment-aware discovery service
EP2472448A1 (en) 2010-12-28 2012-07-04 Hasso-Plattner-Institut für Softwaresystemtechnik GmbH A communication protocol for a communication-aware discovery service
JP5387596B2 (en) * 2011-02-28 2014-01-15 ブラザー工業株式会社 Information communication system, information communication method, information processing apparatus, and program
US8874640B2 (en) * 2011-03-01 2014-10-28 Infosys Limited Method and system for reducing service overhead in service oriented architectures
US8949294B2 (en) 2011-03-23 2015-02-03 Red Hat, Inc. Data grid supporting multiple protocols
US9208211B2 (en) * 2011-03-23 2015-12-08 Red Hat, Inc. Performing object relational mapping for a data grid
US9244741B2 (en) * 2011-04-02 2016-01-26 Open Invention Network, Llc System and method for service mobility
US9928483B2 (en) * 2011-04-20 2018-03-27 Level 3 Communication, Llc Automated topology change detection and policy based provisioning and remediation in information technology systems
US8804485B2 (en) * 2011-05-06 2014-08-12 Tellabs Operations, Inc. Method and apparatus for coordinating fault recovery techniques among domains
US8874619B2 (en) * 2011-06-03 2014-10-28 Robert Mack Method and apparatus for defining common entity relationships
US10417263B2 (en) 2011-06-03 2019-09-17 Robert Mack Method and apparatus for implementing a set of integrated data systems
CA2796664C (en) 2011-06-11 2019-02-12 Dirtt Environmental Solutions, Ltd. Automated re-use of structural components
US8806003B2 (en) 2011-06-14 2014-08-12 International Business Machines Corporation Forecasting capacity available for processing workloads in a networked computing environment
US20130117064A1 (en) * 2011-06-17 2013-05-09 Progress Software Corporation Business process analysis combining modeling, simulation and collaboration with web and cloud delivery
US8964741B2 (en) * 2011-06-21 2015-02-24 Cisco Technology, Inc. Adjacency discovery through multicast and single-hop messaging
US8527309B2 (en) 2011-06-30 2013-09-03 Verisign, Inc. Targeted campaign management system and method
US9646278B2 (en) 2011-07-14 2017-05-09 International Business Machines Corporation Decomposing a process model in an enterprise intelligence (‘EI’) framework
US9639815B2 (en) * 2011-07-14 2017-05-02 International Business Machines Corporation Managing processes in an enterprise intelligence (‘EI’) assembly of an EI framework
US9659266B2 (en) 2011-07-14 2017-05-23 International Business Machines Corporation Enterprise intelligence (‘EI’) management in an EI framework
US9047323B2 (en) * 2011-07-27 2015-06-02 Emc Corporation System and method for reviewing role definitions
US8538920B2 (en) * 2011-08-08 2013-09-17 Hewlett-Packard Development Company, L.P. System and method for storage service
US9063673B2 (en) * 2011-08-30 2015-06-23 Uniquesoft, Llc System and method for implementing application code from application requirements
US8423575B1 (en) 2011-09-29 2013-04-16 International Business Machines Corporation Presenting information from heterogeneous and distributed data sources with real time updates
CA2852059C (en) 2011-10-12 2021-03-16 C-Sam, Inc. A multi-tiered secure mobile transactions enabling platform
US8849776B2 (en) * 2011-10-17 2014-09-30 Yahoo! Inc. Method and system for resolving data inconsistency
US10277421B2 (en) * 2011-10-31 2019-04-30 Extreme Networks, Inc. Route lookup resolution
US9544759B2 (en) 2011-11-01 2017-01-10 Google Inc. Systems, methods, and computer program products for managing states
US8825506B2 (en) * 2011-11-01 2014-09-02 Nec Laboratories America, Inc. Generation and optimization of data sharing among multiple data sources and consumers
US8875228B2 (en) 2011-11-01 2014-10-28 Jvl Ventures, Llc Systems, methods, and computer program products for managing secure elements
US9128479B2 (en) * 2011-11-11 2015-09-08 Rockwell Automation Technologies, Inc. Automation control and monitoring system and method
US9536264B2 (en) 2011-11-14 2017-01-03 Microsoft Technology Licensing, Llc Host agnostic messaging in a continuation based runtime
EP2791819B1 (en) 2011-12-14 2017-11-01 Level 3 Communications, LLC Content delivery network
US9367560B1 (en) * 2011-12-14 2016-06-14 Unboundid, Corp. Method, system and apparatus for synchronizing changes in a directory service
US9852010B2 (en) 2012-02-03 2017-12-26 Microsoft Technology Licensing, Llc Decoupling partitioning for scalability
US8868711B2 (en) 2012-02-03 2014-10-21 Microsoft Corporation Dynamic load balancing in a scalable environment
US10860384B2 (en) 2012-02-03 2020-12-08 Microsoft Technology Licensing, Llc Managing partitions in a scalable environment
US10019371B2 (en) * 2012-04-27 2018-07-10 Hewlett Packard Enterprise Development Lp Data caching using local and remote memory
US10155168B2 (en) 2012-05-08 2018-12-18 Snap Inc. System and method for adaptable avatars
US9274668B2 (en) * 2012-06-05 2016-03-01 Dimensional Insight Incorporated Guided page navigation
US10755233B2 (en) 2012-06-05 2020-08-25 Dimensional Insight Incorporated Guided page navigation
US10671955B2 (en) * 2012-06-05 2020-06-02 Dimensional Insight Incorporated Dynamic generation of guided pages
US10445674B2 (en) * 2012-06-05 2019-10-15 Dimensional Insight Incorporated Measure factory
US9100289B2 (en) 2012-11-02 2015-08-04 Juniper Networks, Inc. Creating searchable and global database of user visible process traces
US9176769B2 (en) 2012-06-29 2015-11-03 Microsoft Technology Licensing, Llc Partitioned array objects in a distributed runtime
US8924944B2 (en) 2012-06-29 2014-12-30 Microsoft Corporation Implementation of distributed methods that support generic functions
US9442687B2 (en) * 2012-07-23 2016-09-13 Korea Advanced Institute Of Science And Technology Method and apparatus for moving web object based on intent
US8676709B2 (en) 2012-07-31 2014-03-18 Google Inc. Merchant category codes in a proxy card transaction
US9025434B2 (en) 2012-09-14 2015-05-05 Microsoft Technology Licensing, Llc Automated datacenter network failure mitigation
JP6072907B2 (en) * 2012-09-18 2017-02-01 グーグル インコーポレイテッド Systems, methods, and computer program products for interfacing trusted service managers and secure elements of multiple service providers
US9880916B2 (en) 2012-09-25 2018-01-30 International Business Machines Corporation Management of system events using one or more event attributes
US9171252B2 (en) 2012-10-11 2015-10-27 Sap Se Synchronization for context-aware complex event processing
US9083550B2 (en) 2012-10-29 2015-07-14 Oracle International Corporation Network virtualization over infiniband
US9641631B2 (en) 2012-11-14 2017-05-02 Cellular South, Inc. Dba C Spire Wireless Integrated personalized content recommendation and management system and method
US9507682B2 (en) 2012-11-16 2016-11-29 Ab Initio Technology Llc Dynamic graph performance monitoring
US10108521B2 (en) 2012-11-16 2018-10-23 Ab Initio Technology Llc Dynamic component performance monitoring
US9311379B2 (en) * 2012-12-10 2016-04-12 International Business Machines Corporation Utilization of data structures to synchronize copies of a resource
US9471719B2 (en) 2012-12-10 2016-10-18 Dirtt Environmental Solutions, Ltd Efficient lighting effects in design software
US10652087B2 (en) 2012-12-13 2020-05-12 Level 3 Communications, Llc Content delivery framework having fill services
US10701148B2 (en) 2012-12-13 2020-06-30 Level 3 Communications, Llc Content delivery framework having storage services
US9634918B2 (en) 2012-12-13 2017-04-25 Level 3 Communications, Llc Invalidation sequencing in a content delivery framework
USD745875S1 (en) * 2012-12-13 2015-12-22 Symantec Corporation Display device with graphical user interface
US20140337472A1 (en) 2012-12-13 2014-11-13 Level 3 Communications, Llc Beacon Services in a Content Delivery Framework
US10791050B2 (en) 2012-12-13 2020-09-29 Level 3 Communications, Llc Geographic location determination in a content delivery framework
US10701149B2 (en) 2012-12-13 2020-06-30 Level 3 Communications, Llc Content delivery framework having origin services
US10708145B2 (en) 2012-12-13 2020-07-07 Level 3 Communications, Llc Devices and methods supporting content delivery with adaptation services with feedback from health service
US9258234B1 (en) 2012-12-28 2016-02-09 Juniper Networks, Inc. Dynamically adjusting liveliness detection intervals for periodic network communications
US8953460B1 (en) 2012-12-31 2015-02-10 Juniper Networks, Inc. Network liveliness detection using session-external communications
US9274926B2 (en) 2013-01-03 2016-03-01 Ab Initio Technology Llc Configurable testing of computer programs
USRE48312E1 (en) * 2013-01-21 2020-11-17 Robert Mack Method and apparatus for defining common entity relationships
SG11201609798XA (en) 2013-01-25 2016-12-29 Dirtt Environmental Solutions Real-time depth of field effects with design software
EP2951785B1 (en) 2013-01-31 2019-12-11 Dirtt Environmental Solutions, Ltd. Method and system for efficient modeling of specular reflection
CA2817402C (en) 2013-01-31 2021-03-16 Dirtt Environmental Solutions, Ltd. Visual distortion effects through translucent structures in design software
US9245232B1 (en) * 2013-02-22 2016-01-26 Amazon Technologies, Inc. Machine generated service cache
US8893155B2 (en) 2013-03-14 2014-11-18 Microsoft Corporation Providing distributed array containers for programming objects
US9276826B1 (en) * 2013-03-22 2016-03-01 Google Inc. Combining multiple signals to determine global system state
US10776384B1 (en) 2013-04-30 2020-09-15 Ping Identity Corporation Method, server and system for criteria-based assured replication
US9832257B2 (en) * 2013-05-02 2017-11-28 Intel Corporation Service acquisition techniques for wireless communications systems
WO2014193415A1 (en) 2013-05-31 2014-12-04 Dirtt Environmental Solutions Inc. Associating computer-executable objects with three-dimensional spaces within an architectural design environment
US20140356893A1 (en) 2013-06-04 2014-12-04 Allan Mishra Compositions and methods for using platelet-rich plasma for drug discovery, cell nuclear reprogramming, proliferation or differentiation
DK3011444T3 (en) * 2013-06-18 2018-04-16 Ciambella Ltd METHOD AND APPARATUS FOR CODE VIRTUALIZATION AND GENERATION OF REMOTE PROCESS CALLS
US9369518B2 (en) * 2013-06-26 2016-06-14 Amazon Technologies, Inc. Producer system partitioning among leasing agent systems
US9843631B2 (en) 2013-06-26 2017-12-12 Amazon Technologies, Inc. Producer system selection
US9350801B2 (en) 2013-06-26 2016-05-24 Amazon Technologies, Inc. Managing client access to a plurality of computing systems
US9780993B2 (en) 2013-06-26 2017-10-03 Amazon Technologies, Inc. Producer computing system leasing on behalf of consumer computing system
US9558460B2 (en) * 2013-06-28 2017-01-31 Lexmark International Technology Sarl Methods of analyzing software systems having service components
CA2957638A1 (en) 2013-08-08 2015-02-12 E-Valuation,Inc. Systems and methods of communicating information regarding interpersonal relationships using biographical imagery
US10970183B1 (en) * 2013-08-16 2021-04-06 The Mathworks, Inc. System and method for improving model performance
US9363150B2 (en) * 2013-09-05 2016-06-07 International Business Machines Corporation Policy driven auto-transitioning framework for governed objects in service registries
US10824756B2 (en) 2013-09-20 2020-11-03 Open Text Sa Ulc Hosted application gateway architecture with multi-level security policy and rule promulgations
US10116697B2 (en) 2013-09-20 2018-10-30 Open Text Sa Ulc System and method for geofencing
EP2851833B1 (en) 2013-09-20 2017-07-12 Open Text S.A. Application Gateway Architecture with Multi-Level Security Policy and Rule Promulgations
US9912570B2 (en) * 2013-10-25 2018-03-06 Brocade Communications Systems LLC Dynamic cloning of application infrastructures
EP3767904A1 (en) * 2013-10-29 2021-01-20 Samsung Electronics Co., Ltd. A method and system using ternary sequences for simultaneous transmission to coherent and non-coherent recievers
US20150120224A1 (en) 2013-10-29 2015-04-30 C3 Energy, Inc. Systems and methods for processing data relating to energy usage
US9805479B2 (en) 2013-11-11 2017-10-31 Amazon Technologies, Inc. Session idle optimization for streaming server
US9634942B2 (en) 2013-11-11 2017-04-25 Amazon Technologies, Inc. Adaptive scene complexity based on service quality
US9604139B2 (en) 2013-11-11 2017-03-28 Amazon Technologies, Inc. Service for generating graphics object data
US9582904B2 (en) 2013-11-11 2017-02-28 Amazon Technologies, Inc. Image composition based on remote object data
US9578074B2 (en) 2013-11-11 2017-02-21 Amazon Technologies, Inc. Adaptive content transmission
US9641592B2 (en) 2013-11-11 2017-05-02 Amazon Technologies, Inc. Location of actor resources
US9374552B2 (en) 2013-11-11 2016-06-21 Amazon Technologies, Inc. Streaming game server video recorder
US9537728B2 (en) * 2013-11-26 2017-01-03 International Business Machines Corporation Minimizing service restart by optimally resizing service pools
US9519513B2 (en) * 2013-12-03 2016-12-13 Vmware, Inc. Methods and apparatus to automatically configure monitoring of a virtual machine
US9886241B2 (en) 2013-12-05 2018-02-06 Ab Initio Technology Llc Managing interfaces for sub-graphs
US20150163223A1 (en) * 2013-12-09 2015-06-11 International Business Machines Corporation Managing Resources In A Distributed Computing Environment
US10223410B2 (en) * 2014-01-06 2019-03-05 Cisco Technology, Inc. Method and system for acquisition, normalization, matching, and enrichment of data
US9961011B2 (en) 2014-01-21 2018-05-01 Oracle International Corporation System and method for supporting multi-tenancy in an application server, cloud, or other environment
US10103946B2 (en) * 2014-01-21 2018-10-16 Oracle International Corporation System and method for JMS integration in a multitenant application server environment
US10586570B2 (en) 2014-02-05 2020-03-10 Snap Inc. Real time video processing for changing proportions of an object in the video
US9678731B2 (en) 2014-02-26 2017-06-13 Vmware, Inc. Methods and apparatus to generate a customized application blueprint
KR102063901B1 (en) * 2014-03-24 2020-01-08 삼성전자주식회사 Method for providing activity notification and device thereof
CN104951855B (en) * 2014-03-28 2022-08-02 伊姆西Ip控股有限责任公司 Apparatus and method for facilitating management of resources
US9613113B2 (en) 2014-03-31 2017-04-04 International Business Machines Corporation Parallel bootstrap aggregating in a data warehouse appliance
US9630109B2 (en) 2014-05-13 2017-04-25 Sap Se Context-aware gamification platform
US9678787B2 (en) 2014-05-23 2017-06-13 Microsoft Technology Licensing, Llc Framework for authoring data loaders and data savers
US10922450B2 (en) 2014-06-09 2021-02-16 Dirtt Environmental Solutions, Ltd. Associating computer-executable objects with timber frames within an architectural design environment
US9870247B2 (en) * 2014-06-16 2018-01-16 Cyber Reliant Corporation System and method for dynamic provisioning of applications
US20150378763A1 (en) 2014-06-30 2015-12-31 Vmware, Inc. Methods and apparatus to manage monitoring agents
US9973380B1 (en) * 2014-07-10 2018-05-15 Cisco Technology, Inc. Datacenter workload deployment using cross-domain global service profiles and identifiers
US9225776B1 (en) * 2014-08-11 2015-12-29 International Business Machines Corporation Distributing UI control events from a single event producer across multiple systems event consumers
US10318280B2 (en) 2014-09-24 2019-06-11 Oracle International Corporation System and method for supporting patching in a multitenant application server environment
KR102443172B1 (en) 2014-09-24 2022-09-14 오라클 인터내셔날 코포레이션 System and method for supporting patching in a multitenant application server environment
WO2016049584A1 (en) * 2014-09-26 2016-03-31 Oracle International Corporation System and method for transaction recovery in a multitenant application server environment
US9769017B1 (en) 2014-09-26 2017-09-19 Juniper Networks, Inc. Impending control plane disruption indication using forwarding plane liveliness detection protocols
US9495655B2 (en) 2014-09-27 2016-11-15 International Business Machines Corporation Cross-domain multi-attribute hashed and weighted dynamic process prioritization
US9794331B1 (en) * 2014-09-29 2017-10-17 Amazon Technologies, Inc. Block allocation based on server utilization
US9608907B2 (en) * 2014-09-29 2017-03-28 Vivint, Inc. Systems and methods for centrally-assisted distributed hash table
US9405810B2 (en) 2014-11-24 2016-08-02 Asana, Inc. Server side system and method for search backed calendar user interface
US9626729B2 (en) * 2014-12-22 2017-04-18 Amplisine Labs, LLC Oil-field trucking dispatch
CN104580194B (en) * 2014-12-31 2017-11-24 北京四达时代软件技术股份有限公司 Towards the virtual resources management method and device of Video Applications
US20160189558A1 (en) * 2014-12-31 2016-06-30 Genesys Telecommunications Laboratories, Inc. Learning Based on Simulations of Interactions of a Customer Contact Center
US10250512B2 (en) 2015-01-21 2019-04-02 Oracle International Corporation System and method for traffic director support in a multitenant application server environment
US20160212069A1 (en) * 2015-01-21 2016-07-21 Qualcomm Incorporated Cooperative management of client device cache memory in an http session
US9767313B2 (en) * 2015-01-23 2017-09-19 Limited Liability Company “1C” Method for automated separation and partitioning of data in a payroll and resource planning system
US9916373B2 (en) 2015-03-26 2018-03-13 Red Hat, Inc. Dynamic data partitioning extension
US9311083B1 (en) * 2015-04-10 2016-04-12 CypressX LLC Machine interface configuration system for coerced inconsistencies on different machine platforms
US9979734B2 (en) * 2015-04-20 2018-05-22 Oath Inc. Management of transactions in a distributed transaction system
US9953295B2 (en) 2015-04-28 2018-04-24 International Business Machines Corporation Management of event contexts using bookend contexts
US10423901B2 (en) 2015-04-28 2019-09-24 International Business Machines Corporation Management of event contexts using bookend events
EP3099027B1 (en) * 2015-05-26 2017-09-13 Urban Software Institute GmbH Computer system and method for message routing with content and reference passing
CA3001304C (en) 2015-06-05 2021-10-19 C3 Iot, Inc. Systems, methods, and devices for an enterprise internet-of-things application development platform
US10374915B1 (en) * 2015-06-29 2019-08-06 Amazon Technologies, Inc. Metrics processing service
CN106341434A (en) * 2015-07-07 2017-01-18 腾讯科技(深圳)有限公司 Service processing method and device
US10657134B2 (en) 2015-08-05 2020-05-19 Ab Initio Technology Llc Selecting queries for execution on a stream of real-time data
US10929272B2 (en) 2015-10-16 2021-02-23 Microsoft Technology Licensing, Llc Telemetry system extension
US11386061B2 (en) * 2015-10-16 2022-07-12 Microsoft Technology Licensing, Llc Telemetry request system
US11593075B2 (en) 2015-11-03 2023-02-28 Open Text Sa Ulc Streamlined fast and efficient application building and customization systems and methods
WO2017112654A2 (en) 2015-12-21 2017-06-29 Ab Initio Technology Llc Sub-graph interface generation
US10374936B2 (en) 2015-12-30 2019-08-06 Juniper Networks, Inc. Reducing false alarms when using network keep-alive messages
US10009380B2 (en) 2016-01-08 2018-06-26 Secureworks Corp. Systems and methods for security configuration
US10116625B2 (en) * 2016-01-08 2018-10-30 Secureworks, Corp. Systems and methods for secure containerization
US11388037B2 (en) * 2016-02-25 2022-07-12 Open Text Sa Ulc Systems and methods for providing managed services
US20220092503A1 (en) * 2016-02-29 2022-03-24 Dimensional Insight Incorporated Measure factory
US10339365B2 (en) 2016-03-31 2019-07-02 Snap Inc. Automated avatar generation
US10187473B2 (en) * 2016-04-29 2019-01-22 Intuit Inc. Gateway policy enforcement and service metadata binding
US20170337499A1 (en) * 2016-05-23 2017-11-23 International Business Machines Corporation Balancing assignment of alerts across endpoints
US10374872B2 (en) * 2016-05-24 2019-08-06 Apstra, Inc. Configuring system resources for different reference architectures
US10474353B2 (en) 2016-05-31 2019-11-12 Snap Inc. Application control using a gesture based trigger
US10284670B1 (en) * 2016-06-07 2019-05-07 Amazon Technologies, Inc. Network-controlled device management session
US10270815B1 (en) 2016-06-07 2019-04-23 Amazon Technologies, Inc. Enabling communications between a controlling device and a network-controlled device via a network-connected device service over a mobile communications network
US10372883B2 (en) 2016-06-24 2019-08-06 Scripps Networks Interactive, Inc. Satellite and central asset registry systems and methods and rights management systems
US11868445B2 (en) 2016-06-24 2024-01-09 Discovery Communications, Llc Systems and methods for federated searches of assets in disparate dam repositories
US10148754B1 (en) * 2016-06-27 2018-12-04 Datastax, Inc. Resource management in a distributed system
US10397085B1 (en) 2016-06-30 2019-08-27 Juniper Networks, Inc. Offloading heartbeat responses message processing to a kernel of a network device
US10360708B2 (en) 2016-06-30 2019-07-23 Snap Inc. Avatar based ideogram generation
US10693973B2 (en) * 2016-07-18 2020-06-23 Wistron Aiedge Corporation System and method for work distribution in a fog network via code offloading
US10855632B2 (en) 2016-07-19 2020-12-01 Snap Inc. Displaying customized electronic messaging graphics
CN105959422A (en) * 2016-07-20 2016-09-21 腾讯科技(深圳)有限公司 File aggregation method, device and system
US10650621B1 (en) 2016-09-13 2020-05-12 Iocurrents, Inc. Interfacing with a vehicular controller area network
US10609036B1 (en) 2016-10-10 2020-03-31 Snap Inc. Social media post subscribe requests for buffer user accounts
US10198626B2 (en) 2016-10-19 2019-02-05 Snap Inc. Neural networks for facial modeling
US10593116B2 (en) 2016-10-24 2020-03-17 Snap Inc. Augmented reality object manipulation
US10432559B2 (en) 2016-10-24 2019-10-01 Snap Inc. Generating and displaying customized avatars in electronic messages
US10218562B2 (en) 2016-11-09 2019-02-26 Bank Of America Corporation Parsing and optimizing runtime infrastructure alerts
CN106604139A (en) * 2016-11-23 2017-04-26 广州视源电子科技股份有限公司 Control method and apparatus for intelligent device
US11226887B1 (en) * 2016-12-06 2022-01-18 Amazon Technologies, Inc. User code deployment across compute resource partitions
US10396997B2 (en) * 2016-12-14 2019-08-27 International Business Machines Corporation Container-based operating system and method
US10242503B2 (en) 2017-01-09 2019-03-26 Snap Inc. Surface aware lens
US11616745B2 (en) 2017-01-09 2023-03-28 Snap Inc. Contextual generation and selection of customized media content
US10242477B1 (en) 2017-01-16 2019-03-26 Snap Inc. Coded vision system
US10951562B2 (en) 2017-01-18 2021-03-16 Snap. Inc. Customized contextual media content item generation
US10454857B1 (en) 2017-01-23 2019-10-22 Snap Inc. Customized digital avatar accessories
US10630845B2 (en) * 2017-02-07 2020-04-21 Agile Interoperable Solutions, Llc Inter-operable communication system
US10394538B2 (en) * 2017-02-09 2019-08-27 International Business Machines Corporation Optimizing service deployment in a distributed computing environment
US10599408B2 (en) * 2017-03-28 2020-03-24 Walmart Apollo, Llc Customer information control system (CICS) services deployment system
US10356214B2 (en) 2017-03-29 2019-07-16 Ca, Inc. Composing monolithic applications based on multi-container applications
US10491520B2 (en) * 2017-04-06 2019-11-26 Ca, Inc. Container-based software appliance
US10623281B1 (en) * 2017-04-18 2020-04-14 EMC IP Holding Company LLC Dynamically scheduled checkpoints in distributed data streaming system
US11069103B1 (en) 2017-04-20 2021-07-20 Snap Inc. Customized user interface for electronic communications
US10880272B2 (en) * 2017-04-20 2020-12-29 Wyse Technology L.L.C. Secure software client
US10212541B1 (en) 2017-04-27 2019-02-19 Snap Inc. Selective location-based identity communication
US11893647B2 (en) 2017-04-27 2024-02-06 Snap Inc. Location-based virtual avatars
EP4307724A2 (en) 2017-04-27 2024-01-17 Snap Inc. Regional-level representation of user location on a social media platform
US10467052B2 (en) * 2017-05-01 2019-11-05 Red Hat, Inc. Cluster topology aware container scheduling for efficient data transfer
US10509916B2 (en) 2017-05-12 2019-12-17 Microsoft Technology Licensing, Llc Access control lists for high-performance naming service
US10698877B2 (en) 2017-05-12 2020-06-30 Microsoft Technology Licensing, Llc High-performance naming service using an optimistic-concurrency-control in-memory database
US10679428B1 (en) 2017-05-26 2020-06-09 Snap Inc. Neural network-based image stream modification
US11874845B2 (en) * 2017-06-28 2024-01-16 Fortinet, Inc. Centralized state database storing state information
US10977434B2 (en) 2017-07-11 2021-04-13 Asana, Inc. Database model which provides management of custom fields and methods and apparatus therfor
US11122094B2 (en) 2017-07-28 2021-09-14 Snap Inc. Software application manager for messaging applications
US10459769B2 (en) * 2017-08-04 2019-10-29 Unisys Corporation Elastic container management system
US11113090B1 (en) * 2017-08-09 2021-09-07 United Services Automobile Association (Usaa) Systems and methods for container management
CN107563602A (en) * 2017-08-09 2018-01-09 厦门叁壹伍捌信息技术有限公司 Small commercial distribution enterprises service management system in a kind of city
US10834230B2 (en) * 2017-08-25 2020-11-10 International Business Machines Corporation Server request management
US10397791B2 (en) * 2017-10-10 2019-08-27 Futurewei Technologies, Inc. Method for auto-discovery in networks implementing network slicing
US10586368B2 (en) 2017-10-26 2020-03-10 Snap Inc. Joint audio-video facial animation system
US10657695B2 (en) 2017-10-30 2020-05-19 Snap Inc. Animated chat presence
US10831546B2 (en) * 2017-11-27 2020-11-10 International Business Machines Corporation Computing task management using tree structures
US11460974B1 (en) 2017-11-28 2022-10-04 Snap Inc. Content discovery refresh
KR102318422B1 (en) 2017-11-29 2021-10-28 스냅 인코포레이티드 Graphics rendering for electronic messaging applications
KR102433817B1 (en) 2017-11-29 2022-08-18 스냅 인코포레이티드 Group stories in an electronic messaging application
WO2019142157A1 (en) * 2018-01-22 2019-07-25 Tata Consultancy Services Limited System and method for talent insights generation and recommendation
US10949648B1 (en) 2018-01-23 2021-03-16 Snap Inc. Region-based stabilized face tracking
US10754697B2 (en) 2018-01-29 2020-08-25 Bank Of America Corporation System for allocating resources for use in data processing operations
US10956593B2 (en) * 2018-02-15 2021-03-23 International Business Machines Corporation Sharing of data among containers running on virtualized operating systems
CN108769087B (en) * 2018-02-23 2020-12-22 福建天晴数码有限公司 Development method of interactive system and server
US10726603B1 (en) 2018-02-28 2020-07-28 Snap Inc. Animated expressive icon
US10979752B1 (en) 2018-02-28 2021-04-13 Snap Inc. Generating media content items based on location information
US10623359B1 (en) 2018-02-28 2020-04-14 Asana, Inc. Systems and methods for generating tasks based on chat sessions between users of a collaboration environment
CN110213068B (en) * 2018-03-06 2021-12-21 腾讯科技(深圳)有限公司 Message middleware monitoring method and related equipment
US11138021B1 (en) 2018-04-02 2021-10-05 Asana, Inc. Systems and methods to facilitate task-specific workspaces for a collaboration work management platform
US10613735B1 (en) 2018-04-04 2020-04-07 Asana, Inc. Systems and methods for preloading an amount of content based on user scrolling
US11310176B2 (en) 2018-04-13 2022-04-19 Snap Inc. Content suggestion system
CN112041891A (en) 2018-04-18 2020-12-04 斯纳普公司 Expression enhancing system
US20210224416A1 (en) * 2018-05-15 2021-07-22 Ixup Ip Pty Ltd Cryptographic key management
US10915554B2 (en) * 2018-05-24 2021-02-09 Paypal, Inc. Database replication system
US10785046B1 (en) 2018-06-08 2020-09-22 Asana, Inc. Systems and methods for providing a collaboration work management platform that facilitates differentiation between users in an overarching group and one or more subsets of individual users
US11283676B2 (en) * 2018-06-11 2022-03-22 Nicira, Inc. Providing shared memory for access by multiple network service containers executing on single service machine
US11308038B2 (en) * 2018-06-22 2022-04-19 Red Hat, Inc. Copying container images
US11074675B2 (en) 2018-07-31 2021-07-27 Snap Inc. Eye texture inpainting
US11030813B2 (en) 2018-08-30 2021-06-08 Snap Inc. Video clip object tracking
US11750441B1 (en) 2018-09-07 2023-09-05 Juniper Networks, Inc. Propagating node failure errors to TCP sockets
US10896534B1 (en) 2018-09-19 2021-01-19 Snap Inc. Avatar style transformation using neural networks
US10895964B1 (en) 2018-09-25 2021-01-19 Snap Inc. Interface to display shared user groups
CN109450661A (en) * 2018-09-27 2019-03-08 北京天元创新科技有限公司 Service release surveying method and device based on GIS map
US11189070B2 (en) 2018-09-28 2021-11-30 Snap Inc. System and method of generating targeted user lists using customizable avatar characteristics
US10904181B2 (en) 2018-09-28 2021-01-26 Snap Inc. Generating customized graphics having reactions to electronic message content
US10698583B2 (en) 2018-09-28 2020-06-30 Snap Inc. Collaborative achievement interface
US11245658B2 (en) 2018-09-28 2022-02-08 Snap Inc. System and method of generating private notifications between users in a communication session
US10579998B1 (en) * 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10616151B1 (en) 2018-10-17 2020-04-07 Asana, Inc. Systems and methods for generating and presenting graphical user interfaces
US10872451B2 (en) 2018-10-31 2020-12-22 Snap Inc. 3D avatar rendering
US11103795B1 (en) 2018-10-31 2021-08-31 Snap Inc. Game drawer
US10887180B2 (en) * 2018-11-14 2021-01-05 Vmware, Inc. Internet of things device discovery and deployment
US11176737B2 (en) 2018-11-27 2021-11-16 Snap Inc. Textured mesh building
US10902661B1 (en) 2018-11-28 2021-01-26 Snap Inc. Dynamic composite user identifier
US11199957B1 (en) 2018-11-30 2021-12-14 Snap Inc. Generating customized avatars based on location information
US10861170B1 (en) 2018-11-30 2020-12-08 Snap Inc. Efficient human pose tracking in videos
US10848585B2 (en) 2018-12-03 2020-11-24 Walmart Apollo, Llc Using a sharded distributed cache as a pipeline integration buffer
US11394626B2 (en) * 2018-12-06 2022-07-19 Sap Se Digital services framework
US11496584B2 (en) 2018-12-06 2022-11-08 Sap Se Extraction and distribution of content packages in a digital services framework
US10956845B1 (en) * 2018-12-06 2021-03-23 Asana, Inc. Systems and methods for generating prioritization models and predicting workflow prioritizations
US11055514B1 (en) 2018-12-14 2021-07-06 Snap Inc. Image face manipulation
US11568366B1 (en) 2018-12-18 2023-01-31 Asana, Inc. Systems and methods for generating status requests for units of work
US11113667B1 (en) 2018-12-18 2021-09-07 Asana, Inc. Systems and methods for providing a dashboard for a collaboration work management platform
US11516173B1 (en) 2018-12-26 2022-11-29 Snap Inc. Message composition interface
CN109688223B (en) * 2018-12-27 2021-11-02 华迪计算机集团有限公司 Ecological environment data resource sharing method and device
US11782737B2 (en) 2019-01-08 2023-10-10 Asana, Inc. Systems and methods for determining and presenting a graphical user interface including template metrics
US10684870B1 (en) 2019-01-08 2020-06-16 Asana, Inc. Systems and methods for determining and presenting a graphical user interface including template metrics
US11204683B1 (en) 2019-01-09 2021-12-21 Asana, Inc. Systems and methods for generating and tracking hardcoded communications in a collaboration management platform
US11032670B1 (en) 2019-01-14 2021-06-08 Snap Inc. Destination sharing in location sharing system
US10939246B1 (en) 2019-01-16 2021-03-02 Snap Inc. Location-based context information sharing in a messaging system
US11294936B1 (en) 2019-01-30 2022-04-05 Snap Inc. Adaptive spatial density based clustering
US10984575B2 (en) 2019-02-06 2021-04-20 Snap Inc. Body pose estimation
US10656797B1 (en) 2019-02-06 2020-05-19 Snap Inc. Global event-based avatar
US11726758B2 (en) * 2019-02-07 2023-08-15 Microsoft Technology Licensing, Llc Efficient scaling of a container-based application in a distributed computing system
US10936066B1 (en) 2019-02-13 2021-03-02 Snap Inc. Sleep detection in a location sharing system
US10964082B2 (en) 2019-02-26 2021-03-30 Snap Inc. Avatar based on weather
US10852918B1 (en) 2019-03-08 2020-12-01 Snap Inc. Contextual information in chat
US11868414B1 (en) 2019-03-14 2024-01-09 Snap Inc. Graph-based prediction for contact suggestion in a location sharing system
US11852554B1 (en) 2019-03-21 2023-12-26 Snap Inc. Barometer calibration in a location sharing system
US11166123B1 (en) 2019-03-28 2021-11-02 Snap Inc. Grouped transmission of location data in a location sharing system
US10674311B1 (en) 2019-03-28 2020-06-02 Snap Inc. Points of interest in a location sharing system
US11201818B2 (en) 2019-04-04 2021-12-14 Cisco Technology, Inc. System and method of providing policy selection in a network
US10992619B2 (en) 2019-04-30 2021-04-27 Snap Inc. Messaging system with avatar generation
CN110336851B (en) * 2019-05-06 2021-09-24 腾讯科技(深圳)有限公司 Content access processing method and device, computer equipment and storage medium
KR20200130151A (en) * 2019-05-10 2020-11-18 현대자동차주식회사 Method and apparatus for identifying service entity in machine to machine system
USD916811S1 (en) 2019-05-28 2021-04-20 Snap Inc. Display screen or portion thereof with a transitional graphical user interface
USD916809S1 (en) 2019-05-28 2021-04-20 Snap Inc. Display screen or portion thereof with a transitional graphical user interface
USD916810S1 (en) 2019-05-28 2021-04-20 Snap Inc. Display screen or portion thereof with a graphical user interface
USD916871S1 (en) 2019-05-28 2021-04-20 Snap Inc. Display screen or portion thereof with a transitional graphical user interface
USD916872S1 (en) 2019-05-28 2021-04-20 Snap Inc. Display screen or portion thereof with a graphical user interface
US11049058B2 (en) 2019-06-04 2021-06-29 Morgan Stanley Services Group Inc. System and method for improving performance in an enterprise computing environment
US10893385B1 (en) 2019-06-07 2021-01-12 Snap Inc. Detection of a physical collision between two client devices in a location sharing system
US10805144B1 (en) * 2019-06-18 2020-10-13 Cisco Technology, Inc. Monitoring interactions between entities in a network by an agent for particular types of interactions and indexing and establishing relationships of the components of each interaction
US11676199B2 (en) 2019-06-28 2023-06-13 Snap Inc. Generating customizable avatar outfits
US11189098B2 (en) 2019-06-28 2021-11-30 Snap Inc. 3D object camera customization system
US11188190B2 (en) 2019-06-28 2021-11-30 Snap Inc. Generating animation overlays in a communication session
US11307747B2 (en) 2019-07-11 2022-04-19 Snap Inc. Edge gesture interface with smart interactions
US11108654B2 (en) 2019-07-15 2021-08-31 Bank Of America Corporation Re-deployable elastic framework
US11455081B2 (en) 2019-08-05 2022-09-27 Snap Inc. Message thread prioritization interface
US10911387B1 (en) 2019-08-12 2021-02-02 Snap Inc. Message reminder interface
US11320969B2 (en) 2019-09-16 2022-05-03 Snap Inc. Messaging system with battery level sharing
US11184218B2 (en) * 2019-09-25 2021-11-23 Microsoft Technology Licensing, Llc Service issue prioritisation based on impact using software telemetry
US11425062B2 (en) 2019-09-27 2022-08-23 Snap Inc. Recommended content viewed by friends
US11080917B2 (en) 2019-09-30 2021-08-03 Snap Inc. Dynamic parameterized user avatar stories
CN110765144B (en) * 2019-10-11 2022-02-18 口碑(上海)信息技术有限公司 Distributed heterogeneous database data processing method and device
US11374887B2 (en) * 2019-10-29 2022-06-28 Google Llc Automated assistant architecture for preserving privacy of application content
EP4052212A4 (en) * 2019-10-30 2023-08-02 Deal.Com Inc. Advisor interface systems and methods
US11218838B2 (en) 2019-10-31 2022-01-04 Snap Inc. Focused map-based context information surfacing
US11341445B1 (en) 2019-11-14 2022-05-24 Asana, Inc. Systems and methods to measure and visualize threshold of user workload
CN110971691A (en) * 2019-11-29 2020-04-07 任逸 Parent-child interaction method and system
US11063891B2 (en) 2019-12-03 2021-07-13 Snap Inc. Personalized avatar notification
CN111192003B (en) * 2019-12-05 2023-07-18 北京直真科技股份有限公司 Actual progress evaluation calculation method for special line project of passenger collection
US11128586B2 (en) 2019-12-09 2021-09-21 Snap Inc. Context sensitive avatar captions
US11050847B1 (en) * 2019-12-11 2021-06-29 Amazon Technologies, Inc. Replication of control plane metadata
US11036989B1 (en) 2019-12-11 2021-06-15 Snap Inc. Skeletal tracking using previous frames
US11227442B1 (en) 2019-12-19 2022-01-18 Snap Inc. 3D captions with semantic graphical elements
US11263817B1 (en) 2019-12-19 2022-03-01 Snap Inc. 3D captions with face tracking
US11128715B1 (en) 2019-12-30 2021-09-21 Snap Inc. Physical friend proximity in chat
US11140515B1 (en) 2019-12-30 2021-10-05 Snap Inc. Interfaces for relative device positioning
US11169658B2 (en) 2019-12-31 2021-11-09 Snap Inc. Combined map icon with action indicator
US11429423B2 (en) 2020-01-07 2022-08-30 Kyndryl, Inc. Workload scheduling with localized virtual network resources
US11741410B2 (en) 2020-01-18 2023-08-29 SkyKick, Inc. Centralized cloud service management
US11284144B2 (en) 2020-01-30 2022-03-22 Snap Inc. Video generation system to render frames on demand using a fleet of GPUs
CN115175748A (en) 2020-01-30 2022-10-11 斯纳普公司 System for generating media content items on demand
US11356720B2 (en) 2020-01-30 2022-06-07 Snap Inc. Video generation system to render frames on demand
US11036781B1 (en) 2020-01-30 2021-06-15 Snap Inc. Video generation system to render frames on demand using a fleet of servers
US11783253B1 (en) 2020-02-11 2023-10-10 Asana, Inc. Systems and methods to effectuate sets of automated actions outside and/or within a collaboration environment based on trigger events occurring outside and/or within the collaboration environment
US11599855B1 (en) 2020-02-14 2023-03-07 Asana, Inc. Systems and methods to attribute automated actions within a collaboration environment
EP4113911A1 (en) * 2020-02-26 2023-01-04 Rakuten Symphony Singapore Pte. Ltd. Network service construction system and network service construction method
US11619501B2 (en) 2020-03-11 2023-04-04 Snap Inc. Avatar based on trip
US11217020B2 (en) 2020-03-16 2022-01-04 Snap Inc. 3D cutout image modification
US11818286B2 (en) 2020-03-30 2023-11-14 Snap Inc. Avatar recommendation and reply
US11625873B2 (en) 2020-03-30 2023-04-11 Snap Inc. Personalized media overlay recommendation
CN111651568B (en) * 2020-04-17 2023-08-08 世纪保众(北京)网络科技有限公司 Method and device for on-line underwriting knowledge self-help question and answer
US11093239B1 (en) * 2020-05-13 2021-08-17 International Business Machines Corporation Application driven configuration of service management tools
US11543939B2 (en) 2020-06-08 2023-01-03 Snap Inc. Encoded image based messaging system
US11356392B2 (en) 2020-06-10 2022-06-07 Snap Inc. Messaging system including an external-resource dock and drawer
US11455601B1 (en) 2020-06-29 2022-09-27 Asana, Inc. Systems and methods to measure and visualize workload for completing individual units of work
WO2022005914A1 (en) * 2020-06-29 2022-01-06 Illumina, Inc. Temporary cloud provider credentials via secure discovery framework
US11580682B1 (en) 2020-06-30 2023-02-14 Snap Inc. Messaging system with augmented reality makeup
US11449836B1 (en) 2020-07-21 2022-09-20 Asana, Inc. Systems and methods to facilitate user engagement with units of work assigned within a collaboration environment
US11568339B2 (en) 2020-08-18 2023-01-31 Asana, Inc. Systems and methods to characterize units of work based on business objectives
US11863513B2 (en) 2020-08-31 2024-01-02 Snap Inc. Media content playback and comments management
US11360733B2 (en) 2020-09-10 2022-06-14 Snap Inc. Colocated shared augmented reality without shared backend
US11470025B2 (en) 2020-09-21 2022-10-11 Snap Inc. Chats with micro sound clips
US11452939B2 (en) 2020-09-21 2022-09-27 Snap Inc. Graphical marker generation system for synchronizing users
US11910269B2 (en) 2020-09-25 2024-02-20 Snap Inc. Augmented reality content items including user avatar to share location
DE102021103039A1 (en) 2020-10-23 2022-04-28 Jakob Hildebrandt Tow hitch adapter for attachment to a support blade
US11615592B2 (en) 2020-10-27 2023-03-28 Snap Inc. Side-by-side character animation from realtime 3D body motion capture
US11660022B2 (en) 2020-10-27 2023-05-30 Snap Inc. Adaptive skeletal joint smoothing
US11392573B1 (en) 2020-11-11 2022-07-19 Wells Fargo Bank, N.A. Systems and methods for generating and maintaining data objects
US11640565B1 (en) 2020-11-11 2023-05-02 Wells Fargo Bank, N.A. Systems and methods for relationship mapping
US11450051B2 (en) 2020-11-18 2022-09-20 Snap Inc. Personalized avatar real-time motion capture
US11748931B2 (en) 2020-11-18 2023-09-05 Snap Inc. Body animation sharing and remixing
US11734894B2 (en) 2020-11-18 2023-08-22 Snap Inc. Real-time motion transfer for prosthetic limbs
US11769115B1 (en) 2020-11-23 2023-09-26 Asana, Inc. Systems and methods to provide measures of user workload when generating units of work based on chat sessions between users of a collaboration environment
US11405435B1 (en) 2020-12-02 2022-08-02 Asana, Inc. Systems and methods to present views of records in chat sessions between users of a collaboration environment
US20220215405A1 (en) * 2021-01-07 2022-07-07 Fmr Llc Systems and methods for a user digital passport
US11221907B1 (en) 2021-01-26 2022-01-11 Morgan Stanley Services Group Inc. Centralized software issue triage system
US11790531B2 (en) 2021-02-24 2023-10-17 Snap Inc. Whole body segmentation
US11778548B2 (en) * 2021-03-09 2023-10-03 Kyndryl, Inc. Deploying containers on a 5G slice network
US11908243B2 (en) 2021-03-16 2024-02-20 Snap Inc. Menu hierarchy navigation on electronic mirroring devices
US11734959B2 (en) 2021-03-16 2023-08-22 Snap Inc. Activating hands-free mode on mirroring device
US11809633B2 (en) 2021-03-16 2023-11-07 Snap Inc. Mirroring device with pointing based navigation
US11798201B2 (en) 2021-03-16 2023-10-24 Snap Inc. Mirroring device with whole-body outfits
US11544885B2 (en) 2021-03-19 2023-01-03 Snap Inc. Augmented reality experience based on physical items
US11562548B2 (en) 2021-03-22 2023-01-24 Snap Inc. True size eyewear in real time
US11550925B2 (en) 2021-03-24 2023-01-10 Bank Of America Corporation Information security system for identifying potential security threats in software package deployment
US20230252233A1 (en) * 2021-03-29 2023-08-10 Comake, Inc. Methods and systems for shared language framework to maximize composability of software, translativity of information, and end-user independence
US11694162B1 (en) 2021-04-01 2023-07-04 Asana, Inc. Systems and methods to recommend templates for project-level graphical user interfaces within a collaboration environment
US11676107B1 (en) 2021-04-14 2023-06-13 Asana, Inc. Systems and methods to facilitate interaction with a collaboration environment based on assignment of project-level roles
US11553045B1 (en) 2021-04-29 2023-01-10 Asana, Inc. Systems and methods to automatically update status of projects within a collaboration environment
US11803814B1 (en) 2021-05-07 2023-10-31 Asana, Inc. Systems and methods to facilitate nesting of portfolios within a collaboration environment
US11792028B1 (en) 2021-05-13 2023-10-17 Asana, Inc. Systems and methods to link meetings with units of work of a collaboration environment
US11636654B2 (en) 2021-05-19 2023-04-25 Snap Inc. AR-based connected portal shopping
US11809222B1 (en) 2021-05-24 2023-11-07 Asana, Inc. Systems and methods to generate units of work within a collaboration environment based on selection of text
US11411805B1 (en) 2021-07-12 2022-08-09 Bank Of America Corporation System and method for detecting root cause of an exception error in a task flow in a distributed network
US11854069B2 (en) 2021-07-16 2023-12-26 Snap Inc. Personalized try-on ads
US11908083B2 (en) 2021-08-31 2024-02-20 Snap Inc. Deforming custom mesh based on body mesh
US11670059B2 (en) 2021-09-01 2023-06-06 Snap Inc. Controlling interactive fashion based on body gestures
US11673054B2 (en) 2021-09-07 2023-06-13 Snap Inc. Controlling AR games on fashion items
US11663792B2 (en) 2021-09-08 2023-05-30 Snap Inc. Body fitted accessory with physics simulation
US11756000B2 (en) 2021-09-08 2023-09-12 Asana, Inc. Systems and methods to effectuate sets of automated actions within a collaboration environment including embedded third-party content based on trigger events
US11900506B2 (en) 2021-09-09 2024-02-13 Snap Inc. Controlling interactive fashion based on facial expressions
US11734866B2 (en) 2021-09-13 2023-08-22 Snap Inc. Controlling interactive fashion based on voice
US11798238B2 (en) 2021-09-14 2023-10-24 Snap Inc. Blending body mesh into external mesh
US11836866B2 (en) 2021-09-20 2023-12-05 Snap Inc. Deforming real-world object using an external mesh
US11636662B2 (en) 2021-09-30 2023-04-25 Snap Inc. Body normal network light and rendering control
US11856030B2 (en) * 2021-10-04 2023-12-26 Motorola Solutions, Inc. Security ecosystem
US11803569B2 (en) * 2021-10-05 2023-10-31 Procore Technologies, Inc. Computer system and method for accessing user data that is distributed within a multi-zone computing platform
US11790614B2 (en) 2021-10-11 2023-10-17 Snap Inc. Inferring intent from pose and speech input
US11836862B2 (en) 2021-10-11 2023-12-05 Snap Inc. External mesh with vertex attributes
US11635884B1 (en) 2021-10-11 2023-04-25 Asana, Inc. Systems and methods to provide personalized graphical user interfaces within a collaboration environment
US11651572B2 (en) 2021-10-11 2023-05-16 Snap Inc. Light and rendering of garments
US20230109946A1 (en) * 2021-10-12 2023-04-13 Twill, Inc. Apparatus for computer generated dialogue and task-specific nested file architecture thereof
US11763481B2 (en) 2021-10-20 2023-09-19 Snap Inc. Mirror-based augmented reality experience
US11748958B2 (en) 2021-12-07 2023-09-05 Snap Inc. Augmented reality unboxing experience
US11880947B2 (en) 2021-12-21 2024-01-23 Snap Inc. Real-time upper-body garment exchange
WO2023122344A1 (en) * 2021-12-23 2023-06-29 Comake, Inc. Methods and systems for shared language framework for composability of software translativity of information
US11887260B2 (en) 2021-12-30 2024-01-30 Snap Inc. AR position indicator
US11823346B2 (en) 2022-01-17 2023-11-21 Snap Inc. AR body part tracking system
US11621882B1 (en) 2022-01-28 2023-04-04 United Services Automobile Association (Usaa) Automated remedial actions for service level objective thresholds
US11836681B1 (en) 2022-02-17 2023-12-05 Asana, Inc. Systems and methods to generate records within a collaboration environment
US11892937B2 (en) 2022-02-28 2024-02-06 Bank Of America Corporation Developer test environment with containerization of tightly coupled systems
US11438251B1 (en) 2022-02-28 2022-09-06 Bank Of America Corporation System and method for automatic self-resolution of an exception error in a distributed network
US20230412454A1 (en) * 2022-06-17 2023-12-21 International Business Machines Corporation Device lifetime-aware creation of customizable surrogate-based models
US11870745B1 (en) 2022-06-28 2024-01-09 Snap Inc. Media gallery sharing and management
US11893166B1 (en) 2022-11-08 2024-02-06 Snap Inc. User avatar movement control using an augmented reality eyewear device
US11863601B1 (en) 2022-11-18 2024-01-02 Asana, Inc. Systems and methods to execute branching automation schemes in a collaboration environment
CN115858206B (en) * 2023-02-27 2023-07-11 联宝(合肥)电子科技有限公司 Data processing method, device, electronic equipment and storage medium

Citations (107)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3058A (en) * 1843-04-25 Stove
US43600A (en) * 1864-07-19 Improvement in hay-presses
US91703A (en) * 1869-06-22 Improvement in match-box
US91827A (en) * 1869-06-29 Improvement in speaking-tube signal
US140119A (en) * 1873-06-24 Improvements nut-locks
US188720A (en) * 1877-03-20 Improvement in manufacture of boxes
US5008878A (en) * 1987-10-20 1991-04-16 International Business Machines Corporation High-speed modular switching apparatus for circuit and packet switched traffic
US5014266A (en) * 1988-12-28 1991-05-07 At&T Bell Laboratories Circuit switching system for interconnecting logical links between packet switching networks
US5019961A (en) * 1989-04-05 1991-05-28 Cadware, Inc. Computer apparatus and method for logical modelling
US5111391A (en) * 1989-10-05 1992-05-05 Mrs. Fields, Inc. System and method for making staff schedules as a function of available resources as well as employee skill level, availability and priority
US5117353A (en) * 1989-05-05 1992-05-26 Staff-Plus, Inc. System for use in a temporary help business
US5515531A (en) * 1992-05-29 1996-05-07 Hitachi, Ltd. Parallel database processing system and retrieval method using secondary key
US5526353A (en) * 1994-12-20 1996-06-11 Henley; Arthur System and method for communication of audio data over a packet-based network
US5608786A (en) * 1994-12-23 1997-03-04 Alphanet Telecom Inc. Unified messaging system and method
US5615121A (en) * 1995-01-31 1997-03-25 U S West Technologies, Inc. System and method for scheduling service providers to perform customer service requests
US5721913A (en) * 1994-05-05 1998-02-24 Lucent Technologies Inc. Integrated activity management system
US5721770A (en) * 1996-07-02 1998-02-24 Lucent Technologies Inc. Agent vectoring programmably conditionally assigning agents to various tasks including tasks other than handling of waiting calls
US5724412A (en) * 1996-10-07 1998-03-03 U S West, Inc. Method and system for displaying internet identification on customer premises equipment
US5726984A (en) * 1989-01-31 1998-03-10 Norand Corporation Hierarchical data collection network supporting packetized voice communications among wireless terminals and telephones
US5734837A (en) * 1994-01-14 1998-03-31 Action Technologies, Inc. Method and apparatus for building business process applications in terms of its workflows
US5737727A (en) * 1996-01-25 1998-04-07 Electronic Data Systems Corporation Process management system and method
US5749075A (en) * 1995-06-06 1998-05-05 Interactive Media Works, L.L.C. Method for providing prepaid internet access and/or long distance calling including the distribution of specialized calling cards
US5751706A (en) * 1996-06-05 1998-05-12 Cignal Global Communications, Inc. System and method for establishing a call telecommunications path
US5761499A (en) * 1995-12-21 1998-06-02 Novell, Inc. Method for managing globally distributed software components
US5765140A (en) * 1995-11-17 1998-06-09 Mci Corporation Dynamic project management system
US5774661A (en) * 1995-04-18 1998-06-30 Network Imaging Corporation Rule engine interface for a visual workflow builder
US5779297A (en) * 1995-06-28 1998-07-14 Saar-Gummewerke Gmbh Slit-covering profile with integrated repair solution
US5867494A (en) * 1996-11-18 1999-02-02 Mci Communication Corporation System, method and article of manufacture with integrated video conferencing billing in a communication system architecture
US5872841A (en) * 1996-11-14 1999-02-16 Siemens Information And Comunication Newtworks, Inc. Apparatus and method for scheduling a telephone call
US5873093A (en) * 1994-12-07 1999-02-16 Next Software, Inc. Method and apparatus for mapping objects to a data source
US5884029A (en) * 1996-11-14 1999-03-16 International Business Machines Corporation User interaction with intelligent virtual objects, avatars, which interact with other avatars controlled by different users
US5918229A (en) * 1996-11-22 1999-06-29 Mangosoft Corporation Structured data storage using globally addressable memory
US5920846A (en) * 1996-02-27 1999-07-06 Southwestern Bell Telephone Co. Method and system for processing a service request relating to installation, maintenance or repair of telecommunications services provided to a customer premises
US5926539A (en) * 1997-09-12 1999-07-20 Genesys Telecommunications Laboratories, Inc. Method and apparatus for determining agent availability based on level of uncompleted tasks
US6011918A (en) * 1998-04-22 2000-01-04 International Business Machines Corporation Methods, systems and computer program products for generating client/server applications
US6024643A (en) * 1997-03-04 2000-02-15 Intel Corporation Player profile based proxy play
US6029195A (en) * 1994-11-29 2000-02-22 Herz; Frederick S. M. System for customized electronic identification of desirable objects
US6044355A (en) * 1997-07-09 2000-03-28 Iex Corporation Skills-based scheduling for telephone call centers
US6049776A (en) * 1997-09-06 2000-04-11 Unisys Corporation Human resource management system for staffing projects
US6052711A (en) * 1996-07-01 2000-04-18 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server session web access in an interprise computing framework system.
US6064667A (en) * 1997-02-10 2000-05-16 Genesys Telecommunications Laboratories, Inc. Apparatus and methods enhancing call routing to and within call centers
US6070142A (en) * 1998-04-17 2000-05-30 Andersen Consulting Llp Virtual customer sales and service center and method
US6078582A (en) * 1996-12-18 2000-06-20 Bell Atlantic Network Services, Inc. Internet long distance telephone service
US6078581A (en) * 1997-09-12 2000-06-20 Genesys Telecommunications Laboratories, Inc. Internet call waiting
US6170011B1 (en) * 1998-09-11 2001-01-02 Genesys Telecommunications Laboratories, Inc. Method and apparatus for determining and initiating interaction directionality within a multimedia communication center
US6185611B1 (en) * 1998-03-20 2001-02-06 Sun Microsystem, Inc. Dynamic lookup service in a distributed system
US6188683B1 (en) * 1997-02-19 2001-02-13 Softalk, Inc. System and method for establishing long distance voice communications using the internet
US6209018B1 (en) * 1997-11-13 2001-03-27 Sun Microsystems, Inc. Service framework for a distributed object network system
US6219045B1 (en) * 1995-11-13 2001-04-17 Worlds, Inc. Scalable virtual world chat client-server system
US6223182B1 (en) * 1998-06-30 2001-04-24 Oracle Corporation Dynamic data organization
US6223165B1 (en) * 1999-03-22 2001-04-24 Keen.Com, Incorporated Method and apparatus to connect consumer to expert
US6222856B1 (en) * 1996-07-02 2001-04-24 Murali R. Krishnan Adaptive bandwidth throttling for individual virtual services supported on a network server
US6226666B1 (en) * 1997-06-27 2001-05-01 International Business Machines Corporation Agent-based management system having an open layered architecture for synchronous and/or asynchronous messaging handling
US6225998B1 (en) * 1997-12-02 2001-05-01 Aspect Communications Visual design of workflows for transaction processing
US6237009B1 (en) * 1996-10-11 2001-05-22 Sun Microsystems, Inc. Lease renewal service
US6263066B1 (en) * 1997-02-06 2001-07-17 Genesys Telecommunications Laboratories, Inc. Multimedia managing and prioritized queuing system integrated with intelligent routing capability
US20010054064A1 (en) * 1997-07-02 2001-12-20 Pallipuram V. Kannan Method system and computer program product for providing customer service over the world-wide web
US6346956B2 (en) * 1996-09-30 2002-02-12 Sony Corporation Three-dimensional virtual reality space display processing apparatus, a three-dimensional virtual reality space display processing method, and an information providing medium
US6349238B1 (en) * 1998-09-16 2002-02-19 Mci Worldcom, Inc. System and method for managing the workflow for processing service orders among a variety of organizations within a telecommunications company
US6353398B1 (en) * 1999-10-22 2002-03-05 Himanshu S. Amin System for dynamically pushing information to a user utilizing global positioning system
US6356632B1 (en) * 1998-12-31 2002-03-12 Avaya Technology Corp. Call selection and agent selection in a call center based on agent staffing schedule
US6363065B1 (en) * 1999-11-10 2002-03-26 Quintum Technologies, Inc. okApparatus for a voice over IP (voIP) telephony gateway and methods for use therein
US6380951B1 (en) * 1999-10-01 2002-04-30 Global Graphics Software Limited Prepress workflow method and program
US6381640B1 (en) * 1998-09-11 2002-04-30 Genesys Telecommunications Laboratories, Inc. Method and apparatus for automated personalization and presentation of workload assignments to agents within a multimedia communication center
US6385626B1 (en) * 1998-11-19 2002-05-07 Emc Corporation Method and apparatus for identifying changes to a logical object based on changes to the logical object at physical level
US6401109B1 (en) * 1996-11-18 2002-06-04 International Business Machines Corp. Virtual socket for JAVA interprocess communication
US20020069272A1 (en) * 2000-05-05 2002-06-06 Kim Steven D. System and method for managing server configurations
US6403564B1 (en) * 1998-10-16 2002-06-11 Schering Corporation Ribavirin-interferon alfa combination therapy for eradicating detectable HCV-RNA in patients having chronic hepatitis C infection
US6405367B1 (en) * 1998-06-05 2002-06-11 Hewlett-Packard Company Apparatus and method for increasing the performance of Java programs running on a server
US20020077876A1 (en) * 2000-12-18 2002-06-20 O'meara Cian E. Allocation of location-based orders to mobile agents
US6523027B1 (en) * 1999-07-30 2003-02-18 Accenture Llp Interfacing servers in a Java based e-commerce architecture
US6536935B2 (en) * 1997-07-23 2003-03-25 Atarum Institute Computerized system for market-based constraint optimization
US6557003B1 (en) * 1998-04-30 2003-04-29 Genesys Telecommunications Laboratories, Inc. Method and apparatus for multiple agent commitment tracking and notification
US6560656B1 (en) * 1998-02-26 2003-05-06 Sun Microsystems, Inc. Apparatus and method for providing downloadable code for use in communicating with a device in a distributed system
US6564216B2 (en) * 1998-10-29 2003-05-13 Nortel Networks Limited Server manager
US6574229B1 (en) * 1998-10-23 2003-06-03 Fujitsu Limited Wide area load distribution apparatus and method
US6574633B1 (en) * 1999-11-01 2003-06-03 Honeywell International Inc. Method for dynamically grouping limited range physical entities in a topological space
US20030120829A1 (en) * 2001-07-11 2003-06-26 Sun Microsystems, Inc. Registry service for use in a distributed processing framework system and methods for implementing the same
US6633900B1 (en) * 1999-01-08 2003-10-14 Abb Inc. Mobile crew management system for distributing work order assignments to mobile field crew units
US6684331B1 (en) * 1999-12-22 2004-01-27 Cisco Technology, Inc. Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure
US6684087B1 (en) * 1999-05-07 2004-01-27 Openwave Systems Inc. Method and apparatus for displaying images on mobile devices
US6684136B2 (en) * 1999-12-01 2004-01-27 Sinex Aviation Technologies Corporation Dynamic assignment of maintenance tasks to maintenance personnel
US6697848B2 (en) * 1995-09-20 2004-02-24 Sun Microsystems, Inc. Method and apparatus for enabling application programs to communicate with network clients and servers
US6718515B1 (en) * 1999-12-07 2004-04-06 International Business Machines Corporation Method of populating a dynamic HTML table from a set of data objects through a common interface
US20040073601A1 (en) * 1998-03-25 2004-04-15 Digital-Vending Services International, Llc Computer architecture for managing courseware in a shared use operating environment
US6732165B1 (en) * 2000-08-31 2004-05-04 International Business Machines Corporation Simultaneous network configuration of multiple headless machines
US6735293B2 (en) * 2001-06-05 2004-05-11 Bell Canada Method and system for facilitating telecommunications service provisioning and service assurance
US6757912B1 (en) * 1997-03-31 2004-06-29 Hewlett-Packard Development Company, L.P. Channel server functionality
US6842779B1 (en) * 1998-03-11 2005-01-11 Yasuo Nishizawa Agent accessory tool cooperating with integrated application on WEB server by HTTP protocol
US6842799B2 (en) * 1999-09-09 2005-01-11 Hewlett-Packard Development Company, L.P. Appliance communications manager
US6850895B2 (en) * 1998-11-30 2005-02-01 Siebel Systems, Inc. Assignment manager
US6859523B1 (en) * 2001-11-14 2005-02-22 Qgenisys, Inc. Universal task management system, method and product for automatically managing remote workers, including assessing the work product and workers
US6862594B1 (en) * 2000-05-09 2005-03-01 Sun Microsystems, Inc. Method and apparatus to discover services using flexible search criteria
US6868441B2 (en) * 2000-05-22 2005-03-15 Mci, Inc. Method and system for implementing a global ecosystem of interrelated services
US6880007B1 (en) * 1999-06-07 2005-04-12 Register Com, Inc. Domain manager and method of use
US6901518B1 (en) * 1999-04-08 2005-05-31 Sun Microsystems, Inc. Method and system for establishing trust in downloaded proxy code
US6970829B1 (en) * 2000-02-14 2005-11-29 Iex Corporation Method and system for skills-based planning and scheduling in a workforce contact center environment
US6978006B1 (en) * 2000-10-12 2005-12-20 Intervoice Limited Partnership Resource management utilizing quantified resource attributes
US20060031237A1 (en) * 1998-03-30 2006-02-09 Deanna Robert System for development, management and operation of distributed clients and servers
US7020619B2 (en) * 2000-08-28 2006-03-28 Thompson Daniel J Method, system, and computer software program product for analyzing the efficiency of a complex process
US7023979B1 (en) * 2002-03-07 2006-04-04 Wai Wu Telephony control system with intelligent call routing
US7051212B2 (en) * 1995-02-13 2006-05-23 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7194543B2 (en) * 2001-11-12 2007-03-20 Mci, Llc System and method for creating and managing survivable, service hosting networks
US7383332B2 (en) * 2002-04-08 2008-06-03 International Business Machines Corporation Method for problem determination in distributed enterprise applications
US7552056B2 (en) * 2001-09-25 2009-06-23 Emc Corporation Scalable storage service registration application
US7769160B1 (en) * 2006-02-24 2010-08-03 West Corporation System, method, and computer readable medium for routing an agent to a preferred communications platform in order to receive a customer call
US7792773B2 (en) * 2002-10-23 2010-09-07 Genesys Telecommunications Laboratories, Inc. Method and system for enabling automated and real-time discovery of skills available to agents and systems in a multimedia communications network

Family Cites Families (159)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US169890A (en) * 1875-11-16 Improvement in windmills
US576906A (en) * 1897-02-09 Device for imparting motion to movable bodies
US5058108A (en) 1984-06-01 1991-10-15 Digital Equipment Corporation Local area network for digital data processing system
US5008853A (en) * 1987-12-02 1991-04-16 Xerox Corporation Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstation environment
JP3020500B2 (en) * 1988-01-29 2000-03-15 株式会社日立製作所 Database system having memo information and method of managing memo information
US4977520A (en) * 1988-02-03 1990-12-11 Ibm Corp. Method to facilitate a reply to electronic meeting invitation in an interactive multi-terminal system employing electronic calendars
US5107443A (en) * 1988-09-07 1992-04-21 Xerox Corporation Private regions within a shared workspace
US4961224A (en) * 1989-03-06 1990-10-02 Darby Yung Controlling access to network resources
EP0447038B1 (en) 1990-02-14 1997-05-28 Fujitsu Limited A system for establishing a communication path in a closely coupled computer system
US5560006A (en) * 1991-05-15 1996-09-24 Automated Technology Associates, Inc. Entity-relation database
US5349662A (en) * 1992-05-21 1994-09-20 International Business Machines Corporation Method of and apparatus for providing automatic detection of user activity
US5999908A (en) * 1992-08-06 1999-12-07 Abelow; Daniel H. Customer-based product design module
JP3503957B2 (en) 1992-11-25 2004-03-08 富士通株式会社 Method and apparatus for controlling remote database
DE4306154A1 (en) * 1993-02-27 1994-09-01 Hoechst Ag Sealable oriented polyolefin multilayer film, process for its production and its use
US5360392A (en) 1993-05-14 1994-11-01 Northeast Orthotics & Prosthetics, Inc. Method of forming a scoliosis brace
US5526524A (en) * 1993-12-23 1996-06-11 International Business Machines Corporation Method and system for management of locked objects in a computer supported cooperative work environment
US5467268A (en) 1994-02-25 1995-11-14 Minnesota Mining And Manufacturing Company Method for resource assignment and scheduling
JPH07302236A (en) 1994-05-06 1995-11-14 Hitachi Ltd Information processing system, method therefor and service providing method in the information processing system
KR100378725B1 (en) * 1994-07-26 2003-06-12 소니 가부시끼 가이샤 Information provision system
US5680530A (en) * 1994-09-19 1997-10-21 Lucent Technologies Inc. Graphical environment for interactively specifying a target system
US5550816A (en) * 1994-12-29 1996-08-27 Storage Technology Corporation Method and apparatus for virtual switching
US5682475A (en) * 1994-12-30 1997-10-28 International Business Machines Corporation Method and system for variable password access
US5682478A (en) * 1995-01-19 1997-10-28 Microsoft Corporation Method and apparatus for supporting multiple, simultaneous services over multiple, simultaneous connections between a client and network server
US5659596A (en) * 1995-04-12 1997-08-19 International Business Machines Corporation System for location of communication end users
CA2173304C (en) 1995-04-21 2003-04-29 Anthony J. Dezonno Method and system for establishing voice communications using a computer network
US5692125A (en) 1995-05-09 1997-11-25 International Business Machines Corporation System and method for scheduling linked events with fixed and dynamic conditions
FI104869B (en) 1995-05-24 2000-04-14 Ericsson Telefon Ab L M Method for establishing a voice connection between networks and an intelligent network service
CA2180891C (en) 1995-07-12 2010-01-12 Junichi Rekimoto Notification of updates in a three-dimensional virtual reality space sharing system
US5904804A (en) * 1995-09-06 1999-05-18 Matsushita Electric Industrial Co., Ltd. Battery label wrapping method and apparatus
US5960194A (en) * 1995-09-11 1999-09-28 International Business Machines Corporation Method for generating a multi-tiered index for partitioned data
US20010040885A1 (en) 1995-10-13 2001-11-15 Howard Jonas Method and apparatus for transmitting and routing voice telephone calls over a packet switched computer network
JP3001087B2 (en) * 1995-10-18 2000-01-17 株式会社日立製作所 Automatic analyzer and method
US6104717A (en) 1995-11-03 2000-08-15 Cisco Technology, Inc. System and method for providing backup machines for implementing multiple IP addresses on multiple ports
US5764906A (en) * 1995-11-07 1998-06-09 Netword Llc Universal electronic resource denotation, request and delivery system
WO1997018661A1 (en) * 1995-11-13 1997-05-22 Answersoft, Inc. Intelligent information routing system and method
US5848393A (en) * 1995-12-15 1998-12-08 Ncr Corporation "What if . . . " function for simulating operations within a task workflow management system
US5799297A (en) * 1995-12-15 1998-08-25 Ncr Corporation Task workflow management system and method including an external program execution feature
US5960173A (en) * 1995-12-22 1999-09-28 Sun Microsystems, Inc. System and method enabling awareness of others working on similar tasks in a computer work environment
US5802511A (en) * 1996-01-02 1998-09-01 Timeline, Inc. Data retrieval method and apparatus with multiple source capability
EP0886936A4 (en) 1996-01-23 1999-04-28 Firetalk Inc Internet telecommunications system
US6049673A (en) * 1996-03-08 2000-04-11 Organicnet, Inc. Organicware applications for computer systems
US6324264B1 (en) 1996-03-15 2001-11-27 Telstra Corporation Limited Method of establishing a communications call
US6708171B1 (en) 1996-04-23 2004-03-16 Sun Microsystems, Inc. Network proxy
US5704036A (en) 1996-06-28 1997-12-30 Mci Communications Corporation System and method for reported trouble isolation
US6260078B1 (en) 1996-07-03 2001-07-10 Sun Microsystems, Inc. Using a distributed object system to find and download java-based applications
US7613801B2 (en) 1996-07-12 2009-11-03 Microsoft Corporation System and method for monitoring server performance using a server
US5878410A (en) * 1996-09-13 1999-03-02 Microsoft Corporation File system sort order indexes
US5799313A (en) * 1996-10-25 1998-08-25 International Business Machines Corporation Framework for object-oriented access to non-object-oriented datastores
US5983003A (en) * 1996-11-15 1999-11-09 International Business Machines Corp. Interactive station indicator and user qualifier for virtual worlds
US5999525A (en) * 1996-11-18 1999-12-07 Mci Communications Corporation Method for video telephony over a hybrid network
US6546003B1 (en) * 1996-11-21 2003-04-08 Verizon Services Corp. Telecommunications system
US6006193A (en) 1996-12-18 1999-12-21 Gibson; Kenneth U. Computer executable workflow control system
US5940804A (en) 1996-12-18 1999-08-17 Turley; William N. Computer executable workflow resource management system
US6310873B1 (en) 1997-01-09 2001-10-30 International Business Machines Corporation Internet telephony directory server
RU2144274C1 (en) 1997-02-07 2000-01-10 Самсунг Электроникс Ко., Лтд. Method for transmission and processing of message groups in electronic mail system
US5848418A (en) * 1997-02-19 1998-12-08 Watchsoft, Inc. Electronic file analyzer and selector
US6137869A (en) 1997-09-16 2000-10-24 Bell Atlantic Network Services, Inc. Network session management
US6157648A (en) 1997-03-06 2000-12-05 Bell Atlantic Network Services, Inc. Network session management
US6295292B1 (en) * 1997-03-06 2001-09-25 Bell Atlantic Network Services, Inc. Inbound gateway authorization processing for inter-carrier internet telephony
US6292481B1 (en) * 1997-09-16 2001-09-18 Bell Atlantic Network Services, Inc. Inter-carrier signaling and usage accounting architecture for internet telephony
US6104704A (en) * 1997-03-20 2000-08-15 At&T Corp. Methods and apparatus for gathering and processing billing information for internet telephony
JP3447038B2 (en) * 1997-04-07 2003-09-16 株式会社石井 Roll-up shutter for cargo body
US6085030A (en) * 1997-05-02 2000-07-04 Novell, Inc. Network component server
US6578077B1 (en) 1997-05-27 2003-06-10 Novell, Inc. Traffic monitoring tool for bandwidth management
US6442549B1 (en) * 1997-07-25 2002-08-27 Eric Schneider Method, product, and apparatus for processing reusable information
US6125382A (en) 1997-07-25 2000-09-26 International Business Machines Corporation Distributed thread mechanism and method
US6144667A (en) 1997-08-07 2000-11-07 At&T Corp. Network-based method and apparatus for initiating and completing a telephone call via the internet
US5968121A (en) 1997-08-13 1999-10-19 Microsoft Corporation Method and apparatus for representing and applying network topological data
US6092061A (en) * 1997-08-15 2000-07-18 International Business Machines Corporation Data partitioning by co-locating referenced and referencing records
US6233584B1 (en) * 1997-09-09 2001-05-15 International Business Machines Corporation Technique for providing a universal query for multiple different databases
US5958013A (en) 1997-09-11 1999-09-28 International Business Machines Corporation Apparatus, methods and computer program products for conducting a persistent session with a host-based application
US5999910A (en) 1997-10-06 1999-12-07 Fmr Corp. Processing a workflow item
US6272537B1 (en) * 1997-11-17 2001-08-07 Fujitsu Limited Method for building element manager for a computer network element using a visual element manager builder process
US6167449A (en) * 1997-11-19 2000-12-26 Apple Computer, Inc. System and method for identifying and locating services on multiple heterogeneous networks using a query by type
US6585779B1 (en) * 1997-11-20 2003-07-01 International Business Machines Corporation Method and apparatus for determining and categorizing Java Bean names and sub-elements files
WO1999030494A1 (en) 1997-12-09 1999-06-17 British Telecommunications Public Limited Company Conference facility
GB2332335A (en) 1997-12-10 1999-06-16 Northern Telecom Ltd Network management system
US6097804A (en) 1997-12-23 2000-08-01 Bell Canada Method and system for completing a voice connection between first and second voice terminals in a switched telephone network
US6266614B1 (en) * 1997-12-24 2001-07-24 Wendell Alumbaugh Travel guide
US6329986B1 (en) * 1998-02-21 2001-12-11 U.S. Philips Corporation Priority-based virtual environment
US6356920B1 (en) 1998-03-09 2002-03-12 X-Aware, Inc Dynamic, hierarchical data exchange system
US6044353A (en) * 1998-03-10 2000-03-28 Pugliese, Iii; Anthony V. Baggage check-in and security system and method
US6098093A (en) 1998-03-19 2000-08-01 International Business Machines Corp. Maintaining sessions in a clustered server environment
EP0950956A1 (en) 1998-04-17 1999-10-20 BRITISH TELECOMMUNICATIONS public limited company Computer network
US6128611A (en) 1998-04-30 2000-10-03 International Business Machines Corporation Internet-enabled generic application program for accessing hierarchical data
US6138121A (en) * 1998-05-29 2000-10-24 Hewlett-Packard Company Network management event storage and manipulation using relational database technology in a data warehouse
US6397191B1 (en) * 1998-06-05 2002-05-28 I2 Technologies Us, Inc. Object-oriented workflow for multi-enterprise collaboration
US6141773A (en) * 1998-06-30 2000-10-31 Emc Corporation Method and apparatus for undoing changes to computer memory
US6067548A (en) * 1998-07-16 2000-05-23 E Guanxi, Inc. Dynamic organization model and management computing system and method therefor
US6119147A (en) 1998-07-28 2000-09-12 Fuji Xerox Co., Ltd. Method and system for computer-mediated, multi-modal, asynchronous meetings in a virtual space
US6327622B1 (en) 1998-09-03 2001-12-04 Sun Microsystems, Inc. Load balancing in a network environment
US6487583B1 (en) * 1998-09-15 2002-11-26 Ikimbo, Inc. System and method for information and application distribution
US6367034B1 (en) * 1998-09-21 2002-04-02 Microsoft Corporation Using query language for event filtering and aggregation
EP1770617A1 (en) * 1998-09-22 2007-04-04 Science Applications International Corporation User-defined dynamic collaborative environments
US20010039587A1 (en) 1998-10-23 2001-11-08 Stephen Uhler Method and apparatus for accessing devices on a network
US7730089B2 (en) * 1998-11-16 2010-06-01 Punch Networks Corporation Method and system for providing remote access to the facilities of a server computer
US6397205B1 (en) * 1998-11-24 2002-05-28 Duquesne University Of The Holy Ghost Document categorization and evaluation via cross-entrophy
US6334133B1 (en) * 1998-12-21 2001-12-25 Frontline Data, Inc. System and method for performing substitute fulfillment
US20020188720A1 (en) * 1998-12-28 2002-12-12 William F. Terrell Method and apparatus for dynamically controlling the provision of differentiated services
US6731609B1 (en) * 1998-12-31 2004-05-04 Aspect Communications Corp. Telephony system for conducting multimedia telephonic conferences over a packet-based network
US6606647B2 (en) * 1999-01-11 2003-08-12 Infospace, Inc. Server and method for routing messages to achieve unified communications
US6332127B1 (en) 1999-01-28 2001-12-18 International Business Machines Corporation Systems, methods and computer program products for providing time and location specific advertising via the internet
US6772131B1 (en) 1999-02-01 2004-08-03 American Management Systems, Inc. Distributed, object oriented global trade finance system with imbedded imaging and work flow and reference data
US6334141B1 (en) * 1999-02-02 2001-12-25 International Business Machines Corporation Distributed server for real-time collaboration
US6564246B1 (en) * 1999-02-02 2003-05-13 International Business Machines Corporation Shared and independent views of shared workspace for real-time collaboration
US6269373B1 (en) * 1999-02-26 2001-07-31 International Business Machines Corporation Method and system for persisting beans as container-managed fields
US6430564B1 (en) 1999-03-01 2002-08-06 Hewlett-Packard Company Java data manager for embedded device
US6295513B1 (en) 1999-03-16 2001-09-25 Eagle Engineering Of America, Inc. Network-based system for the manufacture of parts with a virtual collaborative environment for design, developement, and fabricator selection
US6668353B1 (en) 1999-03-25 2003-12-23 Lucent Technologies Inc. Space/time portals for computer systems
US6789252B1 (en) 1999-04-15 2004-09-07 Miles D. Burke Building business objects and business software applications using dynamic object definitions of ingrediential objects
US6611822B1 (en) 1999-05-05 2003-08-26 Ac Properties B.V. System method and article of manufacture for creating collaborative application sharing
US6341289B1 (en) 1999-05-06 2002-01-22 International Business Machines Corporation Object identity and partitioning for user defined extents
US6564261B1 (en) * 1999-05-10 2003-05-13 Telefonaktiebolaget Lm Ericsson (Publ) Distributed system to intelligently establish sessions between anonymous users over various networks
WO2000068824A1 (en) 1999-05-10 2000-11-16 3Com Corporation Method and system for network management
US7251826B1 (en) 1999-06-07 2007-07-31 Register.Com, Inc. Domain manager for plural domains and method of use
US6892230B1 (en) * 1999-06-11 2005-05-10 Microsoft Corporation Dynamic self-configuration for ad hoc peer networking using mark-up language formated description messages
US6442564B1 (en) 1999-06-14 2002-08-27 International Business Machines Corporation Facilitating workload management by using a location forwarding capability
US7017159B1 (en) 1999-06-15 2006-03-21 Sun Microsystems, Inc. Smart bookmarks for small footprint device applications
US20010049741A1 (en) * 1999-06-18 2001-12-06 Bryan D. Skene Method and system for balancing load distribution on a wide area network
US6412014B1 (en) * 1999-06-22 2002-06-25 William Kenneth Ryan Internet directory based upon names related to domain names
US6415259B1 (en) * 1999-07-15 2002-07-02 American Management Systems, Inc. Automatic work progress tracking and optimizing engine for a telecommunications customer care and billing system
US6289340B1 (en) 1999-08-03 2001-09-11 Ixmatch, Inc. Consultant matching system and method for selecting candidates from a candidate pool by adjusting skill values
US6496851B1 (en) * 1999-08-04 2002-12-17 America Online, Inc. Managing negotiations between users of a computer network by automatically engaging in proposed activity using parameters of counterproposal of other user
US6289382B1 (en) 1999-08-31 2001-09-11 Andersen Consulting, Llp System, method and article of manufacture for a globally addressable interface in a communication services patterns environment
US6640249B1 (en) 1999-08-31 2003-10-28 Accenture Llp Presentation services patterns in a netcentric environment
US6438594B1 (en) 1999-08-31 2002-08-20 Accenture Llp Delivering service to a client via a locally addressable interface
US6473503B1 (en) 1999-08-31 2002-10-29 Worldcom, Inc. System, method and computer program product for achieving local number portability network management support
US6332163B1 (en) 1999-09-01 2001-12-18 Accenture, Llp Method for providing communication services over a computer network system
US6769000B1 (en) 1999-09-08 2004-07-27 Nortel Networks Limited Unified directory services architecture for an IP mobility architecture framework
US6430575B1 (en) * 1999-09-10 2002-08-06 Xerox Corporation Collaborative document management system with customizable filing structures that are mutually intelligible
US6289460B1 (en) * 1999-09-13 2001-09-11 Astus Corporation Document management system
US6343324B1 (en) * 1999-09-13 2002-01-29 International Business Machines Corporation Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices
US6832203B1 (en) * 1999-11-05 2004-12-14 Cim, Ltd. Skills based contact routing
US20020055351A1 (en) * 1999-11-12 2002-05-09 Elsey Nicholas J. Technique for providing personalized information and communications services
US7822823B2 (en) * 1999-12-14 2010-10-26 Neeraj Jhanji Systems for communicating current and future activity information among mobile internet users and methods therefor
US20010047385A1 (en) 1999-12-30 2001-11-29 Jeffrey Tuatini Passthru to shared service funtionality
US6611840B1 (en) * 2000-01-21 2003-08-26 International Business Machines Corporation Method and system for removing content entity object in a hierarchically structured content object stored in a database
JP4413358B2 (en) * 2000-01-31 2010-02-10 富士通株式会社 Fault monitoring system and fault notification method
US6947440B2 (en) * 2000-02-15 2005-09-20 Gilat Satellite Networks, Ltd. System and method for internet page acceleration including multicast transmissions
US6728759B1 (en) * 2000-02-22 2004-04-27 Hong Chan Na System and method of composing search free mail
US6651190B1 (en) 2000-03-14 2003-11-18 A. Worley Independent remote computer maintenance device
US7065493B1 (en) * 2000-04-06 2006-06-20 International Business Machines Corporation Workflow system and method
US6917976B1 (en) 2000-05-09 2005-07-12 Sun Microsystems, Inc. Message-based leasing of resources in a distributed computing environment
US7072967B1 (en) 2000-05-09 2006-07-04 Sun Microsystems, Inc. Efficient construction of message endpoints
WO2002029584A1 (en) 2000-10-04 2002-04-11 Enic Corporation Providing services and information based on a request that includes a unique identifier
CN100339846C (en) * 2000-11-01 2007-09-26 斯雷普内姆斯·Com公司 Domain Name acquisition and management system and method
US6822945B2 (en) 2000-11-08 2004-11-23 Genesys Telecommunications Laboratories, Inc. Method and apparatus for anticipating and planning communication-center resources based on evaluation of events waiting in a communication center master queue
US7184967B1 (en) * 2001-03-06 2007-02-27 Microsoft Corporation System and method utilizing a graphical user interface of a business process workflow scheduling program
US6959333B2 (en) * 2001-05-08 2005-10-25 Lucent Technologies Inc. Technique for content delivery over the internet
US6801919B2 (en) 2001-07-27 2004-10-05 Hewlett-Packard Development Company, L.P. Object oriented database interface encapsulation that allows for chronologically overlapping transactions in a multi-threaded environment
US9898462B2 (en) * 2001-09-20 2018-02-20 Wellogix Technology Licensing, Llc Process and system for providing and managing offline input of field documentation to a complex project workflow system
US6931427B2 (en) 2001-10-31 2005-08-16 Sun Microsystems, Inc. Method and apparatus for discovering data services in a distributed computer system
US7127713B2 (en) 2002-01-11 2006-10-24 Akamai Technologies, Inc. Java application framework for use in a content delivery network (CDN)
US20030140119A1 (en) * 2002-01-18 2003-07-24 International Business Machines Corporation Dynamic service discovery
US6822155B2 (en) 2002-02-21 2004-11-23 Kabushiki Kaisha Kawai Gakki Seisakusho Key to switch for electronic musical instrument
US20040003058A1 (en) * 2002-06-26 2004-01-01 Nokia, Inc. Integration of service registration and discovery in networks
US6982230B2 (en) * 2002-11-08 2006-01-03 International Business Machines Corporation Deposition of hafnium oxide and/or zirconium oxide and fabrication of passivated electronic structures
US7171664B2 (en) * 2002-12-16 2007-01-30 International Business Machines Corporation Content management system and method of employing extensible workflow entities with user-defined attributes in an object-oriented framework
US6862894B1 (en) * 2004-02-04 2005-03-08 Donald R. Miles Adaptive auxiliary condensing device and method

Patent Citations (107)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3058A (en) * 1843-04-25 Stove
US140119A (en) * 1873-06-24 Improvements nut-locks
US43600A (en) * 1864-07-19 Improvement in hay-presses
US91827A (en) * 1869-06-29 Improvement in speaking-tube signal
US91703A (en) * 1869-06-22 Improvement in match-box
US188720A (en) * 1877-03-20 Improvement in manufacture of boxes
US5008878A (en) * 1987-10-20 1991-04-16 International Business Machines Corporation High-speed modular switching apparatus for circuit and packet switched traffic
US5014266A (en) * 1988-12-28 1991-05-07 At&T Bell Laboratories Circuit switching system for interconnecting logical links between packet switching networks
US5726984A (en) * 1989-01-31 1998-03-10 Norand Corporation Hierarchical data collection network supporting packetized voice communications among wireless terminals and telephones
US5019961A (en) * 1989-04-05 1991-05-28 Cadware, Inc. Computer apparatus and method for logical modelling
US5117353A (en) * 1989-05-05 1992-05-26 Staff-Plus, Inc. System for use in a temporary help business
US5111391A (en) * 1989-10-05 1992-05-05 Mrs. Fields, Inc. System and method for making staff schedules as a function of available resources as well as employee skill level, availability and priority
US5515531A (en) * 1992-05-29 1996-05-07 Hitachi, Ltd. Parallel database processing system and retrieval method using secondary key
US5734837A (en) * 1994-01-14 1998-03-31 Action Technologies, Inc. Method and apparatus for building business process applications in terms of its workflows
US5721913A (en) * 1994-05-05 1998-02-24 Lucent Technologies Inc. Integrated activity management system
US6029195A (en) * 1994-11-29 2000-02-22 Herz; Frederick S. M. System for customized electronic identification of desirable objects
US5873093A (en) * 1994-12-07 1999-02-16 Next Software, Inc. Method and apparatus for mapping objects to a data source
US5526353A (en) * 1994-12-20 1996-06-11 Henley; Arthur System and method for communication of audio data over a packet-based network
US5608786A (en) * 1994-12-23 1997-03-04 Alphanet Telecom Inc. Unified messaging system and method
US5615121A (en) * 1995-01-31 1997-03-25 U S West Technologies, Inc. System and method for scheduling service providers to perform customer service requests
US7051212B2 (en) * 1995-02-13 2006-05-23 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5774661A (en) * 1995-04-18 1998-06-30 Network Imaging Corporation Rule engine interface for a visual workflow builder
US5749075A (en) * 1995-06-06 1998-05-05 Interactive Media Works, L.L.C. Method for providing prepaid internet access and/or long distance calling including the distribution of specialized calling cards
US5779297A (en) * 1995-06-28 1998-07-14 Saar-Gummewerke Gmbh Slit-covering profile with integrated repair solution
US6697848B2 (en) * 1995-09-20 2004-02-24 Sun Microsystems, Inc. Method and apparatus for enabling application programs to communicate with network clients and servers
US6219045B1 (en) * 1995-11-13 2001-04-17 Worlds, Inc. Scalable virtual world chat client-server system
US5765140A (en) * 1995-11-17 1998-06-09 Mci Corporation Dynamic project management system
US5761499A (en) * 1995-12-21 1998-06-02 Novell, Inc. Method for managing globally distributed software components
US5737727A (en) * 1996-01-25 1998-04-07 Electronic Data Systems Corporation Process management system and method
US5920846A (en) * 1996-02-27 1999-07-06 Southwestern Bell Telephone Co. Method and system for processing a service request relating to installation, maintenance or repair of telecommunications services provided to a customer premises
US5751706A (en) * 1996-06-05 1998-05-12 Cignal Global Communications, Inc. System and method for establishing a call telecommunications path
US6052711A (en) * 1996-07-01 2000-04-18 Sun Microsystems, Inc. Object-oriented system, method and article of manufacture for a client-server session web access in an interprise computing framework system.
US6222856B1 (en) * 1996-07-02 2001-04-24 Murali R. Krishnan Adaptive bandwidth throttling for individual virtual services supported on a network server
US5721770A (en) * 1996-07-02 1998-02-24 Lucent Technologies Inc. Agent vectoring programmably conditionally assigning agents to various tasks including tasks other than handling of waiting calls
US6346956B2 (en) * 1996-09-30 2002-02-12 Sony Corporation Three-dimensional virtual reality space display processing apparatus, a three-dimensional virtual reality space display processing method, and an information providing medium
US5724412A (en) * 1996-10-07 1998-03-03 U S West, Inc. Method and system for displaying internet identification on customer premises equipment
US6237009B1 (en) * 1996-10-11 2001-05-22 Sun Microsystems, Inc. Lease renewal service
US5884029A (en) * 1996-11-14 1999-03-16 International Business Machines Corporation User interaction with intelligent virtual objects, avatars, which interact with other avatars controlled by different users
US5872841A (en) * 1996-11-14 1999-02-16 Siemens Information And Comunication Newtworks, Inc. Apparatus and method for scheduling a telephone call
US5867494A (en) * 1996-11-18 1999-02-02 Mci Communication Corporation System, method and article of manufacture with integrated video conferencing billing in a communication system architecture
US6401109B1 (en) * 1996-11-18 2002-06-04 International Business Machines Corp. Virtual socket for JAVA interprocess communication
US5918229A (en) * 1996-11-22 1999-06-29 Mangosoft Corporation Structured data storage using globally addressable memory
US6078582A (en) * 1996-12-18 2000-06-20 Bell Atlantic Network Services, Inc. Internet long distance telephone service
US6263066B1 (en) * 1997-02-06 2001-07-17 Genesys Telecommunications Laboratories, Inc. Multimedia managing and prioritized queuing system integrated with intelligent routing capability
US6064667A (en) * 1997-02-10 2000-05-16 Genesys Telecommunications Laboratories, Inc. Apparatus and methods enhancing call routing to and within call centers
US6188683B1 (en) * 1997-02-19 2001-02-13 Softalk, Inc. System and method for establishing long distance voice communications using the internet
US6024643A (en) * 1997-03-04 2000-02-15 Intel Corporation Player profile based proxy play
US6757912B1 (en) * 1997-03-31 2004-06-29 Hewlett-Packard Development Company, L.P. Channel server functionality
US6226666B1 (en) * 1997-06-27 2001-05-01 International Business Machines Corporation Agent-based management system having an open layered architecture for synchronous and/or asynchronous messaging handling
US20010054064A1 (en) * 1997-07-02 2001-12-20 Pallipuram V. Kannan Method system and computer program product for providing customer service over the world-wide web
US6044355A (en) * 1997-07-09 2000-03-28 Iex Corporation Skills-based scheduling for telephone call centers
US6536935B2 (en) * 1997-07-23 2003-03-25 Atarum Institute Computerized system for market-based constraint optimization
US6049776A (en) * 1997-09-06 2000-04-11 Unisys Corporation Human resource management system for staffing projects
US5926539A (en) * 1997-09-12 1999-07-20 Genesys Telecommunications Laboratories, Inc. Method and apparatus for determining agent availability based on level of uncompleted tasks
US6078581A (en) * 1997-09-12 2000-06-20 Genesys Telecommunications Laboratories, Inc. Internet call waiting
US6209018B1 (en) * 1997-11-13 2001-03-27 Sun Microsystems, Inc. Service framework for a distributed object network system
US6225998B1 (en) * 1997-12-02 2001-05-01 Aspect Communications Visual design of workflows for transaction processing
US6560656B1 (en) * 1998-02-26 2003-05-06 Sun Microsystems, Inc. Apparatus and method for providing downloadable code for use in communicating with a device in a distributed system
US6842779B1 (en) * 1998-03-11 2005-01-11 Yasuo Nishizawa Agent accessory tool cooperating with integrated application on WEB server by HTTP protocol
US6185611B1 (en) * 1998-03-20 2001-02-06 Sun Microsystem, Inc. Dynamic lookup service in a distributed system
US20040073601A1 (en) * 1998-03-25 2004-04-15 Digital-Vending Services International, Llc Computer architecture for managing courseware in a shared use operating environment
US20060031237A1 (en) * 1998-03-30 2006-02-09 Deanna Robert System for development, management and operation of distributed clients and servers
US6070142A (en) * 1998-04-17 2000-05-30 Andersen Consulting Llp Virtual customer sales and service center and method
US6011918A (en) * 1998-04-22 2000-01-04 International Business Machines Corporation Methods, systems and computer program products for generating client/server applications
US6557003B1 (en) * 1998-04-30 2003-04-29 Genesys Telecommunications Laboratories, Inc. Method and apparatus for multiple agent commitment tracking and notification
US6405367B1 (en) * 1998-06-05 2002-06-11 Hewlett-Packard Company Apparatus and method for increasing the performance of Java programs running on a server
US6223182B1 (en) * 1998-06-30 2001-04-24 Oracle Corporation Dynamic data organization
US6170011B1 (en) * 1998-09-11 2001-01-02 Genesys Telecommunications Laboratories, Inc. Method and apparatus for determining and initiating interaction directionality within a multimedia communication center
US6381640B1 (en) * 1998-09-11 2002-04-30 Genesys Telecommunications Laboratories, Inc. Method and apparatus for automated personalization and presentation of workload assignments to agents within a multimedia communication center
US6349238B1 (en) * 1998-09-16 2002-02-19 Mci Worldcom, Inc. System and method for managing the workflow for processing service orders among a variety of organizations within a telecommunications company
US6403564B1 (en) * 1998-10-16 2002-06-11 Schering Corporation Ribavirin-interferon alfa combination therapy for eradicating detectable HCV-RNA in patients having chronic hepatitis C infection
US6574229B1 (en) * 1998-10-23 2003-06-03 Fujitsu Limited Wide area load distribution apparatus and method
US6564216B2 (en) * 1998-10-29 2003-05-13 Nortel Networks Limited Server manager
US6385626B1 (en) * 1998-11-19 2002-05-07 Emc Corporation Method and apparatus for identifying changes to a logical object based on changes to the logical object at physical level
US6850895B2 (en) * 1998-11-30 2005-02-01 Siebel Systems, Inc. Assignment manager
US6356632B1 (en) * 1998-12-31 2002-03-12 Avaya Technology Corp. Call selection and agent selection in a call center based on agent staffing schedule
US6633900B1 (en) * 1999-01-08 2003-10-14 Abb Inc. Mobile crew management system for distributing work order assignments to mobile field crew units
US6223165B1 (en) * 1999-03-22 2001-04-24 Keen.Com, Incorporated Method and apparatus to connect consumer to expert
US6901518B1 (en) * 1999-04-08 2005-05-31 Sun Microsystems, Inc. Method and system for establishing trust in downloaded proxy code
US6684087B1 (en) * 1999-05-07 2004-01-27 Openwave Systems Inc. Method and apparatus for displaying images on mobile devices
US6880007B1 (en) * 1999-06-07 2005-04-12 Register Com, Inc. Domain manager and method of use
US6523027B1 (en) * 1999-07-30 2003-02-18 Accenture Llp Interfacing servers in a Java based e-commerce architecture
US6842799B2 (en) * 1999-09-09 2005-01-11 Hewlett-Packard Development Company, L.P. Appliance communications manager
US6380951B1 (en) * 1999-10-01 2002-04-30 Global Graphics Software Limited Prepress workflow method and program
US6353398B1 (en) * 1999-10-22 2002-03-05 Himanshu S. Amin System for dynamically pushing information to a user utilizing global positioning system
US6574633B1 (en) * 1999-11-01 2003-06-03 Honeywell International Inc. Method for dynamically grouping limited range physical entities in a topological space
US6363065B1 (en) * 1999-11-10 2002-03-26 Quintum Technologies, Inc. okApparatus for a voice over IP (voIP) telephony gateway and methods for use therein
US6684136B2 (en) * 1999-12-01 2004-01-27 Sinex Aviation Technologies Corporation Dynamic assignment of maintenance tasks to maintenance personnel
US6718515B1 (en) * 1999-12-07 2004-04-06 International Business Machines Corporation Method of populating a dynamic HTML table from a set of data objects through a common interface
US6684331B1 (en) * 1999-12-22 2004-01-27 Cisco Technology, Inc. Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure
US6970829B1 (en) * 2000-02-14 2005-11-29 Iex Corporation Method and system for skills-based planning and scheduling in a workforce contact center environment
US20020069272A1 (en) * 2000-05-05 2002-06-06 Kim Steven D. System and method for managing server configurations
US6862594B1 (en) * 2000-05-09 2005-03-01 Sun Microsystems, Inc. Method and apparatus to discover services using flexible search criteria
US6868441B2 (en) * 2000-05-22 2005-03-15 Mci, Inc. Method and system for implementing a global ecosystem of interrelated services
US7020619B2 (en) * 2000-08-28 2006-03-28 Thompson Daniel J Method, system, and computer software program product for analyzing the efficiency of a complex process
US6732165B1 (en) * 2000-08-31 2004-05-04 International Business Machines Corporation Simultaneous network configuration of multiple headless machines
US6978006B1 (en) * 2000-10-12 2005-12-20 Intervoice Limited Partnership Resource management utilizing quantified resource attributes
US20020077876A1 (en) * 2000-12-18 2002-06-20 O'meara Cian E. Allocation of location-based orders to mobile agents
US6735293B2 (en) * 2001-06-05 2004-05-11 Bell Canada Method and system for facilitating telecommunications service provisioning and service assurance
US20030120829A1 (en) * 2001-07-11 2003-06-26 Sun Microsystems, Inc. Registry service for use in a distributed processing framework system and methods for implementing the same
US7552056B2 (en) * 2001-09-25 2009-06-23 Emc Corporation Scalable storage service registration application
US7194543B2 (en) * 2001-11-12 2007-03-20 Mci, Llc System and method for creating and managing survivable, service hosting networks
US6859523B1 (en) * 2001-11-14 2005-02-22 Qgenisys, Inc. Universal task management system, method and product for automatically managing remote workers, including assessing the work product and workers
US7023979B1 (en) * 2002-03-07 2006-04-04 Wai Wu Telephony control system with intelligent call routing
US7383332B2 (en) * 2002-04-08 2008-06-03 International Business Machines Corporation Method for problem determination in distributed enterprise applications
US7792773B2 (en) * 2002-10-23 2010-09-07 Genesys Telecommunications Laboratories, Inc. Method and system for enabling automated and real-time discovery of skills available to agents and systems in a multimedia communications network
US7769160B1 (en) * 2006-02-24 2010-08-03 West Corporation System, method, and computer readable medium for routing an agent to a preferred communications platform in order to receive a customer call

Cited By (110)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6807569B1 (en) * 2000-09-12 2004-10-19 Science Applications International Corporation Trusted and anonymous system and method for sharing threat data to industry assets
US20050108037A1 (en) * 2000-09-12 2005-05-19 Anish Bhimani Information sharing and analysis system and method
US7298734B2 (en) * 2001-03-05 2007-11-20 Qwest Communications International, Inc. Method and system communication system message processing based on classification criteria
US20030031164A1 (en) * 2001-03-05 2003-02-13 Nabkel Jafar S. Method and system communication system message processing based on classification criteria
US7054853B2 (en) * 2001-07-02 2006-05-30 Sun Microsystems, Inc. Methods and system for efficient association traversals
US20030004956A1 (en) * 2001-07-02 2003-01-02 Sun Microsystems, Inc. Methods and system for efficient association traversals
US20040107114A1 (en) * 2002-11-15 2004-06-03 Curtis Peter M. System and method for processing, organizing and accessing mission critical facilities information and intellectual capital
US8250144B2 (en) 2002-11-21 2012-08-21 Blattner Patrick D Multiple avatar personalities
US20040221224A1 (en) * 2002-11-21 2004-11-04 Blattner Patrick D. Multiple avatar personalities
US7636755B2 (en) 2002-11-21 2009-12-22 Aol Llc Multiple avatar personalities
US9215095B2 (en) 2002-11-21 2015-12-15 Microsoft Technology Licensing, Llc Multiple personalities
US9807130B2 (en) 2002-11-21 2017-10-31 Microsoft Technology Licensing, Llc Multiple avatar personalities
US10291556B2 (en) 2002-11-21 2019-05-14 Microsoft Technology Licensing, Llc Multiple personalities
US8205007B2 (en) * 2002-12-13 2012-06-19 Sap Ag Native format tunneling
US20100180047A1 (en) * 2002-12-13 2010-07-15 Peter Surma Native Format Tunneling
US7680818B1 (en) * 2002-12-18 2010-03-16 Oracle International Corporation Analyzing the dependencies between objects in a system
US7640535B2 (en) * 2003-01-24 2009-12-29 Bea Systems, Inc. Method for transaction processing with parallel execution
US20040216107A1 (en) * 2003-01-24 2004-10-28 Bea Systems, Inc. Method for transaction processing with parallel execution
US20040152512A1 (en) * 2003-02-05 2004-08-05 Collodi David J. Video game with customizable character appearance
US20040179037A1 (en) * 2003-03-03 2004-09-16 Blattner Patrick D. Using avatars to communicate context out-of-band
US8402378B2 (en) 2003-03-03 2013-03-19 Microsoft Corporation Reactive avatars
US20070113181A1 (en) * 2003-03-03 2007-05-17 Blattner Patrick D Using avatars to communicate real-time information
US20040176996A1 (en) * 2003-03-03 2004-09-09 Jason Powers Method for monitoring a managed system
US10504266B2 (en) 2003-03-03 2019-12-10 Microsoft Technology Licensing, Llc Reactive avatars
US10616367B2 (en) 2003-03-03 2020-04-07 Microsoft Technology Licensing, Llc Modifying avatar behavior based on user action or mood
US7908554B1 (en) 2003-03-03 2011-03-15 Aol Inc. Modifying avatar behavior based on user action or mood
US9256861B2 (en) 2003-03-03 2016-02-09 Microsoft Technology Licensing, Llc Modifying avatar behavior based on user action or mood
US7913176B1 (en) 2003-03-03 2011-03-22 Aol Inc. Applying access controls to communications with avatars
US8627215B2 (en) 2003-03-03 2014-01-07 Microsoft Corporation Applying access controls to communications with avatars
US20090158184A1 (en) * 2003-03-03 2009-06-18 Aol Llc, A Delaware Limited Liability Company (Formerly Known As Ameria Online, Inc.) Reactive avatars
US20110209198A1 (en) * 2003-03-03 2011-08-25 Aol Inc. Applying access controls to communications with avatars
US9483859B2 (en) 2003-03-03 2016-11-01 Microsoft Technology Licensing, Llc Reactive avatars
US8161094B2 (en) * 2003-06-04 2012-04-17 Sony Computer Entertainment Inc. System and method for notification within decentralized network
US20040249972A1 (en) * 2003-06-04 2004-12-09 Sony Computer Entertainment Inc. System and method for notification within decentralized network
WO2005008429A3 (en) * 2003-07-11 2005-12-01 Computer Ass Think Inc Direct point-to-point communications between applications using a single port
US8108559B2 (en) 2003-07-11 2012-01-31 Computer Associates Think, Inc. Standardizing clocks in a networked computing environment
US20050188082A1 (en) * 2003-07-11 2005-08-25 Computer Associates Think, Inc. System and method for standarizing clocks in a heterogeneous networked environment
US20100153585A1 (en) * 2003-07-11 2010-06-17 Computer Associates Think, Inc. Standardizing Clocks in a Networked Computing Environment
US8200770B2 (en) 2003-07-16 2012-06-12 Sap Aktiengesellschaft Information exchange tool
US20050015362A1 (en) * 2003-07-16 2005-01-20 Manfred Ostertag Information exchange tool
US8443050B2 (en) 2003-07-16 2013-05-14 Sap Aktiengsellschaft Information exchange tool
US20080228857A1 (en) * 2003-07-16 2008-09-18 Sap Aktiengesellschaft Information exchange tool
US7395316B2 (en) * 2003-07-16 2008-07-01 Sap Aktiengesellschaft Establishing dynamic communication group by searching implicit information that is obtained through inference
US20050165935A1 (en) * 2004-01-22 2005-07-28 Moody Paul B. Method and system for providing information regarding recently accessed documents of a remote user through an awareness client program
US20080040198A1 (en) * 2004-04-07 2008-02-14 Siemens Aktiengesellschaft Device and Method for Modeling Electronic Business Transactions
US8547380B2 (en) 2004-08-05 2013-10-01 Elite Avatars, Llc Persistent, immersible and extractable avatars
US20100122267A1 (en) * 2004-08-05 2010-05-13 Elite Avatars, Llc Persistent, immersible and extractable avatars
US7675519B2 (en) 2004-08-05 2010-03-09 Elite Avatars, Inc. Persistent, immersible and extractable avatars
US20060028475A1 (en) * 2004-08-05 2006-02-09 Tobias Richard L Persistent, immersible and extractable avatars
US20090300037A1 (en) * 2004-08-12 2009-12-03 Amdocs (Israel) Ltd. Enhanced database structure configuration
WO2006021944A1 (en) * 2004-08-12 2006-03-02 Leanway Automatic Areanas Ltd. Enhanced database structure configuration
US9652809B1 (en) 2004-12-21 2017-05-16 Aol Inc. Using user profile information to determine an avatar and/or avatar characteristics
US20140168269A1 (en) * 2005-01-19 2014-06-19 International Business Machines Corporation Morphing a data center in a virtual world
US9390467B2 (en) * 2005-01-19 2016-07-12 International Business Machines Corporation Morphing a data center in a virtual world
US20060178898A1 (en) * 2005-02-07 2006-08-10 Babak Habibi Unified event monitoring system
US7889857B2 (en) * 2005-02-15 2011-02-15 Siemens Aktiengesellschaft Method and system for providing a service
US20060182261A1 (en) * 2005-02-15 2006-08-17 Siemens Aktiengesellschaft Method and system for providing a service
US20070073666A1 (en) * 2005-09-28 2007-03-29 Brother Kogyo Kabushiki Kaisha Data Transmission System, Data Transmission Method, Data Transmission Apparatus, and Computer Usable Medium Therefor
US7814041B2 (en) 2007-03-20 2010-10-12 Caporale John L System and method for control and training of avatars in an interactive environment
WO2008115234A1 (en) * 2007-03-20 2008-09-25 John Caporale A system and method for control and training of avatars in an interactive environment
US20080235581A1 (en) * 2007-03-20 2008-09-25 Caporale John L System and method for control and training of avatars in an interactive environment
USRE45132E1 (en) 2007-03-20 2014-09-09 Pea Tree Foundation L.L.C. System and method for control and training of avatars in an interactive environment
US8190624B2 (en) * 2007-11-29 2012-05-29 Microsoft Corporation Data parallel production and consumption
US20090144228A1 (en) * 2007-11-29 2009-06-04 Microsoft Corporation Data parallel production and consumption
US8041740B1 (en) * 2008-03-04 2011-10-18 Amdocs Software Systems Limited Database system, method, and computer program product for recording entity state and type information for use during subsequent processing of data
US10981069B2 (en) 2008-03-07 2021-04-20 Activision Publishing, Inc. Methods and systems for determining the authenticity of copied objects in a virtual environment
US20090259948A1 (en) * 2008-04-15 2009-10-15 Hamilton Ii Rick A Surrogate avatar control in a virtual universe
US8184116B2 (en) 2008-04-24 2012-05-22 International Business Machines Corporation Object based avatar tracking
US20090267950A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Fixed path transitions
US8001161B2 (en) 2008-04-24 2011-08-16 International Business Machines Corporation Cloning objects in a virtual universe
US20090327219A1 (en) * 2008-04-24 2009-12-31 International Business Machines Corporation Cloning Objects in a Virtual Universe
US20090267960A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Color Modification of Objects in a Virtual Universe
US20090267948A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Object based avatar tracking
US20090267937A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Floating transitions
US8466931B2 (en) 2008-04-24 2013-06-18 International Business Machines Corporation Color modification of objects in a virtual universe
US20090271422A1 (en) * 2008-04-24 2009-10-29 International Business Machines Corporation Object Size Modifications Based on Avatar Distance
US8212809B2 (en) 2008-04-24 2012-07-03 International Business Machines Corporation Floating transitions
US8233005B2 (en) 2008-04-24 2012-07-31 International Business Machines Corporation Object size modifications based on avatar distance
US8259100B2 (en) 2008-04-24 2012-09-04 International Business Machines Corporation Fixed path transitions
US20090287728A1 (en) * 2008-05-15 2009-11-19 International Business Machines Corporation Tag along shopping
US8296196B2 (en) 2008-05-15 2012-10-23 International Business Machines Corporation Tag along shopping
US8990705B2 (en) 2008-07-01 2015-03-24 International Business Machines Corporation Color modifications of objects in a virtual universe based on user display settings
US20100005423A1 (en) * 2008-07-01 2010-01-07 International Business Machines Corporation Color Modifications of Objects in a Virtual Universe Based on User Display Settings
US8471843B2 (en) 2008-07-07 2013-06-25 International Business Machines Corporation Geometric and texture modifications of objects in a virtual universe based on real world user characteristics
US9235319B2 (en) 2008-07-07 2016-01-12 International Business Machines Corporation Geometric and texture modifications of objects in a virtual universe based on real world user characteristics
US20100001993A1 (en) * 2008-07-07 2010-01-07 International Business Machines Corporation Geometric and texture modifications of objects in a virtual universe based on real world user characteristics
US20100125543A1 (en) * 2008-11-20 2010-05-20 Motorola, Inc. Method and Apparatus to Facilitate Using a Hierarchical Task Model With Respect to Corresponding End Users
US20100125483A1 (en) * 2008-11-20 2010-05-20 Motorola, Inc. Method and Apparatus to Facilitate Using a Highest Level of a Hierarchical Task Model To Facilitate Correlating End User Input With a Corresponding Meaning
US8478712B2 (en) 2008-11-20 2013-07-02 Motorola Solutions, Inc. Method and apparatus to facilitate using a hierarchical task model with respect to corresponding end users
US8458603B2 (en) 2009-01-14 2013-06-04 International Business Machines Corporation Contextual templates for modifying objects in a virtual universe
US20100177117A1 (en) * 2009-01-14 2010-07-15 International Business Machines Corporation Contextual templates for modifying objects in a virtual universe
US8510755B2 (en) 2009-06-22 2013-08-13 Microsoft Corporation Automatically re-starting services
US20100325642A1 (en) * 2009-06-22 2010-12-23 Microsoft Corporation Automatically re-starting services
US20120303673A1 (en) * 2011-05-27 2012-11-29 International Business Machines Corporation Data stewardship in federated multi-level master data management systems
US8601029B2 (en) * 2011-05-27 2013-12-03 International Business Machines Corporation Data stewardship in federated multi-level master data management systems
CN103179004A (en) * 2011-12-22 2013-06-26 英业达股份有限公司 Container topology production method
US20130191328A1 (en) * 2012-01-25 2013-07-25 Sap Ag Standardized framework for reporting archived legacy system data
US11521140B2 (en) * 2015-04-24 2022-12-06 Delta Pds Co., Ltd. Apparatus for processing work object and method performing the same
US10860958B2 (en) * 2015-04-24 2020-12-08 Delta Pds Co., Ltd Apparatus for processing work object and method performing the same
US20170103362A1 (en) * 2015-04-24 2017-04-13 Delta Pds Co., Ltd Apparatus for processing work object and method performing the same
US10706710B2 (en) * 2016-11-08 2020-07-07 Delta Pds Co., Ltd. Method and apparatus for providing reminder based on chat room
US10868719B2 (en) 2017-04-28 2020-12-15 Oracle International Corporation System and method for federated configuration in an application server environment
CN107318049A (en) * 2017-06-13 2017-11-03 北京比利信息技术有限公司 Launcher fusion methods by all kinds of means
US11403572B2 (en) * 2017-07-20 2022-08-02 Mian Ahmed Method and system for requesting service providers in real time
US11413536B2 (en) 2017-12-22 2022-08-16 Activision Publishing, Inc. Systems and methods for managing virtual items across multiple video game environments
US10765948B2 (en) 2017-12-22 2020-09-08 Activision Publishing, Inc. Video game content aggregation, normalization, and publication systems and methods
US11218386B2 (en) * 2019-09-23 2022-01-04 Microsoft Technology Licensing, Llc Service ticket escalation based on interaction patterns
US11712627B2 (en) 2019-11-08 2023-08-01 Activision Publishing, Inc. System and method for providing conditional access to virtual gaming items
US11380094B2 (en) * 2019-12-12 2022-07-05 At&T Intellectual Property I, L.P. Systems and methods for applied machine cognition
US11334343B1 (en) * 2021-02-09 2022-05-17 Citrix Systems, Inc. Systems and methods for managing releases of applications in a computing environment

Also Published As

Publication number Publication date
US8856087B2 (en) 2014-10-07
US20160308982A1 (en) 2016-10-20
US7428723B2 (en) 2008-09-23
US20110213859A1 (en) 2011-09-01
US20050240621A1 (en) 2005-10-27
US20020165727A1 (en) 2002-11-07
US7802264B2 (en) 2010-09-21
US20020198734A1 (en) 2002-12-26
US6922685B2 (en) 2005-07-26
US20030004744A1 (en) 2003-01-02
US20160241565A1 (en) 2016-08-18
US8843386B2 (en) 2014-09-23
US20020165745A1 (en) 2002-11-07
US20020188538A1 (en) 2002-12-12
US20020174191A1 (en) 2002-11-21
US7822781B2 (en) 2010-10-26
US20020178026A1 (en) 2002-11-28
US6868441B2 (en) 2005-03-15
US8626877B2 (en) 2014-01-07
US20020169644A1 (en) 2002-11-14
US20020147611A1 (en) 2002-10-10
US7856486B2 (en) 2010-12-21

Similar Documents

Publication Publication Date Title
US8843386B2 (en) Method and system for realizing an avatar in a management operations center implemented in a global ecosystem of interrelated services
US7401131B2 (en) Method and system for implementing improved containers in a global ecosystem of interrelated services
US5826239A (en) Distributed workflow resource management system and method
JP5277251B2 (en) Model-based composite application platform
US7702718B2 (en) Providing enterprise information
US8543653B2 (en) Systems and methods for business network management discovery and consolidation
US20140156724A1 (en) Propagation and adoption of extensions across applications in networked solutions
US20030050972A1 (en) System and method for transaction processing with transaction property feature
US7664818B2 (en) Message-oriented middleware provider having multiple server instances integrated into a clustered application server infrastructure
US20080189402A1 (en) Method and Respective System for Performing Systems Management on IT-Resources Using Web Services
Tai et al. Transaction policies for service-oriented computing
US20080163083A1 (en) Tailored object
US8626716B1 (en) Service broker enhancements
Haller et al. Consistent process execution in peer-to-peer information systems
Binder et al. A multiagent system for the reliable execution of automatically composed ad-hoc processes
Yu Peer-to-Peer Execution of BPEL Processes.
Blanchet et al. Conversation errors in web service coordination: Run-time detection and repair
Wheater et al. Updated Evaluation Plan
Nixon et al. Dynamic Reconfiguration Of FPGA Nodes In A Distributed Computing System: A Preliminary Investigation
Nixon et al. Contact details
Coulter et al. Peer to Peer Information System Management

Legal Events

Date Code Title Description
AS Assignment

Owner name: WORLDCOM, INC., MISSISSIPPI

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GREENE, WILLIAM S.;PIERRET, MATTHEW C.;COFFEY, CHRISTINE;REEL/FRAME:012763/0042;SIGNING DATES FROM 20020327 TO 20020328

AS Assignment

Owner name: MCI, INC., VIRGINIA

Free format text: CHANGE OF NAME;ASSIGNOR:WORLDCOM, INC.;REEL/FRAME:015154/0238

Effective date: 20040419

AS Assignment

Owner name: VERIZON BUSINESS GLOBAL LLC, VIRGINIA

Free format text: CHANGE OF NAME;ASSIGNOR:MCI, LLC;REEL/FRAME:019137/0486

Effective date: 20061120

Owner name: MCI, LLC, NEW JERSEY

Free format text: MERGER;ASSIGNOR:MCI, INC.;REEL/FRAME:019137/0472

Effective date: 20060109

AS Assignment

Owner name: VERIZON PATENT AND LICENSING INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VERIZON BUSINESS GLOBAL LLC;REEL/FRAME:032734/0502

Effective date: 20140409

AS Assignment

Owner name: EKMK LIMITED LIABILITY COMPANY, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VERIZON PATENT AND LICENSING INC.;REEL/FRAME:035169/0180

Effective date: 20150205

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: VERIZON PATENT AND LICENSING INC., NEW JERSEY

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE PREVIOUSLY RECORDED AT REEL: 032734 FRAME: 0502. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:VERIZON BUSINESS GLOBAL LLC;REEL/FRAME:044626/0088

Effective date: 20140409