WO1997042572A1 - Enterprise transition system for a distributed infrastructure - Google Patents

Enterprise transition system for a distributed infrastructure Download PDF

Info

Publication number
WO1997042572A1
WO1997042572A1 PCT/US1997/007348 US9707348W WO9742572A1 WO 1997042572 A1 WO1997042572 A1 WO 1997042572A1 US 9707348 W US9707348 W US 9707348W WO 9742572 A1 WO9742572 A1 WO 9742572A1
Authority
WO
WIPO (PCT)
Prior art keywords
language
source
application
target
data
Prior art date
Application number
PCT/US1997/007348
Other languages
French (fr)
Inventor
Timothy Eager
Madhav Anand
Edouard Aslanian
Original Assignee
I-Cube
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by I-Cube filed Critical I-Cube
Priority to AU28222/97A priority Critical patent/AU2822297A/en
Publication of WO1997042572A1 publication Critical patent/WO1997042572A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/42Syntactic analysis
    • G06F8/427Parsing

Definitions

  • Corporations characteristically use applications executing on computer systems to automate their business functions.
  • the applications typically contain parts that deal with the user interface, parts that deal with business processes, parts that deal with programming logic, and parts that deal with data.
  • the applications are typically built to operate on a single computer platform.
  • a computer platform includes the programs, or software, to perform the various tasks required of a computer, as well as the machine, or hardware, that hosts these programs.
  • IMS/VS Information Management System/Virtual Storage
  • IBM International Business Machines Corporation
  • the presentation part of the application is usually located on the client platform and the data part of the application is found on the server platform, with the business process and functionality parts of the application merged into either of the other two layers.
  • This model is more economical than the single-tier model, with less or no hardware lock-in.
  • the division into two tiers is also more flexible to user interface changes.
  • the proprietary nature of the platform is still present at the level of the software.
  • a preferred embodiment of the invention includes a system to transition an entire business enterprise to a distributed infrastructure.
  • the distributed infrastructure is preferably a multi-tiered client/server target architecture that adheres to open system standards.
  • the multi-tiered architecture preferably includes at least four layers including a separate process control layer and functionality layer.
  • the process control layer includes a state router to control work flow in accordance with the business procedures of the enterprise.
  • the functionality layer includes modules for performing the work.
  • the architecture also preferably includes a presentation layer for interfacing with a user, and a data retrieval layer for accessing data stored in a separate data storage layer.
  • a transition of an entire business ente ⁇ rise to a distributed infrastructure based on the new architecture is performed using a process for organizing and managing the transition. Notably, this requires that each legacy (source) application be identified and prioritized. For each source application, there are a range of available transition choices, including the option of translating the source application to the new target architecture without changing any of the existing functionality and the option of re-engineering the source application by changing the existing functionality.
  • the source application may also be replaceable by a commercial product or a custom application written in-house. The source applications are then transitioned in order of priority to the new architecture.
  • a preferred system in accordance with the present invention includes the automated capability to translate existing source applications into new target applications on a multi-tiered client/ server architecture.
  • the translation of source applications to target applications includes the conversion of user interfaces, procedural languages, and data definitions. These conversions use a two-phase process where source program components written in the source languages are first translated to components in a common intermediate language. The intermediate language components are then translated to target program components in the target languages. By using a common intermediate language, only one translation module is required for each source and target language.
  • a preferred system in accordance with the present invention further includes a facility to create a new application based on the multi-tiered client/server architecture and to modify an existing application that already uses this multi-tiered client/server architecture.
  • FIG. 1 is a high level block diagram of a system embodying the invention.
  • FIG. 2 is a functional block diagram of the interrelationships of FIG. 1.
  • FIG. 3 is a schematic block diagram of a process for managing the transition of an entire ente ⁇ rise to a distributed infrastructure.
  • FIG. 4 is a schematic diagram of the presentation layer 110 of FIG. 1.
  • FIG. 5 is a schematic diagram of a sample mapping between application user interface representation structures 116 and display platform user interface representation structures 118.
  • FIG. 6 is a block diagram of the operational modules of the user interface engine 117 of FIG. 4.
  • FIG. 7 is a schematic diagram illustrating the business process layer 120, functionality layer 130, and data access layer 140 of FIG. 1.
  • FIG. 8 is a block diagram of the business process layer 120 of FIG. 1.
  • FIG. 9 is a flow diagram of the communication mechanism between the user interface engine 117 and the state router 122.
  • FIG. 10 is a flow diagram of the operations of a particular preferred state router 122 of FIG. 8.
  • FIG. 11 is a block diagram of the functionality layer 130 of FIG. 1.
  • FIG. 12 is a block diagram of the data access layer 140 of FIG. 1.
  • FIG. 13 is a block diagram of the data storage layer 150 of FIG. 1.
  • FIG. 14 is a schematic diagram of a hardware platform for the data storage layer 150 of FIG. 19.
  • FIG. 15 is a block diagram of the control layer 160 of FIG. 1.
  • FIG. 16 is a block diagram of the user interface conversion utility 210 of FIG. 1.
  • FIG. 17 is a flow diagram of the procedural language conversion utility 220 of FIG. 1.
  • FIG. 18 is an exemplary source code fragment.
  • FIG. 19 is a block diagram of the first phase transformer program 224 of FIG. 17.
  • FIG. 20 illustrates in FIGs. 20A-20B a parse tree for the source code fragment of FIG. 18.
  • FIG. 21 is an intermediate language file for the source code fragment of
  • FIG. 22 is a block diagram of the second phase transformer program 22 of FIG. 17.
  • FIGs. 23A-23B are C and C+ + target code fragments there being source code fragment of FIG. 18.
  • FIG. 24 is a block diagram of the data definition language conversion utility 230 of FIG. 1.
  • FIG. 25 is a block diagram illustrating a schema conversion.
  • FIG. 26 is a block diagram of a converter 235a, 235b of FIG. 25.
  • FIG. 27 is a block diagram of the data converter 236 of FIG. 24.
  • FIG. 28 is a block diagram of the graphical user interface editor 310 of FIG. 1.
  • FIG. 29 is a block diagram of the graphical business process editor 320 of FIG. 1.
  • FIG. 30 is a block diagram of the graphical business object edito ⁇ r 330 of
  • FIG. 31 is a block diagram of the graphical data record editor 340 of FIG. 1.
  • FIG. 32 is a block diagram of the logic development environment 350 of FIG. 1.
  • FIG. 33 is a schematic block diagram of the facilitation tools 360 of FIG. 1.
  • FIG. 1 is a high level block diagram of a system embodying the invention. As shown, the system 1 includes a multi-tiered architecture 10, a re-architecting system 20 for converting source applications of an ente ⁇ rise to target applications on the multi-tiered architecture 10, and a re-engineering subsystem 30 for custom application development or re-engineering.
  • a preferred multi-tiered architecture 10 of the present invention comprises at least four separate layers.
  • the architecture 10 includes at least one presentation layer 110, one separate business process layer 120, one separate functionality layer 130, one separate data access layer 140, one separate data storage layer 150, and one separate control layer 160, all inter-connected through communication links 170.
  • the data storage layer 150 preferably includes a user interface repository 152, a business process repository 154, a business object repository 156, and a data record repository 158 for storing data.
  • a preferred re-architecting system 20 includes a user interface conversion utility 210, a procedural language conversion utility 220, and a data definition language conversion utility 230.
  • the procedural language conversion utility 220 is in communication with the functionality layer 130 and the data access layer 140 of the multi-tier architecture 10.
  • the user interface conversion utility 210 is in communication with the user interface repository 152 and the data definition language conversion utility 230 is in communication with the data record repository 158.
  • a preferred re-engineering system includes a graphical user interface editor 310, a graphical business process editor 320, a graphical business object editor 330, a graphical data editor 340, a logic development environment 350, and facilitation tools 360.
  • the logic development environment 350 is in communication with the functionality layer 130 of the multi-tier architecture 10.
  • the graphical user interface editor 310, the graphical business process editor 320, the graphical business object editor 330, and the graphical data record editor 340 are in communication with the user interface repository 152, the business process repository 154, the business object repository 156, and the data record repository 158, respectively.
  • the re-engineering system 30 is an integral part of the overall system of the present invention, it is not part of the actual transition of an ente ⁇ rise to a distributed infrastructure. Instead, the re-engineering system 30 enables the ente ⁇ rise to maintain and enhance its distributed infrastructure once the transition itself is complete.
  • a host for all the layers can be a single platform. At the other end of the spectrum, each layer can be hosted on a different platform. In the spirit of distributed systems, a preferred embodiment of the present invention hosts each layer on a separate platform, both in terms of hardware and software.
  • the architecture 10 supports both custom-developed applications as well as application converted from a legacy system.
  • the IMS/VS legacy environment is used herein to illustrate, but not limit, architectural concepts that pertain to a converted legacy application.
  • FIG. 2 is a functional block diagram of the interrelationships of FIG. 1.
  • the user interface translator 210 and the graphic user interface editor 310 affect the presentation layer 110 of the multi-tiered architecture 10.
  • FIG. 3 is a schematic block diagram of a preferred process for managing the transition of an entire ente ⁇ rise to a distributed infrastructure.
  • the transition management process 40 includes a series of high level serial stages, including an implementation strategy stage 42, an implementation planning stage 44, a system implementation stage 46, and an operation stage 48. As the transition management process 40 proceeds from the implementation strategy stage 42 through to the operation stage 48, the amount of operations support required by the legacy system decreases and the amount of operations support for the open system increases, as illustrated.
  • the implementation strategy stage 42 is a sequence of manual steps embodied in a Business Case and Implementation Strategy (BCIS) process 422.
  • the BCIS process 422 determines the business and technology drivers of the ente ⁇ rise, builds a business case analysis of the economic feasibility of the transition, and creates an implementation strategy that provides the basic outline of the organization of the transition. This can involve studies of the existing and envisioned organization, infrastructure, and technology, as well as an evaluation of the impact of the transition in these areas.
  • a study of the organization analyzes methods for developing the skills necessary for the transition and to manage potential resistance to change.
  • a study of the infrastructure analyzes the hardware, software, and network required to support the transition.
  • a technology study analyzes the tools, architectures, and other technologies necessary for the transition.
  • the implementation strategy stage 42 is described as a manual process, an expert system can be employed to perform some or all of the processing.
  • the focus is first to define the current state of the ente ⁇ rise, which provides the start point.
  • This start point is defined through an assessment of the performance of the existing information technology in supporting current business goals, an assessment of the readiness of the organization to build and support a new environment, and an assessment of the limitations inherent to the existing infrastructure.
  • the next focus is to identify the mission of the ente ⁇ rise.
  • the mission will give a good idea of the on-going direction of the ente ⁇ rise, with which all undertakings must be aligned.
  • the conceptual vision is not continuous, but must be attained within a predetermined time frame.
  • This conceptual vision provides the destination point.
  • the co ⁇ orate vision must now be broken down into specific goals or objectives, that are numbered for reference.
  • Outputs are then associated with each objective, as measurable outcomes that will clearly indicate the achievement of the associated objective.
  • outputs are numbered consistently with their corresponding objectives.
  • Each output is given a set of CSFs associated with it, with appropriate numbering for reference.
  • a strategy is put into place for achieving all of the CSFs for each of the outputs.
  • Each strategy is numbered consistently with the output at which it is meant to arrive.
  • a set of specific short term action items is associated with each strategy, as a means to move from the current situation towards the first CSF for each output.
  • action items are numbered consistently with the CSFs they are meant to lead towards.
  • the implementation strategy stage 42 provides a start point for the implementation planning stage 44.
  • the implementation planning stage 44 includes an Applications and Process Portfolio Analysis (APP A) process 442, followed by a series of Applications Staging and Planning (ASAP) 444 sessions.
  • APP A Applications and Process Portfolio Analysis
  • ASAP Applications Staging and Planning
  • the intent of the APPA process 442 is to gather and document an inventory of all the current and envisioned applications and business processes of an ente ⁇ rise.
  • the APPA process 442 separates the strategic from the tactical, and for each one, determines the transition that needs to take place to move from the existing to the envisioned situation.
  • the range of transition possibilities include: do nothing, re-architect, re- engineer, re-architect and then re-engineer, replace by an off-the-shelf commercial solution, replace by a custom solution built in-house, and integrate.
  • the do nothing option retains the existing application or process as is.
  • the re-architect option translates the existing application to the new architecture without changing any of the existing functionality.
  • the re-engineer option changes the existing functionality while remaining on the same architecture.
  • the option of combining re-architecting and re-engineering first translates the existing application into the new architecture, and then modifies the application functionality in the context of the new architecture.
  • the option of replacing by an off-the-shelf commercial solution replaces the existing application with a corresponding application package which is used, with or without customization, to perform the function of the replaced application.
  • This solution is not an alternative for strategic applications and processes due to the inherent strategic nature of such solutions and to the loss of competitive advantage of the ente ⁇ rise should these solution be built using tools and methods commercially available and thus easily reproducible.
  • the option of replacing by a custom solution built in-house replaces the existing application with a new application built from scratch, using the new architecture.
  • the integration option combines the various applications (whether already present, re-architected, re-engineered, purchased, or custom developed) into the new architecture to obtain a coherent infrastructure based on the new architecture.
  • This transition planning corresponds to the ASAP process 444, which focuses on a single application or process.
  • the ASAP process 444 focuses on the details of the existing and envisioned application or process, evaluates the scope of the transition effort, and prepares a detailed implementation plan to conduct the transition, including tasks, schedule, and resources.
  • An ASAP process 444 is thus carried out for each application and process identified during the APPA process 442, in order of decreasing priority.
  • the implementation planning stage 44 can be completed as described above, the actual implementation stage 46 can be initiated. Depending on the transition alternative selected for a particular application or process, a different implementation process may be applied. At the implementation stage 46, multiple applications and processes can go through the transition in parallel.
  • a Strategic Application Advancement (SAA) process 461 is an automated implementation process that focuses on re-architecting.
  • Re-architecting preserves an application's core functionality intact, transformed into a multi-tiered client/server architecture.
  • Re-architecting is often followed by re-engineering to add or change existing functionality to accommodate new business processes.
  • Re-architecting involves identifying the business goals, objectives, and processes encompassed by the system, determining the existing source and desired target architectures, defining information systems standards, determining infrastructure requirements, performing the actual conversion, providing any re-engineering required, including design documentation for re-engineering requirements and technical documentation for re- architected application maintenance, and empowerment of staff for application maintenance and enhancements.
  • a Strategic Applications System Development (SASD) process 463 is a manual implementation process that focuses on re-engineering or custom development.
  • the SASD process 463 encompasses the design and development of re-engineered or custom-built multi-tiered client/server applications conforming to open system industry standards.
  • Re-engineering refers to modifications to an existing system, usually the product of a prior re-architecting effort. Re-engineering must take into account the maintainability and performance issues that arise when attempting substantial changes to an application designed for a legacy system and converted to a multi-tiered client/ server architecture.
  • Custom development refers to the creation of a multi-tiered client/server application from user requirements. Consequently, custom development follows familiar application life-cycle steps.
  • a Tactical Applications Planning and Implementation (TAPI) process 467 is a manual implementation process that focuses on the usage of commercial off-the-shelf packages. This involves selection and customization of commercial packages to achieve reusable applications in very short time frames.
  • the TAPI process 467 is targeted to tactical as opposed to strategic applications, because such applications are not critical to the competitive posture of the business and therefore can make use of available packaged technology without endangering the competitiveness of an ente ⁇ rise.
  • An Open Systems Integration (OSI) process 467 is a manual implementation process that focuses on integrating applications that are purchased, newly custom developed, re-architected, or re-engineered to share data and screens. This process includes the definition of business goals and objectives, the definition of applicable business processes, the study of application interactions and data relationships, and the planning of hardware and software infrastructures. The OSI process 467 also includes the implementation of the integration, including detailed implementation plan and schedule and detailed requirements and design documentation, user acceptance testing, comprehensive technical documentation, and empowerment of support staff for the maintenance phase.
  • HTML Hyper-Text Manipulation Language
  • Java Java from Sun Microsystems to provide a user- friendly, platform independent, common user interface to co ⁇ orate application.
  • Implementation also includes a Skills Enhancement and Empowerment (SEE) process 462 and an Operations Process Advancement (OPA) process 468.
  • SEE process 462 focuses on organizational issues during implementation, such as changing management and personnel training.
  • OPA process 468 focuses on operational support of the applications developed by the other implementation processes, including standardization of tools and processes, infrastructure setup, and system operation.
  • the operations stage 48 begins.
  • the operations stage 48 includes a Customer Service and Support (CSS) process 480, which can include initial or continued application maintenance and user support, full-size production and operations, and possibly outsourcing of all information system needs.
  • SCS Customer Service and Support
  • the facilitation tools of the re- engineering system are available for electronic planning, tracking, and documentation of all the stages of the transition management process 40.
  • FIG. 4 is a schematic diagram of the presentation layer 110 of FIG. 1.
  • the presentation layer 110 can be implemented using a conventional personal computer. It can also take the form of an X-terminal, a workstation console, or a Macintosh style interface display.
  • the presentation layer 110 includes a processor 111 having the current screen representation, constructed according to the principles of the present invention.
  • the processor is preferably a user workstation which includes a display unit through which commands or user selections can be entered via a keyboard or mouse.
  • the processor 111 also includes internal or external storage, such as a disk device, from which a user interface engine is loaded into the memory of the processor 111 as required.
  • the presentation layer 110 can further include a printer 113, connected to the processor 111 through a communication link, such as a parallel or serial port.
  • the printer 113 can be used to provide a permanent record of application log files, reports, source code, or screen listings according to the present invention.
  • the presentation layer 1 10 includes a user interface display platform 115, an application user interface representation mechanism 116, and a user interface engine 117.
  • the user interface display platform 115 is a conventional Graphical User Interface (GUI) tool, commercially available. Consequently, the user interface display platform 115 has its own internal user interface representation mechanism 118 to display the various components of a user interface, usually in a graphical way.
  • GUI Graphical User Interface
  • the underlying internal user interface of the user interface display platforms 115 is preferably derived from a frame-based system.
  • a frame system is a network of frames and relations, corresponding to the nodes and links of a mathematical graph. Frame systems are organized in a hierarchy in which the high- level frames represent more general concepts and the lower frames represent more specific concepts. At the lowest levels, the frames represent instances of those concepts.
  • the concept at each frame is defined by a collection of attributes or properties which can have values and, in this respect, the frames and attributes in a frame system are comparable to the records and fields in a database system.
  • Each attribute can have a descriptor associated with it to define the constraints on the values the attribute accepts.
  • Each attribute can also have procedures or programs called daemons attached to it which are executed when the value of the attribute is modified. In such a system, a frame can inherit the attributes or properties of higher level frames.
  • a preferred embodiment of the present invention uses a frame-type representation in an object-oriented organization in which the frames represent objects. More specifically, the frames representing general concepts are referred to as classes and those representing specific occurrences of a concept are referred to as instances. In this context, attributes are termed members, and member inheritance and procedural attachment take place as in a frame system.
  • objects communicate with one another by sending and receiving messages.
  • an object When an object receives a message, it consults its pre-defined answers for messages to decide on what action to take. These answers can be stored directly with the object or inherited from a higher level object somewhere in the network hierarchy. Usually, the action involves triggering some rules, executing procedural code, or sending new messages to other objects in the system.
  • the application user interface representation structures 116 store descriptive information representative of the different objects that compose a user interface. Each object is described by a structure comprising a plurality of fields containing information representing an attribute of that object or a relationship between the object and another object.
  • the user interface engine 117 maps each of the different objects that compose the user interface of a given application into the corresponding representations 118 in the user interface display platform 115 of choice for that application.
  • the user interface engine 117 requests application user interface representation structures 116 from the business process layer 120. Once the business process layer 120 satisfies the request, the user interface engine 117 converts the application user interface representation structures 116 just received into user interface representation structures 118 that are expected by the user interface display platform 115 for display to the end user on a display station 111. On the other hand, when the end user performs an action through the display station 111 , such as selecting an item or modifying information, the user interface engine 117 translates that user request from user interface display platform representation structures 118 into the corresponding application user interface representation structures 116, which are then handed to the business process layer 120 for execution of the end user request.
  • FIG. 5 is a schematic diagram of a sample mapping between application user interface representation structures 116 and display platform user interface representation structures 118.
  • the user interface display platform 115 is exemplified as Microsoft Windows 3.x and the display platform user interface representation structures 117 are thus the internal Windows 3.x management structures.
  • other user interface display platforms 115 using similar internal structures to manage windows are supported by the exact same user interface engine 117.
  • the internet's world-wide web based on the HTML or Java user interface languages, is another example of user interface display platform 115.
  • the user interface engine 117 is written using Microsoft Visual C + + and based on the industry-standard Microsoft Foundations Classes (MFC) class library, which allows cross-platform development for Windows 3.x, Windows 95, Windows NT, MacOS, and UNIX-based user interface display platforms 115, including internet web servers.
  • MFC Microsoft Foundations Classes
  • FIG. 6 is a block diagram of the operational modules of the user interface engine 117 of FIG. 4.
  • the user interface engine 117 includes an initialization module 117-1 , a user input module 117-2, and a state router communications module 117-3. During initialization, the user interface engine 117 first initializes its initial state, setting up any structures necessary for operation. Depending on the implementation, the user interface engine 117 can then initialize communications with the business process layer 120, receiving a client identification number. Depending on the implementation, the user interface engine 117 can also display an initial application menu or screen, initial objects that are provided by the business process layer 120.
  • the user interface engine 117 After completing the initialization, the user interface engine 117 continues to the user input module 117-2.
  • the user interface engine 117 waits for user input and processes it accordingly.
  • the user input module 117-2 handles interactions with GUI objects and performs application-dependent actions in response to user inputs.
  • the user interface engine 117 creates outgoing application user interface representation structures 116 from the screen data and packs these structures for delivery to the business process layer 120.
  • the outgoing application user interface representation structures 116 contain values of screen fields which have changed since the previous call to the business process layer 120.
  • the packed application user interface representation structures 116 are then sent to the business process layer 120, which returns packed application user interface representation structure 116 describing the result of the transaction.
  • the packed application user interface representation structures 116 returned from the business process layer 120 are then unpacked and processed.
  • Error messages can then be displayed, the screen can be updated with the results of the transaction, or a new screen can be shown.
  • the user interface engine 117 processing continues (resumes the wait for user input) at the user input module 117-2 until the user exits the application. Most of the user interface engine 117 processing occurs in the handling of screens: building a screen from a description, processing application-updated values from the business process layer 120, and sending user-updated values to the business process layer 120. If a new screen is sent from the business process layer 120, the current screen is discarded and replaced by the new screen.
  • Communication with the business process layer 120, and more specifically its main state router component (described below), is always initiated by the user interface engine 117 because a remote procedure call (RPC) mechanism which interfaces the user interface engine 117 with the business process layer 120 is preferably unidirectional and synchronous.
  • RPC remote procedure call
  • the user interface engine 117 includes an ability to periodically poll the state router for messages during the user interface engine's 117 idle time, namely when there is no user input to be processed. This functionality is known as idle message polling.
  • the user interface engine 117 queries the state router for any initial messages.
  • a first screen needs to be displayed to the user.
  • This screen is usually a sign-on, or logon, screen which contains fields for the user identifier and user password, with possibly peripheral buttons to change the user password and access help screens.
  • other graphics such as an application logo or wallpaper, might be decorating the screen.
  • window mapping structure which is preferably a two-way associative array, it is possible for the user interface engine 117 to allow window control handlers of the user interface display platform 111 to manage general window operation and make callbacks to the user interface engine handlers when an action is required, for example, when a button is pressed.
  • the user interface engine 117 can process any type of action from any type of screen object, e.g. a button being pressed, a control gaining the input focus, or the Tab key being pressed.
  • the user interface engine 117 performs some internal function based on the action, or sends information to be processed back to the business process layer 120.
  • all actions are referred back to the business process layer 120 for processing, along with any updated field values.
  • FIG. 7 is a schematic diagram illustrating the business process layer 120, functionality layer 130, and data access layer 140 of FIG. 1. In a preferred embodiment of the invention, these layers can be hosted on similar platforms.
  • these platforms include a host processor 132, in which the various engines are resident, internal or external storage 134, on which the logic or data access server runtime environment resides, and a terminal console 136 which serves as a human interface for host administration pu ⁇ oses.
  • a communications controller 138 such as a LAN controller, modem or similar device serves as an interface to a communication link.
  • the host computer system 132 can be considered conventional in design and may, for example, take the form of a E55 workstation, manufactured by Hewlett Packard Co ⁇ oration.
  • the business process layer 120, functionality layer 130, and data access layer 140 further include a printer 135 which can be used to provide a permanent record of application log files, reports, source code, or process objects and flows according to the present invention.
  • FIG. 8 is a block diagram of the business process layer 120 of FIG. 1.
  • the main component of the business process layer 120 is a state router 122.
  • the state router 122 receives requests from the user interface engine 117 (FIG. 4) and, based on the request, determines which actions to take.
  • the state router 122 then calls upon the functionality layer 130 to perform the selected action, passing any required information.
  • the state router 122 accepts any resulting return information and forwards it to the user interface engine 117.
  • the requests received from the user interface engine 117 include application user interface representation structures 121.
  • the application user interface representation structures 121 include request identifiers, transaction codes, screen information, and input/output buffers.
  • a request identifier is the name of a function that needs to be executed in response to the request. There is one request identifier for any user interface event caused by the user.
  • request functions are similar to the conventional callbacks found in GUI languages such as X-Windows developed at the Massachusetts Institute of Technology, in Cambridge, Massachusetts. Transaction codes are used to determine where to redirect the request.
  • the state router 122 is simply a switch that differentiates between request identifiers and takes appropriate action in the form of a call to a function of the functionality layer 130.
  • FIG. 9 is a flow diagram of the communication mechanism between the user interface engine 117 and the state router 122.
  • the user interface engine 117 includes a user interface routine 117-6 and initiates the communication by calling a pass message function 117-8.
  • the pass message function 117-8 first compresses the application user interface representation structures 116 to be transmitted into a single request string using a packing procedure.
  • the request string compression performed by the packing procedure is necessary because the outgoing application user interface representation structures 116 cannot be transferred efficiently as such across the communication link.
  • the pass message routine 117-8 then calls a remote procedure call (RPC) routine 117-9 for actual transmission of the request string over the network.
  • RPC routine 117-9 takes two parameters: the request string to be passed from the user interface engine 117 to the state router 122 and the return string to be returned to the user interface engine 117 from the state router 122. From the point of view of the state router 122, requests arrive in the form of strings of characters that need to be decomposed into the logical components of the request. Consequently, the first step taken by the state router 122 is to decompress the request string into its logical components using an unpacking procedure.
  • the unpacking procedure converts the request string into an array of request application user interface representation structures 121. This array is then passed to a main state router 122-1 function, which accounts for the core processing of the state router 122. Routing logic 122-2 then directs the objects to servers in the functionality layer 130 or the database layer 140. Once the state router 122 completes its processing, the resulting array of return application user interface representation structures 121 is again packed into a return string, which is passed back to the user interface engine 117 using an RPC mechanism 122-9.
  • the packing and unpacking functions include a library having primitives which pack and unpack bytes (8-bit integers), words (16-bit integers), double words (32-bit integers), and strings (both variable- and fixed-length).
  • a developer need only create packing and unpacking routines for that structure, assembling these functions from the primitive routines.
  • the packing and unpacking library is written in such a way that the same source code compiles using structures (under ANSI C) or using object classes (under ANSI C + +).
  • the ANSI C language interface is very usable, the ANSI C + + language interface makes use of object-oriented features such as virtual functions to make packing and unpacking as transparent as possible.
  • High-level packing and unpacking routines take arrays (or, in ANSI C + + , containers) of application user interface representation structures 121 and create a single character string containing the packed information suitable for RPC transmission. This string contains type information as well as member data, so that any sequence of application user interface representation structures 121 can be sent and properly reconstructed at the receiving end.
  • the state router 122 can be used to access the functionality layer 130 having custom-developed functionality servers as well as functionality servers converted from the IMS/VS model.
  • the IMS/VS model is centered around the message concept, where the term "message” is used to refer to the model's communication structures with the functionality layer 130.
  • the state router 122 performs four main conceptual functions: log-on processing, IMS communication modeling, message conversion, and log-off processing.
  • Log-on processing consists of checking the user authorization and issuing a client identifier.
  • IMS communication modeling is decomposed into transaction routing, conversation management, and message formatting service.
  • Transaction routing uses Input-Output Program Control Block (IO-PCB) and Alternate Program Control Block (ALT-PCB) IMS structures to route calls and messages between programs.
  • Conversation management uses an IMS Scratch Pad Area (SPA) to store the processing context.
  • Message formatting services uses Message Input Descriptor (MID) and Message Output Descriptor (MOD) IMS control blocks to format messages and screens. Message conversion performs message packing and unpacking. Log-off processing performs clean-up functions with commit point processing.
  • MID Message Input Descriptor
  • MOD Message Output Descriptor
  • FIG. 10 is a flow diagram of the operations of a particular preferred state router 122 of FIG. 8. Initially, when a logon request is received from the user interface engine 117 through the request user interface structure 121a and then authorized, the state router's 122 internal state is initialized with the current transaction code and the identifier of the first message. This message identifier is used to retrieve the full message format from a database repository 152. This process will be discussed in further detail below.
  • a message format 122a- 1, 122a-2 provides the identifier of the related screen as well as the identifier of the next message.
  • the screen information associated with this screen identifier is then loaded from the database repository 152.
  • This screen information is passed back to the user interface engine 117 through the return application user interface representation structures 121.
  • the user interface engine 117 displays the screen and awaits user input.
  • the user interface engine 117 translates this user input into a request to the state router 122.
  • the state router 122 Based on the contents of the request, the state router 122 saves its internal state into an old-state structure, and the current state is then updated with any new field values from the user interface engine 117. State information is represented by a field state structure 122b. Then, the state router 122 determines which functionality server to call.
  • the request identifier which describes a function to be executed, is included with the request from the user interface engine 117.
  • the state router 122 verifies the user's authorization to perform this function, and if authentication is successful, proceeds with its processing. If unsuccessful, an error condition is set, and the user is informed of an illegal access attempt. Assuming that authentication is successful, the determination of which functionality server to call is followed by a preparation of the message to be used for communication between the state router 122 and the selected functionality server, using a prepare to send message function 122c to build one or more messages to be put on the top of the outgoing Message Format Service (MFS) message queue 122d.
  • MFS Message Format Service
  • the message is built as follows. Each field in the message, assuming field length n, is allocated n bytes in the message at a predefined offset. Additionally, a field may have two additional bytes allocated to it for passing the field's attribute in the message. A field's value is placed in the message if either of the following conditions holds: if the field's value has changed (which is determined by comparing the value of the field in the current state to the value of that field in the previous state), or if the field's attributes specify that its value should always be placed in the message regardless of whether it has been modified (this attribute is known as "pre-modified").
  • the allocated space is padded with the pad character specified for that field. Finally, if a field's value has not been modified, and the pre-modified attribute is not set for that field, its space in the message is filled with '@' characters. When all fields in the message have been considered, the message is complete. The message is then sent to the functionality server designated to handle the current transaction code.
  • the SPA 122e is provided as a functionality server- independent area of memory used for inter-functionality server communication.
  • the SPA 122e is either newly-initialized, upon the first communication with the functionality server, or returned from the previous call to the functionality server.
  • a pointer is returned to the incoming MFS message queue 122f, where the functionality server placed one or more messages for transmission to the state router 122.
  • the returned information includes an auxiliary buffer, a MOD structure, a SPA, and field value information similar to that of the message passed from the state router 122 to the functionality server.
  • the auxiliary buffer specifies the name of the MOD structure.
  • the MOD structure contains either a message identifier to describe the next message for updates to the current screen or a transaction name to initiate a switch to a new screen.
  • the state router 122 Upon receipt of this information, the state router 122 first determines whether the MOD structure contains a transaction or a message.
  • the new screen information is loaded from the database repository 152, and its information is included in the return application user interface representation structures 121b destined for the user interface engine 117.
  • the state router 122 then recalls the functionality server that corresponds to the new transaction in what is called an "immediate switch".
  • the state router 122 retrieves the new message format from the database repository 152 and passes it to a prepare to receive message function 122g, along with the incoming MFS message queue 122f. This function updates the structures and processes the return message in a manner similar to the processing of the request message. Notably, new values and attributes are entered into the state router's 122 internal state.
  • the attributes returned with each field specify whether the field is to maintain its old value, revert to its original attributes, or clear its value.
  • the new values and attributes are then included in the return application user interface representation structures 121 array passed back to the RPC mechanism for return to the user interface engine 117.
  • state router 122 operations focused on the case of communication with functionality servers converted from the IMS/VS environment.
  • the state router 122 still processes requests received from the user interface engine 117 in response to user interface event caused by the user in manner similar to that described earlier.
  • much of the ensuing IMS/VS message processing can be bypassed in favor of a more generic mechanism embodied in the usage of a business process engine 124.
  • the state router 122 still redirects processing to appropriate functionality servers based on the transaction codes received from the user interface engine 117. However, when the functionality server returns, it passes back an event to the business process engine 124 component of the state router 122.
  • the business process engine 124 is an event handler implemented as a conventional non-deterministic finite automaton (NFA).
  • an NFA is a mathematical model that consists of a set of states, a set of input symbols, a transition function that maps state-symbol pairs to sets of states, an initial state, and a set of final states.
  • a special case of NFA is the deterministic finite automaton (DFA), which can have no unlabelled edges and at most one edge with the same label leaving a given state. Where time- space tradeoffs are an issue, an NFA is slower than a DFA but consumes much less space. In any event, an NFA and a DFA are both appropriate representations for real-life business processes. Furthermore, an NFA can automatically be converted into a DFA using fundamental principles of state machines and finite automaton theory.
  • business processes can be composed of a series of unrelated processes or can even be decomposed into sub-processes, more than one NFA, possibly organized in a hierarchical fashion, can be used to represent the various business processes modeled by an application.
  • the business process engine 124 preferably implements an NFA as follows. Upon receiving an event from the state router 122, the business process engine 124 first checks the validity of the event. If the event is valid, the business process engine 124 then examines all transitions out of the current state, which could be the initial state if this is the first call to the business process engine 124. If the business process engine 124 does not find a transition that corresponds to the event received from the state router 122, it simply remains in its current state, releasing control back to the state router 122. On the other hand, should the business process engine 124 find a transition that includes the event received, the current state is saved and the next state is derived by starting at the current state and following the transition corresponding to the event received.
  • the next state thus reached now becomes the current state. Because states include initialization routines, the business process engine 124 executes any initialization routine associated with the next state immediately upon arrival at this next state. This initialization function can require another transition followed by another change of state, and therefore the business process engine 124 ends its processing by calling itself recursively, based on the event returned by the initialization function.
  • a complication can occur when a transition leads to a state that is not part of the business process modeled by the current NFA.
  • the business process engine 124 needs to switch to the NFA containing the next state.
  • the business process engine 124 also maintains a current business process set. This enables the business process engine 124 to keep track of its position in the business process or NFA hierarchy.
  • FIG. 11 is a block diagram of the functionality layer 130 of FIG. 1.
  • the functionality layer 130 manages the business objects manipulated by the business process layer 120.
  • These business objects constitute the fundamental components of an application.
  • a business object is associated with one or more physical paper forms. These forms contain the fields that hold the information relevant to the business object. Forms differ not only in their physical appearance, but also in the rules that govern their use. For example, a highly confidential form is treated differently from a non-confidential form. Other business rules may also govern the handling of forms. For example, some invoices might require more than one signature if their amount is bigger than a certain value. It is the form and the rules that govern its handling that define a business object in a traditional manual system.
  • the business objects represent the physical forms, the information in those forms, and the rules that govern these forms.
  • the business process engine 124 of the business process layer 120 manages the flow of business objects, inte ⁇ rets their rules, and acts on these rules.
  • the functionality layer 130 must also be able to handle IMS/VS COBOL functionality code.
  • IMS functionality codes are structured into transactions composed of a main program called a driver and transaction programs for the various function keys the driver handles. Accordingly, a functionality server 135 performs a number of functions.
  • PSB Program Specification Block
  • a PSB defines, for a given transaction, the database which may be accessed, the database segments that are available, and the type of access (read, update, etc.) which may occur.
  • a PSB is also a collection of Program Communication Blocks (PCB).
  • PCB Program Communication Blocks
  • Server initialization comprises unpacking the message received from the state router 122, to obtain the SPA and its call parameters, and assigning local function pointers.
  • An additional level of indirection for each transaction program main routine is necessary for ANSI C to mimic the COBOL "goto" capability to span across routines and exit at any point in the program.
  • Transaction call resolution comprises determining the driver to call based on the transaction identifier specified in the RPC received from state router 122, associating the appropriate PSB structure obtained from the include file with the selected driver, and calling the driver with its arguments.
  • Transaction entry point processing comprises performing calls to transaction entry points in the converted COBOL functionality code.
  • Transaction entry points include routines to perform calls to various local (sub) routines or external COBOL library routines, as well as routines to establish communication with the data access layer 140 (ENTRY statement) and perform calls to the database server/IO devices (CBLTDLI).
  • a typical database access consists of an initial GET call to populate the I/O work area, followed by modifications to the I/O work area for subsequent insert (ISRT) or replace (REPL) calls. After each database access, the return status of the call is checked to take action based on the result of the database operation.
  • COBOL variables are implemented as COBOL structures.
  • a COBOL structure contains a data field, which consists of a pointer to an area in memory used to store the value of the variable. Another field stores the length of this data memory area.
  • the COBOL structures also contain a mask, which is a string describing the COBOL format specification for the variable. For example, a mask of "PIC X(3)" refers to a string of 3 characters.
  • COBOL variables exist in a hierarchy of other COBOL variables. Consequently, the COBOL structures also contain the number of sub- variables or sub COBOL structures in the current variable or COBOL structure hierarchy.
  • a COBOL structure variable can thus be viewed as pointing to a buffer containing its data, all sub COBOL structure variables pointing to the proper offsets in that buffer.
  • Server wrap-up includes preparing return data, notably packing the SPAM for return to the state router 122.
  • FIG. 12 is a block diagram of the data access layer 140 of FIG. 1.
  • the data access layer 140 comprises a number of data servers.
  • the data servers are used to access and retrieve data from the data storage layer 150.
  • one data server exists for each of the four application object repositories. Consequently, there is user interface data server 141 to manipulate user interface objects 142, a business process data server 143 for business processes 144, a business object data server 145 for business objects 146, and a database server 147 for application data records 148.
  • the data servers constitute the sole interface between the data storage layer 140 and the functionality layer 130, and each data server is only in charge of exchanging with the functionality layer 130 information about the type of application object it services.
  • a server is any program that runs a function invoked by a different program.
  • a server is thus a software concept that provides a way to package together a set of related functions. Consequently, it could be implemented as a conventional third generation language sub-routine or library.
  • libraries can be implemented as servers and vice versa.
  • the server implementation is better suited to inter-platform communication, and is a preferred embodiment for the communication links of the present invention.
  • servers can be left to run continuously in stand-alone mode and accept requests from multiple clients.
  • the set of functions, or services, provided by a server constitutes the server interface.
  • This interface is specified in an Interface Definition Language (IDL) file.
  • IDL Interface Definition Language
  • the data access layer 140 can now be viewed as a set of database access and retrieval functions. There is one function for each one of the data access construct of the source Data Base Management System (DBMS). Each such function must emulate the behavior of the corresponding source DBMS data accessor construct.
  • the target DBMS is typically based on a conventional relational model, and is called a Relational DBMS (RDBMS).
  • RDBMS Relational DBMS
  • the source DBMS can be built around a number of conventional data models. The most common such models are the flat file, hierarchical, network, CODASYL, relational, and object-oriented data models.
  • the flat file model is a generalized file management system that adds report generation and file management additions to third-generation programming languages such as COBOL.
  • An example of such as model is the Report Program Generator (RPG) from International Business Machines,
  • the hierarchical model is a hierarchical tree of nodes made of records and fields, with tree search capabilities.
  • An example of such a model is IMS Data Language 1 (DL/1).
  • the network model is an extension of the hierarchical model, where nodes may have more than one parent.
  • the network model is also referred to as CODASYL, which is the initial embodiment of this model using owner and member records linked by pointers, as originated by Honeywell Information Systems, Inco ⁇ orated.
  • Examples of the network model are Integrated Data Store (IDS) from IBM, and Integrated Database Management System (IDMS) from Cullinet, Inco ⁇ orated. Given the fundamental differences between these models, the data access library must be careful to map the semantics of the source database to the appropriate constructs in the target database.
  • IDS Integrated Data Store
  • IDMS Integrated Database Management System
  • this mapping results in a simulation of the source DBMS in a relational model, which is not always ideal for readability and maintainability.
  • a preferred embodiment of this invention extends this mapping to a true conversion of the source data model to the relational data model.
  • the initial relational model thus obtained is further normalized to a specified degree controlled by parameter using a bacchus-normal form utility, leading to a true relational model.
  • such libraries exist for all the common source data models mentioned. Because an overwhelming majority of existing database systems fall into one of the source data models above, it is likely that most existing applications can be handled by one of these libraries with minor or no changes.
  • the source DBMS is IMS DL/1.
  • IMS functionality code is structured into transactions composed of a main program called a driver and subprograms for the various function keys the driver handles.
  • an entry function is called once to initialize the database server.
  • This entry function calls a database server function through an intermediary to initialize the PCB structure in the database server.
  • the function CBLTDLIO which in turn calls a database server function to call the appropriate database function (e.g. , GET, INSERT, DELETE, and REPLACE primarily).
  • Communication between the functionality server and the database server is thus reduced to two functions: init and CBLTDLI (which, in IMS, stands for CoBoL To Data Language 1).
  • the main function of a database server is to fulfill requests for data from the functionality server 135.
  • this includes implementing the IMS DL/1 CBLTDLI call. This can be decomposed into three tasks: server initialization, CBLTDLI call resolution, and database access function execution. As discussed earlier, server initialization is performed on the PCBs for the current transaction. Then, the database server resolves CBLTDLI database calls.
  • FIG. 13 is a block diagram of the data storage layer 150 of FIG. 1.
  • the data storage layer 150 is a repository for data accessed by the data access layer 140.
  • the user interface data repository 152 provides user interface objects 153 to the data access layer 140.
  • the business process data repository 154 provides business processes 155 to the data access layer 140.
  • the business object data repository 156 provides business objects 157 to the data access layer 140.
  • the application data records repository 158 provides data records 159 to the data access layer 140.
  • FIG. 14 is a schematic diagram of a hardware platform for the data storage layer 150 of FIG. 19.
  • the data storage layer 150 is hosted on a platform that includes a host processor 151 , with one or more Central Processing Units (CPU), in which the Data Base Management System (DBMS) is resident, internal or external storage 153, usually an array of mirrored disks, on which all database data resides, and a terminal console 155 which serves as a human interface for host administration pu ⁇ oses.
  • DBMS log files are stored in storage unit.
  • a printer 157 is usually present for database diagnostics or large data outputs.
  • a LAN controller, modem or similar device serves as a communication link 159.
  • DBMS and the host computer system 151 can be considered conventional in design and may, for example, take the form of an Oracle relational DBMS, manufactured by Oracle Co ⁇ oration, and a T500 mini-computer, manufactured by Hewlett Packard Co ⁇ oration respectively.
  • a preferred embodiment of the present invention uses the relational data model for the data storage layer.
  • the relational data model can be viewed at three different levels: conceptual, logical, and physical.
  • the conceptual level consists of entities, attributes, and relations. Entities are things that exist on their own, distinguishable from other objects. Entities (records, rows) are described in terms of their attributes (fields, columns). Relations are common fields between entities used to connect entities together.
  • the Entity-Relationship data model (ER) is the predominant conceptual level description tool.
  • the logical level consists of records, fields, and relations.
  • the schema is the logical level description tool.
  • a database schema consists of the description of the tables, their fields, and the fields formats and domains.
  • the relational algebra provides the theoretical basis for the model, with five operators: selection, projection (deleting columns from table), product, union (adding the rows of two tables), difference and a composite: join.
  • Query languages based on relational algebra are Structured Query Language
  • SQL Query By Example
  • SQL is usually embedded within a third generation language such as C, called the host language.
  • C third generation language
  • special SQL commands such as the cursor concept are provided to process multi-row query results in a record-at-a-time fashion.
  • a cursor is a name given to a query. When a cursor is opened, the corresponding query is executed. Any subsequent fetch command on the cursor returns a new row to the host language. When the cursor is closed, query results are no longer available to the host language.
  • Other special commands in SQL embedded mode include transaction processing features, dynamic SQL generation, and authorization control.
  • Sequential files use a sorted column to perform sequential search. Index- sequential adds an index to a given column to provide random access. Large indices may themselves be indexed. Sequential files are difficult to maintain because adding or deleting a record requires reorganization of the whole file. Indexed (inverted) files remove the sequential part. Fully inverted refers to indices associated with each column. Indices carry update overhead but enable fast access. Direct access uses a single key and a calculation from that key to locate the physical address of the data in memory. The distribution discussed in the context of the present invention is reduced to process distribution.
  • FIG. 15 is a block diagram of the control layer 160 of FIG. 1.
  • the control layer 160 includes utilities for transaction management 161 , security 162, system administration 163, server management 164, accounting 165, network management 166, and configuration management 167. These utilities can take the form of libraries or can consist of graphical user interfaces.
  • Transaction management 161 provides library utilities to manipulate transactions. Transactions are a way to package related application elements together. Transaction processing refers to the manipulation of groups of elements as opposed to the manipulation of the individual elements. A transaction that successfully completes the processing of all the elements that compose the transaction is finalized by a database commit, which saves the results of the processing of all its elements in a permanent form, usually in the database. Should the processing of one of the transaction elements fail, the transaction elements that have already been committed to the database need to be un-committed, and the whole transaction is rolled back, with appropriate error messages posted. Transaction management 161 is useful in distributed systems to insure data consistency in the absence of user-defined integrity constraints.
  • Security 162 is provided at all layers of an application through a library of functions to manage system as well as data security.
  • security functions are available at logon time and at the menu, screen, field, and button levels.
  • access to entire servers or to a subset of the services provided by a server can be restricted.
  • security functions manage access control lists (ACL), which enable application administrators to set up a hierarchy of user types for controlling access to application resources.
  • ACL access control lists
  • the underlying database management system usually provides a wide range of security features which are implicitly available to the application.
  • System administration 163 provides graphic facilities for administrators to perform basic application administration tasks, such as lookup table maintenance, user access maintenance, and application backup and recovery.
  • Server management 164 provides mechanisms to organize servers in a hierarchical model in which entities called brokers keep track of the servers available to a given client and of their location. This can increase the robustness of applications through server redundancy.
  • Accounting libraries 165 are available to perform logging of application operations at all application tiers for performance monitoring, auditing, or error tracing and recovery. Logging is also available on a per client, server, or broker basis. Logging can come in various flavors, with control over the level of detail provided or the application resource or component being monitored.
  • Network management 166 provides a graphical interface to monitor clients, servers, and brokers. Network traffic and performance can thus be monitored, and network components restarted automatically or manually upon failure.
  • Configuration management 167 provides libraries for a number of diverse pu ⁇ oses. For instance, application version management functions are provided. In addition, currency is handled through locking functions to insure data consistency. Data integrity is controllable at the functionality layer by the business objects rules or constraints. The underlying database management system usually provides data integrity controls implicitly available to applications, but the usage of such controls are not recommended because it would mean encoding business logic in the data layer 150 instead of confining it to the functionality layer 130, and would therefore be contrary to the fundamental principle of the preferred multi-tiered architecture. Communication links 170 are used by the other components to exchange information by the way of computer networks. By the way of background, computer networks consist of interconnected collections of autonomous computers. Networks are usually described in terms of the well known International Standards Organization (ISO) Open Systems Interconnection (OSI) reference model. ISO OSI describes networking in terms of seven layers, from lowest to highest: physical, data link, network, transport, session, presentation, and application.
  • ISO International Standards Organization
  • a preferred embodiment of the present invention can be a standard communication media, such as a telephone network, local area network (LAN), wide area network (WAN) or direct line.
  • IP Internet Protocol
  • TCP Transmission Control Protocol
  • Session and presentation layers do not exist in the internet model.
  • Application protocols include FTP for file transfer, SMTP for electronic mail, and TELNET for remote login.
  • RPC Remote Procedure Call
  • DCE Distributed Computing Architecture
  • a similar RPC server stub unpacks the function arguments, called unmarshaling, and passes them to the server code that implements in a conventional way the function requested by the client. Upon completing the execution of the requested function, the server returns the results of the call to the client in a similar way. Because all transport complexities are addressed by the RPC generated stubs, RPCs acts just like conventional local calls.
  • a preferred embodiment of the present invention can use tools based on DCE, which is a more comprehensive distributed system infrastructure that includes directory services, distributed security, multi-threading, distributed file system, and central time management, in addition to RPCs.
  • DCE distributed system infrastructure
  • RPCs effective over both TCP/IP and DCE networks
  • the Entera toolkit from Open Environment Co ⁇ oration.
  • the re-architecting system 20 includes a user interface conversion utility 210, a procedural language conversion utility 220, and a data definition language conversion utility 230.
  • FIG. 16 is a block diagram of the user interface conversion utility 210 of FIG. 1.
  • the user interface conversion utility 210 converts the user interface of an existing application represented by the source user interface definitions 211 into target user interface definitions 213 using the user interface converter 212.
  • the source user interface definitions 211 can be viewed as IMS/VS Message Format Service (MFS) files.
  • MFS IMS/VS Message Format Service
  • Screen definitions provide structural information about the fields that compose the screen layout.
  • Message definitions provide content information about the fields, such as the data they contain and their attributes (protected, highlighted, etc.).
  • Target user interface definitions 213 can take one of three forms: database files 246, a header file 247, and a GUI file 248.
  • Database files 246 contain the set of statements necessary to populate user interface repository 152 with screen and message information for MFS file 211.
  • the database files 246 can be viewed as ANSI SQL scripts.
  • a deletion script removes from the user interface repository 152 any definitions for the MFS file 211. Once this repository cleanup is accomplished, an insertion script adds to the user interface repository 152 any new definitions for the MFS file 211. Consequently, the user interface conversion utility 210 can be run multiple times for the same MFS file without negative effects.
  • the user interface repository 152 is a standard RDBMS such as Oracle Server 7 from Oracle Co ⁇ oration. Information stored in the user interface repository 152 is converted at application runtime into the user interface representation structures of the presentation layer 116. The user interface engine 117 of the presentation layer 110 then maps application user interface representation structures 116 into display platform user interface representation structures 118, used by the user interface display platform 115 for display to the user. Accordingly, target user interface definitions 213 effectively constitute an intermediary user interface definition language for storage of user interface information in the user interface repository 152 and eventual user interface representation structures 118.
  • Header files 247 are an alternative to database files 246.
  • user interface representations are stored in the user interface repository 152 and retrieved as needed from this repository by the business process layer 120. This is an appropriate mode of storing a large amount of user interface representations on a back-end database host, thus alleviating performance and space constraint problems on the client or business process hosts.
  • user interface representations may not need to be stored on a separate user interface repository 152. Accordingly, a user interface converter 212 can generate a header file 247 instead of database files 246.
  • header file 247 is then passed to the business process layer 120 to provide information necessary during application runtime operations.
  • the header file 247 can be viewed as declarative statements in ANSI C that are compiled as part of the source code for the business process layer 120.
  • GUI files 248 are used by application developers and maintenance personnel to modify application screens and messages as part of the re-engineering system 30.
  • the GUI file 248 are written in Microsoft Visual Basic.
  • the application re-engineering process 30 uses the GUI file to load screen information in Visual Basic, which can be viewed as the graphical user interface editor 310, make any modification in Visual Basic, resulting in a modified GUI file, and then run a Visual Basic to Oracle conversion process as described regarding the graphical user interface editor 310 to load the modified GUI file into the user interface repository database 152, ready for usage by the application.
  • the user interface conversion utility 210 calls the user interface converter 212 to generate the "target" representation just described.
  • the user interface converter 212 is an ANSI C program, which takes a MFS file as an input and generates output files. To perform this function, the user interface converter 212 can be structured using conventional compiler technology, including a scanner 241 , a parser 243, and a code generator 245.
  • the scanner 241 reads characters from the MFS file until a token has been read.
  • the scanner 241 adds the token just obtained to a symbol table in which all the identifiers of the source language are stored, along with their characteristics.
  • the tokens are then passed to the parser 243.
  • the parser 243 can be viewed as a function that parses the statements of the source language.
  • the delimiter that enables the user interface converter 212 to determine when the end of a statement has been reached is defined by the particular syntax of the source.
  • the parser 243 calls another function, which returns the type of the statement that has just been parsed. This type is then passed to the code generator 245.
  • the code generator 245 can be viewed as a large switch that, given a statement type, calls the appropriate function to generate "target" code for this statement.
  • the code generator 245 relies on a library of functions that handle the actual code generation for the entire set of statements of the source language.
  • One such library exists for each source language, with ANSI SQL, ANSI C, and Microsoft Visual Basic as the target languages.
  • FIG. 17 is a flow diagram of the procedural language conversion utility 220.
  • the procedural language conversion utility 220 converts the functionality and data access programs of an existing application into the programming language targeted for the implementation of the functionality layer 130 (FIG. 1). This conversion process consists of two main phases.
  • a first phase converts the source language 221 into an intermediary language 225.
  • a second phase then transforms the intermediary language 225 into the final target language 227.
  • the first transformation is executed by a first phase (Phase A) transformer 224, customized for each source language environment 221.
  • the intermediary language 225 is a meta language designed to facilitate application maintenance.
  • the meta language is independent of source and target languages and supports the use of an independent data dictionary 228.
  • the data dictionary 228 generation is preferably achieved through the use of data population tools 223, which use constructs in the source code and related data files.
  • the meta language is used as the target for the conversion of numerous source languages, and in turn can be transformed into multiple different target languages.
  • the meta language is converted to a target language using a second phase (Phase B) transformer 226. There is a specially customized second phase transformer program 226 for each target language environment 227.
  • the procedural language conversion utility 220 as a whole is applicable to batch as well as on-line applications.
  • FIG. 18 is an exemplary source code fragment 221'.
  • the source code fragment includes assignment statements 221 -A, 221-C, 221-E, 221-F, 221-H, conditional-branch statements 221 '-B, 221 '-G, 221 '-J, 221-K, 221-M, jumps, 221-D, 221-L function calls 221-1, 221-N, and labels 221-0.
  • the assignment and conditional branch statements can use variable values or literals.
  • FIG. 19 is a block diagram of the first phase transformer program 224 of FIG. 17.
  • the main elements of this transformer are a grammar definition for the source language 251, a dynamic symbol table generator for the source language 252, and a number of rules 253 for transforming a source language 221 to the meta language 225.
  • an external data dictionary 228 contains the data structures, definitions, and common logic constructs pertaining to the source application.
  • the first phase transformer 224 receives a file of source language code 221 as input. This file is then semantically parsed using the source language grammar definition 251. A full grammar for the source language is specified using a programmatic grammar encoding scheme.
  • the symbol table 252 is dynamically generated during parsing based on data definitions found in the source code 221 as well as in the data dictionary 228. All relevant data (i.e. non-procedural) elements found in the source code 221 are inco ⁇ orated into the symbol table 252, while irrelevant elements are discarded based on source language grammar 251.
  • the symbol table 252 is thus dynamically built to contain symbols for all data elements, data structures, data definitions and variables relevant to the source code file 221 being transformed.
  • FIG. 20 illustrates in FIGs. 20A-20B a parse tree for the source code fragment of FIG. 18. As illustrated, the source code 221 is parsed into a series of statement lists 225. Each statement list includes at least one statement. A statement can include an additional statement list.
  • the first instruction 221-A (FIG. 18) is parsed into an assignment (ASSIGN) which assigns the variable (VAR) LOW- VALUE to the variable list (VARLIST) of variables (VAR) YMS-CALL- RESULT and FLAG-AREA.
  • Each source language instruction 221-A,... , 221-0 of FIG. 18 is represented as a respective branch cluster 225-A, ... , 225-0 on the parse tree 225 of FIG. 20.
  • the branch clusters are on branches 225-1 , ..,225-8 of the parse tree 225. From this representation, the source language is converted to the intermediate language.
  • a complete set of rules 253 for transforming source language code to meta language code is programmed as declarative rules in a separate conversion routine 253.
  • the conversion rules 253 operate as follows. A rule is applied to each source language construct parsed using the grammar 251. When a rule is executed, a source language construct is transformed to its equivalent construct in the meta language. Procedural constructs and primitives are thus re ⁇ generated in the meta language. Operations on data elements and data structures are first validated using the symbol table 252. Based on this validation, an equivalent operation is custom-generated in the meta language. The rule being executed for this validation operation generates a specific construct to reproduce the semantics of the transformed operation, such as a conversion from integer to floating point, if required.
  • a subset of the rules specializes in the extraction and transformation of external data access commands into application- independent external data access commands.
  • application-independent external data access commands could be encoded using the ANSI-SQL language. External data access operations are thus parsed and transformed into separate, application- independent data access commands. These generated data access commands are stored in at least one separate output file.
  • FIG. 21 is an intermediate language file 225' for the source code fragment of FIG. 18.
  • the file 225' is created by traversing the parse tree 225 depth-first, left- to-right. A node is not output to the file 225' until all children are output. This technique results in a reverse polish or postfix notation.
  • each branch 225-1 , ... ,225-8 of the parse tree 225 is represented as a statement 225-1 ' , ... ,225-8' in the file 225'.
  • the trunk nodes of the parse tree 225 are represented as a terminal statement 225-9' .
  • executing the transformation rules on the source code produces two separate outputs: the transformed source code in a meta language, which is constituted of procedural source code and data definition structures, and a set of data access command.
  • FIG. 22 is a block diagram of the second phase transformer program 22 of FIG. 17. Similar to the first phase transformation, the main elements of the second phase transformer 226 are a grammar definition 261 for the meta language 225, a dynamic symbol table generator 262 for the meta language 225, and a number of rules 263 for transforming the meta language 225 to a target language 227. In addition, the second phase transformer program 226 uses the same external data dictionary 228 as does the first phase transformer program 224.
  • the second phase transformer 226 receives as input meta language program files 225, usually constituted by meta language procedural source code and data definition structures files, as well as data access command files, both generated by the first phase transformer 224.
  • the meta language program files 225 are then semantically parsed using the meta language grammar definition 261.
  • a full grammar for the meta language is specified using a programmatic grammar encoding scheme.
  • the symbol table 262 is dynamically generated during parsing based on data definitions found in the meta code 225 as well as in the data dictionary 228.
  • the data access command files portions of the meta language program files 225 provided as input are parsed using a different mechanism. Because this mechanism is a simplified version of the one used for procedural source code and because it is based on the exact same principles, it will not be detailed any further here.
  • a complete set of rules 263 for transforming the meta language code 225 to the target language code 227 is programmed as declarative rules in a separate conversion module 263.
  • the conversion rules 263 includes rules for transforming meta language data definitions into target language data structures, rules for transforming meta language variable definitions into target language variables, rules for generating target language initialization routines for the data structures and variables mentioned above, rules for transforming procedural meta language source code into target language source code, and optionally rules for customizing the application-independent data access commands for a particular application such as Oracle.
  • a rule is applied to each language construct parsed using the meta language grammar 261.
  • Language constructs include: data definitions, variable definitions, and procedural constructs.
  • Data definitions in meta language code are transformed into target language data structures by executing a set of rules written for this pu ⁇ ose.
  • Variable definitions in meta language are also transformed into target language variables by executing a set of rules written for that pu ⁇ ose.
  • an initialization routine is created for each variable definition created.
  • Procedural constructs are transformed into their equivalent in the target language.
  • Data access commands can be tailored for a particular application as required by the target environment. Executing the transformation rules on the meta language source code produces output files containing the transformed code in the target language: procedural source code files, data definition structure files, and final data access command files.
  • the target source code 227 includes calls to specially designed and implemented libraries to support functionality that is not provided natively in the new target environment. These functions include variable handling, value assignment, data access services, transaction processing, and other. Depending on the target environment, different runtime libraries are required in order to guarantee correct execution in the new environment. The scope of these libraries is determined not only by the target environment, but also by the source environment. All source constructs must be mapped to equivalent constructs in the target environment.
  • FIGs. 23A-23B are C and C + + target code fragements 227', 227", respectively, for the source code fragment of FIG. 18.
  • the intermediate language illustrated in the output file 225' of FIG. 21 is transformed into a select target language source code 227.
  • the target language can be any procedural programming language (such as C) or any object-oriented programming language (such as C + + ).
  • a different second phase transformer program 226 is used to generate source code in each target language.
  • the transformation process permits new data organization methods. If new methods are used to organize data, additional libraries might be required to achieve complete compliance with the original application behavior.
  • An example of specialized library for IMS/VS data organization method was outlined above in the context of the data access layer 140.
  • a runtime infrastructure In addition to the transformed code and required libraries, a runtime infrastructure must be provided for application execution.
  • the infrastructure in question corresponds to the multi-tiered architecture 10 detailed above. Because the description of the architecture 10 focused on on-line programs, a number of key differences should be noted in its application to the batch components of applications. Batch-related code modules only interact with their calling process, eliminating the need to maintain a two-way communication structure with the user interface module and the accompanying state information in the business layer. Instead, re-architected batch processes are stand-alone programs constituted by a wrapper that provides means to parse the input arguments and call the top-level batch job. Typically, this top-level batch job requires some form of job scheduling infrastructure.
  • legacy Job Control Language JCL
  • JCL Job Control Language
  • a scripting language-equivalent such as UNIX shell, Perl, or REXX.
  • the resulting script then calls the various batch programs, interleaved with scripting commands or library calls that provide functionality that is similar to that of the source legacy system.
  • batch conversion and processing follows the same fundamental principles as on-line, in a simplified manner. Consequently, a full discussion of the specifics of batch conversion and runtime execution will not be detailed any further.
  • FIG. 24 is a block diagram of the data definition language conversion utility 230 of FIG. 1.
  • the database conversion utility 230 is used to convert a source database language 231 into a target database language 237 using a database converter 234. As illustrated, the conversion must address the database structure, encoded using a Data Definition Language (DDL), and referred to as a schema, as well as the database data.
  • DDL Data Definition Language
  • the target DDL 238 is a relational database schema specified using conventional ANSI SQL language. Such a schema defines the tables that compose an application, along with their key fields, and other descriptive fields. Initial values and other constraints such as referential integrity clauses may also be included in this schema. Because relational schemas are well understood, and ANSI SQL syntax is well-documented, the primary task of the DDL converter 235 is to map the syntax of source DDL 232 to the corresponding ANSI SQL syntax. In a preferred embodiment of the present invention, this "target" DDL 238 can be viewed as an intermediary language that can then be converted to the final target DDL language for increased maintainability and flexibility, as was the case with the user interface and procedural language conversion utility. For illustrative pu ⁇ oses, IMS DL/1 can be considered as the source DLL 232.
  • FIG. 25 is a block diagram illustrating a schema conversion.
  • the DDL converter 235 is sub-divided into a first converter 235a and a second converter 235b.
  • the first converter 235a takes DBDxx 232a, DBDxxL 232b, and COPYLIB 232c as inputs and generates a table creation SQL statement file 238a, an index creation SQL statement file 238b, a primary key creation SQL statement file 238c, and a database schema ANSI C header file 238d.
  • an IMS database schema depends on Data Base Descriptions (DBD) and COBOL copy libraries (COPYLIB). All IMS data bases must be defined through DBD generation prior to use by application programs.
  • a DBD is the DL/1 control block that contains all the information necessary to describe a data base, namely segment types, physical and logical relationships between segment types, database organization and access method, and physical characteristics of the database.
  • COPYLIB contains COBOL data structures definition and is used to create corresponding C structures and IMS segment definitions.
  • the first converter 235a generates a table file 238a, which is used to create tables in the target RDBMS.
  • the table file 238a includes simple relational table creation statements, without indices, keys, or reference integrity. Consequently, it can be generated directly from COPYLIB 232c information, without any DBD input. For example, the COPYLIB entry for a segment is used to generate a corresponding relational table.
  • a relational table is build from an IMS segment as follows. First, all the key fields of all the ancestors of the segment in question in the IMS hierarchy are included in the relational table into which the segment in question is being converted. Then, all the local key fields of the segment being converted are included in the target relational table. Finally, all the local non-key fields of the segment to convert are added to the target relational table.
  • the first converter 235a also generates the index file 238b and the primary key file 238c, which are derived from the table file 238a.
  • the first converter 235a creates one index for each parent of the converted segment by concatenating the keys for that parent.
  • One index is also created for each local key field.
  • the first converter 235a also creates the schema header file 238d having information for each segment using the DBDxx 232a and corresponding DBDxxL 232b to provide schema information to application programs.
  • a segment header file includes two ANSI C data structures: a segment and a segment array.
  • the segment structure includes the following information: a segment name, the names of the segment columns, the segment child index in the form of another header file, the length of each segment column, the expanded column length, the PIC mask for each segment column indicating column type and size, the column usage, a logical key and the corresponding local key index, the number of columns in the segment, the number of parent keys in the segment, and the number of local keys for this segment.
  • the segment array structure includes the following information: a segment name, physical child names, the number of children, a logical flag, and a pointer to the corresponding segment data structure.
  • the second converter 235b is used to convert PSB definitions 232d into PSB header files 238e.
  • a PSB defines the database which can be accessed, the segments within the database which are available, and the type of access (read, update, etc.) which can occur.
  • the PSB header file 238e provides such database access information to application programs.
  • FIG. 26 is a block diagram of a converter 235a, 235b of FIG. 25.
  • Both converters 235a, 235b are built using the conventional principles of compiler design. This includes a scanner 271 to decompose source data definition language 232 into tokens 272, a parser 273 to assemble tokens 272 into a syntactic parse tree 274, and a code generator 275 to generate target data definition language constructs 238 from the parse tree 274.
  • This technology is well-understood and documented in existing literature and the details of a particular compiler are highly dependent on the source and target languages. Consequently, the converters 235a, 235b will not be detailed any further.
  • FIG. 27 is a block diagram of the data converter 236 of FIG. 24.
  • a DBDxx. dip file 231a is provided as input to the data converter 236, along with a flat file 231b that contains the data to be converted.
  • the data converter 236 uses the data loading pattern specified in the DBDXX. dip file 231a to determine the desired target format for each data record in the data flat file 231b and generate an ANSI SQL file 239a containing the INSERT statements necessary to populate the target database with the data provided.
  • the data converter 236 needs to take into account a number of technical issues in performing its task on IMS data, including packed data handling and field redefinition.
  • IMS In IMS, some numerical field are compressed into a binary representation for storage efficiency.
  • Such packed data still present in binary format in data flat files 231b, is first unpacked and then moved to the end of the record, before using a filler, namely clearing the packed data original positions with blanks.
  • a data loading pattern file 231a specifies packed data fields
  • the data converter 236 searches the end of the record instead of the original field position to locate the proper data in unpacked format.
  • COPYLIB 232c sometimes specifies a redefinition for one or more fields. Such re-definitions are ignored and left to the functionality code to handle.
  • redefined fields include packed data however, the data converter 236 creates one filler for each redefine after moving all unpacked data for the redefine in question to the end of record. Combination between re-definitions and packed data fields is thus treated as a special case of the latter.
  • the order of creation for a given target database table is first to create the table using the table creation file 238a, next load the data from the target data 239, then create the primary key using the primary key creation file 238c, and finally to create the indices from the index creation file 238b.
  • the ANSI C structures in the schema header file 238d and the PSB header file 238e are used at runtime by application programs to access the target database structures.
  • the custom and re-engineering system 30 focuses on providing an ente ⁇ rise a facility for maintaining and enhancing distributed infrastructure. Even though this facility is an integral part of the overall system of the present invention, it is really an add-on facility that becomes paramount once the transition is complete. Consequently, only an overview of the custom and re-engineering system 30 will be provided here.
  • the custom and re-engineering system 30 includes a graphical user interface editor 310, a graphical business process editor 320, a graphical business object editor 330, a graphical data record editor 340, a logic development environment 350, and facilitation tools 360.
  • the graphical editors 310, 320, 330, 340 are preferably fourth generation languages (4GL) or Computer Aided Software Engineering (CASE) tools that facilitate the application development task by enabling a certain amount of the application code to be generated automatically from graphical representations.
  • the graphical user interface editor 310 can be a commercially available user interface display platforms or GUI builders discussed in the context of the presentation layer 110.
  • FIG. 28 is a block diagram of the graphical user interface editor 310 of FIG.
  • the graphical user interface editor 310 is a typical user interface made to create menus and paint screens.
  • the graphical user interface editor 310 includes a screen editor 311 to position graphical representations of business objects on a screen or form. Screens can thus include text fields, labels, buttons, selection boxes, pull down lists, and similar graphical objects that compose a user interface.
  • These graphical representations of business objects can be grouped so that a screen can be composed of sub-screens. This is useful to represent screen overlays, which are screens that have a fixed area as well as a variable area that changes depending on user actions. Sub-screens are also useful for grouping together business objects that need to be displayed across a number of application screens.
  • FIG. 29 is a block diagram of the graphical business process editor 320 of FIG. 1.
  • the graphical business process editor 320 is a tool that enables application developers to represent the business processes that an application is meant to automate in a more intuitive, graphical form, referred to as a process flowchart. Because a business process can be broken down into sub-processes, an application can be viewed as a hierarchy of process flowcharts. This modularization enables an application to look at high-level business processes separately from detailed business sub-processes.
  • a business process editor 321 generates internal business process representations 322, which are converted by a business process code generator 323 into data stored in the business process repository 154.
  • transition diagrams are networks of nodes represented graphically by circles and are called states.
  • the states are connected by directed labeled arrows, called edges.
  • Edge labels represent the transformations that lead from one state to the next.
  • the process of applying for a driver's license includes routing a driver's license application paper form through the various departments in charge of eye exams, written test, driving test and the like, with a progression from department to department.
  • This process can be modeled using a transition diagram in which the states represent the various departments, and the edges represent the changes to the electronic driver's license form that need to be performed before that form is routed to the next department.
  • a transition diagram can be deterministic, or non-deterministic, where non- deterministic means that more than one edge with the same label is possible out of a state.
  • non-deterministic transition diagrams are used to represent business processes graphically.
  • FIG. 30 is a block diagram of the graphical business object editor 330 of FIG. 1.
  • the graphical business object editor 330 is a tool that enables the graphical editing of business objects and their relationships.
  • a business object editor 331 generates internal business object representations which are converted by a business object code generator into data stored in the business object repository 156.
  • the graphical business object editor 330 can be viewed as a Entity-Relationship (ER) diagramming tool.
  • ER Entity-Relationship
  • the ER data model is the predominant conceptual level description tool and is used as a diagramming technique where rectangles represent entities, circles represent attributes, diamonds represent relationships.
  • This graphical ER diagram can be used to generated automatically the application database schema, and a number of the basic data accessor queries.
  • default constraints can be automatically associated to business objects based on the business object type. This can lead to automatic generation of maintenance screens for lookup business objects that can take a known range of values.
  • the graphical business object editor can also be used to create templates that can be reused throughout an application.
  • every screen may have a number of fixed function keys or buttons such as display, insert, delete, update, clear, refresh, backup, or quit, as well as a number of variable function keys whose semantics change from screen to screen.
  • function keys can be treated as a group and provided automatically as part of the template for every screen in an application.
  • FIG. 31 is a block diagram of the graphical data record editor 340 of FIG. 1.
  • the graphical data record editor 340 is a tool that provides access to the data stored in the relational tables of the data layer RDBMS. As such, it is an interface that provides graphical access to each application table and permits the application developer or maintainer to view, insert, delete or update specific data records.
  • a data record editor 341 generates internal data record representations 342 which are converted by a data record code generator 343 into data stored in the data record repository 158.
  • the data record editor can be viewed as a data repository used to generate the database schema, either initially in its totality, or subsequently, for incremental updates.
  • the data record editor is similar to commercially-available off-the-shelve packages such as PeopleSoft Inc. 's Record Editor or ERwin from Logic Works Co ⁇ oration. As a whole, the data record editor greatly facilitates application maintenance and data error recovery for day to day application development, maintenance, and operation.
  • FIG. 32 is a block diagram of the logic development environment 350 of FIG. 1.
  • the logic development environment 350 is an environment that adheres to the "open system" standards.
  • an open system is a system that implements sufficient open specifications for interfaces, services, and supporting formats to enable properly engineered application software to be ported across a wide range of systems with minimal changes, to interoperate with other applications on local and remote systems, and to interact with users in a style which facilitates user portability.
  • Open specifications are defined herein as a public specification that is maintained by an open, public consensus process to accommodate new technology over time and that is consistent with standards.
  • the logic development environment 350 includes, at a minimum, an operating system 351 , a third generation programming language compiler 352 and debugger 353, a runtime building facility 354, a source control system 355, and a screen oriented text editor 356.
  • One possible embodiment of the logic development environment could use the UNIX operating system, the ANSI C programming language, the XDB debugging facility, the MAKE build utility, the RCS revision control system, and the EMACS text editor.
  • FIG. 33 is a schematic block diagram of the facilitation tools 360 of FIG. 1.
  • the facilitation tools 360 are graphic editing tools. The primary concept is to provide a structured, yet flexible, methodology for gathering user and application requirements while enabling the use of the resulting documentation to automatically generate a number of the architectural constructs that would otherwise have to be encoded manually.
  • These facilitation tools 360 can include project tools 361, organizational tools 362, communication tools 363, office tools 364, groupware tools 365, and templates 366 for processing user inputs.

Abstract

An automated system transitions an entire enterprise to a distributed infrastructure. The system includes a process for organizing and managing the transition, a multi-tiered client/server architecture that adheres to open systems standards, a system to automate the transition of existing applications to this architecture, and a system to enable the creation or modification of applications based on this architecture.

Description

ENTERPRISE TRANSITION SYSTEM FOR A DISTRIBUTED INFRASTRUCTURE
Related Applications
This application claims priority to U.S. Application No. 08/714,205 filed on September 16, 1996 and U.S. Provisional Application No. 60/016,330 filed on May 3, 1996, the teachings of which are incoφorated herein by reference in their entirety.
Background
Corporations characteristically use applications executing on computer systems to automate their business functions. The applications typically contain parts that deal with the user interface, parts that deal with business processes, parts that deal with programming logic, and parts that deal with data. The applications are typically built to operate on a single computer platform. In this context, a computer platform includes the programs, or software, to perform the various tasks required of a computer, as well as the machine, or hardware, that hosts these programs.
Given the large amount of business functions that need to be automated within a corporation, applications are often centralized on one single platform. From a hardware point of view, such platforms include large and powerful computers such as mini-computers or mainframes. On the software side, such platforms often take the form of all-encompassing environments that meet all of the application development needs, such as Information Management System/Virtual Storage (IMS/VS) from International Business Machines Corporation (IBM). In the IMS/VS model, the various conceptual layers constituting an application are bundled together in one single piece or a small number of inter-dependent pieces. This single-tier model is well understood, reliable, and secure. It facilitates control and limits overhead.
The proprietary nature of the host platform, however, leads to severe economic disadvantages. Initial platform costs are sizable, and subsequent growth is limited by the capacity of the hardware and software components of the platform that hosts the application. Furthermore, application maintenance and enhancement is a complex and cumbersome process. Application users are removed from application developers, increasing the gap between requirements and implementation. Changes to one part of the application also require compatible changes to the other parts of the application. Finally, data access and communication standards are limited to those supported by the host platform.
The advent of desktop computing in the form of the personal computer provides an initial solution to the above problems by enabling corporations to depart from the centralized platform model. To maximize the usage of their computer resources, applications can be distributed among different platforms. This distributed system approach can take many forms, the most widespread of which is known as the two-tiered client/ server architecture. This two-tiered model divides the application between two platforms: a client and a server. At a high level, clients and servers are software concepts. A client makes requests from servers, while servers provide adequate services to fulfill client requests. Client hosts are typically personal computers, while server hosts are typically mini-computers or mainframe computers.
In the client/server model, the presentation part of the application is usually located on the client platform and the data part of the application is found on the server platform, with the business process and functionality parts of the application merged into either of the other two layers. This model is more economical than the single-tier model, with less or no hardware lock-in. The division into two tiers is also more flexible to user interface changes. On the other hand, the proprietary nature of the platform is still present at the level of the software. Summary of the Invention
Even in the two-tiered client/server model, the mixing of functionality with either presentation or data still leads to complicated code changes. Also, data access and communication standards are still limited. Furthermore, enterprises have no facilities to transition their existing infrastructure to a distributed computing model.
A preferred embodiment of the invention includes a system to transition an entire business enterprise to a distributed infrastructure. The distributed infrastructure is preferably a multi-tiered client/server target architecture that adheres to open system standards. The multi-tiered architecture preferably includes at least four layers including a separate process control layer and functionality layer. The process control layer includes a state router to control work flow in accordance with the business procedures of the enterprise. The functionality layer includes modules for performing the work. The architecture also preferably includes a presentation layer for interfacing with a user, and a data retrieval layer for accessing data stored in a separate data storage layer.
A transition of an entire business enteφrise to a distributed infrastructure based on the new architecture is performed using a process for organizing and managing the transition. Notably, this requires that each legacy (source) application be identified and prioritized. For each source application, there are a range of available transition choices, including the option of translating the source application to the new target architecture without changing any of the existing functionality and the option of re-engineering the source application by changing the existing functionality. The source application may also be replaceable by a commercial product or a custom application written in-house. The source applications are then transitioned in order of priority to the new architecture.
Specifically, a preferred system in accordance with the present invention includes the automated capability to translate existing source applications into new target applications on a multi-tiered client/ server architecture. The translation of source applications to target applications includes the conversion of user interfaces, procedural languages, and data definitions. These conversions use a two-phase process where source program components written in the source languages are first translated to components in a common intermediate language. The intermediate language components are then translated to target program components in the target languages. By using a common intermediate language, only one translation module is required for each source and target language.
A preferred system in accordance with the present invention further includes a facility to create a new application based on the multi-tiered client/server architecture and to modify an existing application that already uses this multi-tiered client/server architecture.
Brief Description of the Drawings
The foregoing and other objects, features and advantages of the invention, including various novel details of construction and combination of parts will be apparent from the following more particular drawings and description of preferred embodiments of a system to transition an enteφrise to a distributed infrastructure in which the reference characters refer to the same parts throughout the different views. It will be understood that the particular apparatus and methods embodying the invention are shown by way of illustration only and not as a limitation of the invention, emphasis instead being placed upon illustrating the principles of the invention. The principles and features of this invention may be employed in various and numerous embodiments without departing from the scope of the invention.
FIG. 1 is a high level block diagram of a system embodying the invention. FIG. 2 is a functional block diagram of the interrelationships of FIG. 1. FIG. 3 is a schematic block diagram of a process for managing the transition of an entire enteφrise to a distributed infrastructure. FIG. 4 is a schematic diagram of the presentation layer 110 of FIG. 1.
FIG. 5 is a schematic diagram of a sample mapping between application user interface representation structures 116 and display platform user interface representation structures 118. FIG. 6 is a block diagram of the operational modules of the user interface engine 117 of FIG. 4.
FIG. 7 is a schematic diagram illustrating the business process layer 120, functionality layer 130, and data access layer 140 of FIG. 1. FIG. 8 is a block diagram of the business process layer 120 of FIG. 1.
FIG. 9 is a flow diagram of the communication mechanism between the user interface engine 117 and the state router 122.
FIG. 10 is a flow diagram of the operations of a particular preferred state router 122 of FIG. 8. FIG. 11 is a block diagram of the functionality layer 130 of FIG. 1.
FIG. 12 is a block diagram of the data access layer 140 of FIG. 1. FIG. 13 is a block diagram of the data storage layer 150 of FIG. 1. FIG. 14 is a schematic diagram of a hardware platform for the data storage layer 150 of FIG. 19. FIG. 15 is a block diagram of the control layer 160 of FIG. 1.
FIG. 16 is a block diagram of the user interface conversion utility 210 of FIG. 1.
FIG. 17 is a flow diagram of the procedural language conversion utility 220 of FIG. 1. FIG. 18 is an exemplary source code fragment.
FIG. 19 is a block diagram of the first phase transformer program 224 of FIG. 17.
FIG. 20 illustrates in FIGs. 20A-20B a parse tree for the source code fragment of FIG. 18. FIG. 21 is an intermediate language file for the source code fragment of
FIG. 18.
FIG. 22 is a block diagram of the second phase transformer program 22 of FIG. 17.
FIGs. 23A-23B are C and C+ + target code fragments there being source code fragment of FIG. 18. FIG. 24 is a block diagram of the data definition language conversion utility 230 of FIG. 1.
FIG. 25 is a block diagram illustrating a schema conversion.
FIG. 26 is a block diagram of a converter 235a, 235b of FIG. 25. FIG. 27 is a block diagram of the data converter 236 of FIG. 24.
FIG. 28 is a block diagram of the graphical user interface editor 310 of FIG. 1.
FIG. 29 is a block diagram of the graphical business process editor 320 of FIG. 1. FIG. 30 is a block diagram of the graphical business object editoδr 330 of
FIG. 1.
FIG. 31 is a block diagram of the graphical data record editor 340 of FIG. 1.
FIG. 32 is a block diagram of the logic development environment 350 of FIG. 1. FIG. 33 is a schematic block diagram of the facilitation tools 360 of FIG. 1.
Detailed Description of the Preferred Embodiment
FIG. 1 is a high level block diagram of a system embodying the invention. As shown, the system 1 includes a multi-tiered architecture 10, a re-architecting system 20 for converting source applications of an enteφrise to target applications on the multi-tiered architecture 10, and a re-engineering subsystem 30 for custom application development or re-engineering.
A preferred multi-tiered architecture 10 of the present invention comprises at least four separate layers. As illustrated, the architecture 10 includes at least one presentation layer 110, one separate business process layer 120, one separate functionality layer 130, one separate data access layer 140, one separate data storage layer 150, and one separate control layer 160, all inter-connected through communication links 170. The data storage layer 150 preferably includes a user interface repository 152, a business process repository 154, a business object repository 156, and a data record repository 158 for storing data. A preferred re-architecting system 20 includes a user interface conversion utility 210, a procedural language conversion utility 220, and a data definition language conversion utility 230. The procedural language conversion utility 220 is in communication with the functionality layer 130 and the data access layer 140 of the multi-tier architecture 10. The user interface conversion utility 210 is in communication with the user interface repository 152 and the data definition language conversion utility 230 is in communication with the data record repository 158.
A preferred re-engineering system includes a graphical user interface editor 310, a graphical business process editor 320, a graphical business object editor 330, a graphical data editor 340, a logic development environment 350, and facilitation tools 360. The logic development environment 350 is in communication with the functionality layer 130 of the multi-tier architecture 10. The graphical user interface editor 310, the graphical business process editor 320, the graphical business object editor 330, and the graphical data record editor 340 are in communication with the user interface repository 152, the business process repository 154, the business object repository 156, and the data record repository 158, respectively.
Even though the re-engineering system 30 is an integral part of the overall system of the present invention, it is not part of the actual transition of an enteφrise to a distributed infrastructure. Instead, the re-engineering system 30 enables the enteφrise to maintain and enhance its distributed infrastructure once the transition itself is complete.
In its simplest form, a host for all the layers can be a single platform. At the other end of the spectrum, each layer can be hosted on a different platform. In the spirit of distributed systems, a preferred embodiment of the present invention hosts each layer on a separate platform, both in terms of hardware and software. In a preferred embodiment of the present invention, the architecture 10 supports both custom-developed applications as well as application converted from a legacy system. The IMS/VS legacy environment is used herein to illustrate, but not limit, architectural concepts that pertain to a converted legacy application. FIG. 2 is a functional block diagram of the interrelationships of FIG. 1. Conceptually, the user interface translator 210 and the graphic user interface editor 310 affect the presentation layer 110 of the multi-tiered architecture 10. The graphical business process editor 320 affects the business process layer 120. The procedural language conversion utility 220, the graphical business object editor 330, and a logic development environment 350 conceptually affect the functionality layer 130. The procedural language conversion utility 220 also conceptually affects the data access layer 140. The data definition language translator 230 and the graphical data record editor 340 conceptually affect the data storage layer 150. FIG. 3 is a schematic block diagram of a preferred process for managing the transition of an entire enteφrise to a distributed infrastructure. Preferably, the transition management process 40 includes a series of high level serial stages, including an implementation strategy stage 42, an implementation planning stage 44, a system implementation stage 46, and an operation stage 48. As the transition management process 40 proceeds from the implementation strategy stage 42 through to the operation stage 48, the amount of operations support required by the legacy system decreases and the amount of operations support for the open system increases, as illustrated.
The implementation strategy stage 42 is a sequence of manual steps embodied in a Business Case and Implementation Strategy (BCIS) process 422. The BCIS process 422 determines the business and technology drivers of the enteφrise, builds a business case analysis of the economic feasibility of the transition, and creates an implementation strategy that provides the basic outline of the organization of the transition. This can involve studies of the existing and envisioned organization, infrastructure, and technology, as well as an evaluation of the impact of the transition in these areas. A study of the organization analyzes methods for developing the skills necessary for the transition and to manage potential resistance to change. A study of the infrastructure analyzes the hardware, software, and network required to support the transition. A technology study analyzes the tools, architectures, and other technologies necessary for the transition. Although the implementation strategy stage 42 is described as a manual process, an expert system can be employed to perform some or all of the processing.
More specifically, the focus is first to define the current state of the enteφrise, which provides the start point. This start point is defined through an assessment of the performance of the existing information technology in supporting current business goals, an assessment of the readiness of the organization to build and support a new environment, and an assessment of the limitations inherent to the existing infrastructure.
The next focus is to identify the mission of the enteφrise. The mission will give a good idea of the on-going direction of the enteφrise, with which all undertakings must be aligned. Once the mission is identified, a conceptual vision for the future of the enteφrise is defined, consistently with the mission.
Unlike the mission, the conceptual vision is not continuous, but must be attained within a predetermined time frame. This conceptual vision provides the destination point. Given its conceptual nature, the coφorate vision must now be broken down into specific goals or objectives, that are numbered for reference. Outputs are then associated with each objective, as measurable outcomes that will clearly indicate the achievement of the associated objective. To secure this association, outputs are numbered consistently with their corresponding objectives. Now that a start point, a direction, and a destination point have been defined, the intermediate steps that lead to each outcome must be delineated. These constitute the factors that are critical to successful achievement of these outputs, and are consequently referred to as the Critical Success Factors (CSF). Each output is given a set of CSFs associated with it, with appropriate numbering for reference. At this point, a strategy is put into place for achieving all of the CSFs for each of the outputs. Each strategy is numbered consistently with the output at which it is meant to arrive. Finally, a set of specific short term action items is associated with each strategy, as a means to move from the current situation towards the first CSF for each output. As before, action items are numbered consistently with the CSFs they are meant to lead towards. The implementation strategy stage 42 provides a start point for the implementation planning stage 44. The implementation planning stage 44 includes an Applications and Process Portfolio Analysis (APP A) process 442, followed by a series of Applications Staging and Planning (ASAP) 444 sessions. The APPA process and the ASAP sessions can be performed manually or with the aid of expert systems.
The intent of the APPA process 442 is to gather and document an inventory of all the current and envisioned applications and business processes of an enteφrise. The APPA process 442 separates the strategic from the tactical, and for each one, determines the transition that needs to take place to move from the existing to the envisioned situation.
The range of transition possibilities include: do nothing, re-architect, re- engineer, re-architect and then re-engineer, replace by an off-the-shelf commercial solution, replace by a custom solution built in-house, and integrate. The do nothing option retains the existing application or process as is. The re-architect option translates the existing application to the new architecture without changing any of the existing functionality. The re-engineer option changes the existing functionality while remaining on the same architecture. The option of combining re-architecting and re-engineering first translates the existing application into the new architecture, and then modifies the application functionality in the context of the new architecture. The option of replacing by an off-the-shelf commercial solution replaces the existing application with a corresponding application package which is used, with or without customization, to perform the function of the replaced application. This solution is not an alternative for strategic applications and processes due to the inherent strategic nature of such solutions and to the loss of competitive advantage of the enteφrise should these solution be built using tools and methods commercially available and thus easily reproducible. The option of replacing by a custom solution built in-house replaces the existing application with a new application built from scratch, using the new architecture. The integration option combines the various applications (whether already present, re-architected, re-engineered, purchased, or custom developed) into the new architecture to obtain a coherent infrastructure based on the new architecture.
Once this inventory is completed, applications and processes are prioritized, and the planning of the transition can be initiated, starting with the applications and processes with the highest priority. This transition planning corresponds to the ASAP process 444, which focuses on a single application or process. The ASAP process 444 focuses on the details of the existing and envisioned application or process, evaluates the scope of the transition effort, and prepares a detailed implementation plan to conduct the transition, including tasks, schedule, and resources. An ASAP process 444 is thus carried out for each application and process identified during the APPA process 442, in order of decreasing priority.
Once the implementation planning stage 44 is completed as described above, the actual implementation stage 46 can be initiated. Depending on the transition alternative selected for a particular application or process, a different implementation process may be applied. At the implementation stage 46, multiple applications and processes can go through the transition in parallel.
A Strategic Application Advancement (SAA) process 461 is an automated implementation process that focuses on re-architecting. Re-architecting preserves an application's core functionality intact, transformed into a multi-tiered client/server architecture. Re-architecting is often followed by re-engineering to add or change existing functionality to accommodate new business processes. Re-architecting involves identifying the business goals, objectives, and processes encompassed by the system, determining the existing source and desired target architectures, defining information systems standards, determining infrastructure requirements, performing the actual conversion, providing any re-engineering required, including design documentation for re-engineering requirements and technical documentation for re- architected application maintenance, and empowerment of staff for application maintenance and enhancements.
A Strategic Applications System Development (SASD) process 463 is a manual implementation process that focuses on re-engineering or custom development. The SASD process 463 encompasses the design and development of re-engineered or custom-built multi-tiered client/server applications conforming to open system industry standards. Re-engineering refers to modifications to an existing system, usually the product of a prior re-architecting effort. Re-engineering must take into account the maintainability and performance issues that arise when attempting substantial changes to an application designed for a legacy system and converted to a multi-tiered client/ server architecture. Custom development refers to the creation of a multi-tiered client/server application from user requirements. Consequently, custom development follows familiar application life-cycle steps. A Tactical Applications Planning and Implementation (TAPI) process 467 is a manual implementation process that focuses on the usage of commercial off-the-shelf packages. This involves selection and customization of commercial packages to achieve reusable applications in very short time frames. The TAPI process 467 is targeted to tactical as opposed to strategic applications, because such applications are not critical to the competitive posture of the business and therefore can make use of available packaged technology without endangering the competitiveness of an enteφrise.
An Open Systems Integration (OSI) process 467 is a manual implementation process that focuses on integrating applications that are purchased, newly custom developed, re-architected, or re-engineered to share data and screens. This process includes the definition of business goals and objectives, the definition of applicable business processes, the study of application interactions and data relationships, and the planning of hardware and software infrastructures. The OSI process 467 also includes the implementation of the integration, including detailed implementation plan and schedule and detailed requirements and design documentation, user acceptance testing, comprehensive technical documentation, and empowerment of support staff for the maintenance phase. One powerful example of integration at the user interface layer using the OSI process 467 is the creation of a coφorate intranet using internet Hyper-Text Manipulation Language (HTML) or a highly-level language generating HTML, such as Java from Sun Microsystems to provide a user- friendly, platform independent, common user interface to coφorate application.
Implementation also includes a Skills Enhancement and Empowerment (SEE) process 462 and an Operations Process Advancement (OPA) process 468. The SEE process 462 focuses on organizational issues during implementation, such as changing management and personnel training. The OPA process 468 focuses on operational support of the applications developed by the other implementation processes, including standardization of tools and processes, infrastructure setup, and system operation. Once the implementation stage 46 is completed, the operations stage 48 begins. The operations stage 48 includes a Customer Service and Support (CSS) process 480, which can include initial or continued application maintenance and user support, full-size production and operations, and possibly outsourcing of all information system needs. As mentioned previously, the facilitation tools of the re- engineering system are available for electronic planning, tracking, and documentation of all the stages of the transition management process 40.
FIG. 4 is a schematic diagram of the presentation layer 110 of FIG. 1. In its simplest form, the presentation layer 110 can be implemented using a conventional personal computer. It can also take the form of an X-terminal, a workstation console, or a Macintosh style interface display. As shown, the presentation layer 110 includes a processor 111 having the current screen representation, constructed according to the principles of the present invention. The processor is preferably a user workstation which includes a display unit through which commands or user selections can be entered via a keyboard or mouse. The processor 111 also includes internal or external storage, such as a disk device, from which a user interface engine is loaded into the memory of the processor 111 as required. For a personal computer, X-terminal, or workstation having a large main memory storage, the entire application front-end can remain resident, thereby enhancing system performance. The storage unit is also used to store presentation layer log files. The presentation layer 110 can further include a printer 113, connected to the processor 111 through a communication link, such as a parallel or serial port. The printer 113 can be used to provide a permanent record of application log files, reports, source code, or screen listings according to the present invention.
As shown in FIG. 4, the presentation layer 1 10 includes a user interface display platform 115, an application user interface representation mechanism 116, and a user interface engine 117. In a preferred embodiment of the present invention, the user interface display platform 115 is a conventional Graphical User Interface (GUI) tool, commercially available. Consequently, the user interface display platform 115 has its own internal user interface representation mechanism 118 to display the various components of a user interface, usually in a graphical way.
Preferably, the underlying internal user interface of the user interface display platforms 115 is preferably derived from a frame-based system. A frame system is a network of frames and relations, corresponding to the nodes and links of a mathematical graph. Frame systems are organized in a hierarchy in which the high- level frames represent more general concepts and the lower frames represent more specific concepts. At the lowest levels, the frames represent instances of those concepts. The concept at each frame is defined by a collection of attributes or properties which can have values and, in this respect, the frames and attributes in a frame system are comparable to the records and fields in a database system. Each attribute can have a descriptor associated with it to define the constraints on the values the attribute accepts. Each attribute can also have procedures or programs called daemons attached to it which are executed when the value of the attribute is modified. In such a system, a frame can inherit the attributes or properties of higher level frames.
A preferred embodiment of the present invention uses a frame-type representation in an object-oriented organization in which the frames represent objects. More specifically, the frames representing general concepts are referred to as classes and those representing specific occurrences of a concept are referred to as instances. In this context, attributes are termed members, and member inheritance and procedural attachment take place as in a frame system.
In object-oriented systems, however, objects communicate with one another by sending and receiving messages. When an object receives a message, it consults its pre-defined answers for messages to decide on what action to take. These answers can be stored directly with the object or inherited from a higher level object somewhere in the network hierarchy. Usually, the action involves triggering some rules, executing procedural code, or sending new messages to other objects in the system. Similarly to the display platform user interface representation structures 118, the application user interface representation structures 116 store descriptive information representative of the different objects that compose a user interface. Each object is described by a structure comprising a plurality of fields containing information representing an attribute of that object or a relationship between the object and another object. The user interface engine 117 maps each of the different objects that compose the user interface of a given application into the corresponding representations 118 in the user interface display platform 115 of choice for that application.
On the one hand, the user interface engine 117 requests application user interface representation structures 116 from the business process layer 120. Once the business process layer 120 satisfies the request, the user interface engine 117 converts the application user interface representation structures 116 just received into user interface representation structures 118 that are expected by the user interface display platform 115 for display to the end user on a display station 111. On the other hand, when the end user performs an action through the display station 111 , such as selecting an item or modifying information, the user interface engine 117 translates that user request from user interface display platform representation structures 118 into the corresponding application user interface representation structures 116, which are then handed to the business process layer 120 for execution of the end user request. FIG. 5 is a schematic diagram of a sample mapping between application user interface representation structures 116 and display platform user interface representation structures 118. In the figure, the user interface display platform 115 is exemplified as Microsoft Windows 3.x and the display platform user interface representation structures 117 are thus the internal Windows 3.x management structures. However, other user interface display platforms 115 using similar internal structures to manage windows are supported by the exact same user interface engine 117. Notably, the internet's world-wide web, based on the HTML or Java user interface languages, is another example of user interface display platform 115. Indeed, in a preferred embodiment of the present invention, the user interface engine 117 is written using Microsoft Visual C + + and based on the industry-standard Microsoft Foundations Classes (MFC) class library, which allows cross-platform development for Windows 3.x, Windows 95, Windows NT, MacOS, and UNIX-based user interface display platforms 115, including internet web servers.
FIG. 6 is a block diagram of the operational modules of the user interface engine 117 of FIG. 4. The user interface engine 117 includes an initialization module 117-1 , a user input module 117-2, and a state router communications module 117-3. During initialization, the user interface engine 117 first initializes its initial state, setting up any structures necessary for operation. Depending on the implementation, the user interface engine 117 can then initialize communications with the business process layer 120, receiving a client identification number. Depending on the implementation, the user interface engine 117 can also display an initial application menu or screen, initial objects that are provided by the business process layer 120.
After completing the initialization, the user interface engine 117 continues to the user input module 117-2. The user interface engine 117 waits for user input and processes it accordingly. In particular, the user input module 117-2 handles interactions with GUI objects and performs application-dependent actions in response to user inputs.
If the user performs an action that depends on remote processing, however, processing continues to the state router communications module 117-3. In the state router communications module 117-3, the user interface engine 117 creates outgoing application user interface representation structures 116 from the screen data and packs these structures for delivery to the business process layer 120. Typically, the outgoing application user interface representation structures 116 contain values of screen fields which have changed since the previous call to the business process layer 120. The packed application user interface representation structures 116 are then sent to the business process layer 120, which returns packed application user interface representation structure 116 describing the result of the transaction. The packed application user interface representation structures 116 returned from the business process layer 120 are then unpacked and processed. Error messages can then be displayed, the screen can be updated with the results of the transaction, or a new screen can be shown. As long as the business process layer 120 does not indicate a fatal error, the user interface engine 117 processing continues (resumes the wait for user input) at the user input module 117-2 until the user exits the application. Most of the user interface engine 117 processing occurs in the handling of screens: building a screen from a description, processing application-updated values from the business process layer 120, and sending user-updated values to the business process layer 120. If a new screen is sent from the business process layer 120, the current screen is discarded and replaced by the new screen. Communication with the business process layer 120, and more specifically its main state router component (described below), is always initiated by the user interface engine 117 because a remote procedure call (RPC) mechanism which interfaces the user interface engine 117 with the business process layer 120 is preferably unidirectional and synchronous. To simulate asynchronous communication using a unidirectional synchronous RPC model, the user interface engine 117 includes an ability to periodically poll the state router for messages during the user interface engine's 117 idle time, namely when there is no user input to be processed. This functionality is known as idle message polling.
Essentially, during idle message polling the user interface engine 117 queries the state router for any initial messages. At the start of an interactive application, a first screen needs to be displayed to the user. This screen is usually a sign-on, or logon, screen which contains fields for the user identifier and user password, with possibly peripheral buttons to change the user password and access help screens. In addition, other graphics, such as an application logo or wallpaper, might be decorating the screen. After these initial messages have been processed, resulting in the display of the logon screen, application menu, and other object for the user to act upon, the user interface engine 117 waits to process user inputs. If the user takes no action and idle message polling is enabled, the user interface engine 117 will periodically query the state router for any messages. If message polling is disabled, the user input loop will continue indefinitely. Using a window mapping structure, which is preferably a two-way associative array, it is possible for the user interface engine 117 to allow window control handlers of the user interface display platform 111 to manage general window operation and make callbacks to the user interface engine handlers when an action is required, for example, when a button is pressed.
In a preferred embodiment of the present invention, the user interface engine 117 can process any type of action from any type of screen object, e.g. a button being pressed, a control gaining the input focus, or the Tab key being pressed. Typically, when an action is performed, one of two things may happen: the user interface engine 117 performs some internal function based on the action, or sends information to be processed back to the business process layer 120. In a particular preferred embodiment of the invention, all actions are referred back to the business process layer 120 for processing, along with any updated field values. FIG. 7 is a schematic diagram illustrating the business process layer 120, functionality layer 130, and data access layer 140 of FIG. 1. In a preferred embodiment of the invention, these layers can be hosted on similar platforms. In a preferred embodiment of the present invention, these platforms include a host processor 132, in which the various engines are resident, internal or external storage 134, on which the logic or data access server runtime environment resides, and a terminal console 136 which serves as a human interface for host administration puφoses. In addition, a communications controller 138 such as a LAN controller, modem or similar device serves as an interface to a communication link. The host computer system 132 can be considered conventional in design and may, for example, take the form of a E55 workstation, manufactured by Hewlett Packard Coφoration. As shown, the business process layer 120, functionality layer 130, and data access layer 140 further include a printer 135 which can be used to provide a permanent record of application log files, reports, source code, or process objects and flows according to the present invention.
FIG. 8 is a block diagram of the business process layer 120 of FIG. 1. The main component of the business process layer 120 is a state router 122. Conceptually, the state router 122 receives requests from the user interface engine 117 (FIG. 4) and, based on the request, determines which actions to take. The state router 122 then calls upon the functionality layer 130 to perform the selected action, passing any required information. Upon completion of the action by the functionality layer 130, the state router 122 accepts any resulting return information and forwards it to the user interface engine 117.
The requests received from the user interface engine 117 include application user interface representation structures 121. The application user interface representation structures 121 include request identifiers, transaction codes, screen information, and input/output buffers. A request identifier is the name of a function that needs to be executed in response to the request. There is one request identifier for any user interface event caused by the user. In this regard, request functions are similar to the conventional callbacks found in GUI languages such as X-Windows developed at the Massachusetts Institute of Technology, in Cambridge, Massachusetts. Transaction codes are used to determine where to redirect the request. In this view, the state router 122 is simply a switch that differentiates between request identifiers and takes appropriate action in the form of a call to a function of the functionality layer 130. Screen information is used to keep track of the current state of the application. Input buffers are used to carry information from the presentation layer 110 to the business process layer 120 and output buffers are used to carry information from the business process layer 120 to the presentation layer 110. FIG. 9 is a flow diagram of the communication mechanism between the user interface engine 117 and the state router 122. As depicted, the user interface engine 117 includes a user interface routine 117-6 and initiates the communication by calling a pass message function 117-8. The pass message function 117-8 first compresses the application user interface representation structures 116 to be transmitted into a single request string using a packing procedure. The request string compression performed by the packing procedure is necessary because the outgoing application user interface representation structures 116 cannot be transferred efficiently as such across the communication link.
The pass message routine 117-8 then calls a remote procedure call (RPC) routine 117-9 for actual transmission of the request string over the network. The RPC routine 117-9 takes two parameters: the request string to be passed from the user interface engine 117 to the state router 122 and the return string to be returned to the user interface engine 117 from the state router 122. From the point of view of the state router 122, requests arrive in the form of strings of characters that need to be decomposed into the logical components of the request. Consequently, the first step taken by the state router 122 is to decompress the request string into its logical components using an unpacking procedure.
The unpacking procedure converts the request string into an array of request application user interface representation structures 121. This array is then passed to a main state router 122-1 function, which accounts for the core processing of the state router 122. Routing logic 122-2 then directs the objects to servers in the functionality layer 130 or the database layer 140. Once the state router 122 completes its processing, the resulting array of return application user interface representation structures 121 is again packed into a return string, which is passed back to the user interface engine 117 using an RPC mechanism 122-9.
Because new application user interface representation structures 121 can be added to facilitate the transport of new types of objects as required by a particular application, the packing and unpacking functions include a library having primitives which pack and unpack bytes (8-bit integers), words (16-bit integers), double words (32-bit integers), and strings (both variable- and fixed-length). To create a new application user interface representation structure 121 , a developer need only create packing and unpacking routines for that structure, assembling these functions from the primitive routines.
In the preferred embodiment of the present invention, the packing and unpacking library is written in such a way that the same source code compiles using structures (under ANSI C) or using object classes (under ANSI C + +). Although the ANSI C language interface is very usable, the ANSI C + + language interface makes use of object-oriented features such as virtual functions to make packing and unpacking as transparent as possible. High-level packing and unpacking routines take arrays (or, in ANSI C + + , containers) of application user interface representation structures 121 and create a single character string containing the packed information suitable for RPC transmission. This string contains type information as well as member data, so that any sequence of application user interface representation structures 121 can be sent and properly reconstructed at the receiving end.
In a preferred embodiment of the present invention, the state router 122 can be used to access the functionality layer 130 having custom-developed functionality servers as well as functionality servers converted from the IMS/VS model. The IMS/VS model is centered around the message concept, where the term "message" is used to refer to the model's communication structures with the functionality layer 130. In a basic IMS/VS model, the state router 122 performs four main conceptual functions: log-on processing, IMS communication modeling, message conversion, and log-off processing. Log-on processing consists of checking the user authorization and issuing a client identifier. IMS communication modeling is decomposed into transaction routing, conversation management, and message formatting service. Transaction routing uses Input-Output Program Control Block (IO-PCB) and Alternate Program Control Block (ALT-PCB) IMS structures to route calls and messages between programs. Conversation management uses an IMS Scratch Pad Area (SPA) to store the processing context. Message formatting services uses Message Input Descriptor (MID) and Message Output Descriptor (MOD) IMS control blocks to format messages and screens. Message conversion performs message packing and unpacking. Log-off processing performs clean-up functions with commit point processing.
FIG. 10 is a flow diagram of the operations of a particular preferred state router 122 of FIG. 8. Initially, when a logon request is received from the user interface engine 117 through the request user interface structure 121a and then authorized, the state router's 122 internal state is initialized with the current transaction code and the identifier of the first message. This message identifier is used to retrieve the full message format from a database repository 152. This process will be discussed in further detail below.
The full message is placed in a message structure 122a. Among other pieces of information, a message format 122a- 1, 122a-2 provides the identifier of the related screen as well as the identifier of the next message. The screen information associated with this screen identifier is then loaded from the database repository 152. This screen information is passed back to the user interface engine 117 through the return application user interface representation structures 121. The user interface engine 117 then displays the screen and awaits user input. When a users enters or changes data on a screen and presses a function key, the user interface engine 117 translates this user input into a request to the state router 122. Based on the contents of the request, the state router 122 saves its internal state into an old-state structure, and the current state is then updated with any new field values from the user interface engine 117. State information is represented by a field state structure 122b. Then, the state router 122 determines which functionality server to call.
As mentioned previously, the request identifier, which describes a function to be executed, is included with the request from the user interface engine 117. The state router 122 verifies the user's authorization to perform this function, and if authentication is successful, proceeds with its processing. If unsuccessful, an error condition is set, and the user is informed of an illegal access attempt. Assuming that authentication is successful, the determination of which functionality server to call is followed by a preparation of the message to be used for communication between the state router 122 and the selected functionality server, using a prepare to send message function 122c to build one or more messages to be put on the top of the outgoing Message Format Service (MFS) message queue 122d.
For an MFS-aware functionality server, the message is built as follows. Each field in the message, assuming field length n, is allocated n bytes in the message at a predefined offset. Additionally, a field may have two additional bytes allocated to it for passing the field's attribute in the message. A field's value is placed in the message if either of the following conditions holds: if the field's value has changed (which is determined by comparing the value of the field in the current state to the value of that field in the previous state), or if the field's attributes specify that its value should always be placed in the message regardless of whether it has been modified (this attribute is known as "pre-modified"). If the space in the message for a field value placed in the message exceeds the length of the field value itself, the allocated space is padded with the pad character specified for that field. Finally, if a field's value has not been modified, and the pre-modified attribute is not set for that field, its space in the message is filled with '@' characters. When all fields in the message have been considered, the message is complete. The message is then sent to the functionality server designated to handle the current transaction code.
The SPA 122e is provided as a functionality server- independent area of memory used for inter-functionality server communication. The SPA 122e is either newly-initialized, upon the first communication with the functionality server, or returned from the previous call to the functionality server.
When the call completes, a pointer is returned to the incoming MFS message queue 122f, where the functionality server placed one or more messages for transmission to the state router 122. The returned information includes an auxiliary buffer, a MOD structure, a SPA, and field value information similar to that of the message passed from the state router 122 to the functionality server. The auxiliary buffer specifies the name of the MOD structure. The MOD structure contains either a message identifier to describe the next message for updates to the current screen or a transaction name to initiate a switch to a new screen. Upon receipt of this information, the state router 122 first determines whether the MOD structure contains a transaction or a message. If a transaction is present, indicating a screen switch, the new screen information is loaded from the database repository 152, and its information is included in the return application user interface representation structures 121b destined for the user interface engine 117. The state router 122 then recalls the functionality server that corresponds to the new transaction in what is called an "immediate switch". On the other hand, if the MOD structure contains a new message name, the state router 122 retrieves the new message format from the database repository 152 and passes it to a prepare to receive message function 122g, along with the incoming MFS message queue 122f. This function updates the structures and processes the return message in a manner similar to the processing of the request message. Notably, new values and attributes are entered into the state router's 122 internal state. The attributes returned with each field specify whether the field is to maintain its old value, revert to its original attributes, or clear its value. The new values and attributes are then included in the return application user interface representation structures 121 array passed back to the RPC mechanism for return to the user interface engine 117.
The above description of the state router 122 operations focused on the case of communication with functionality servers converted from the IMS/VS environment. In the case of custom functionality servers, the state router 122 still processes requests received from the user interface engine 117 in response to user interface event caused by the user in manner similar to that described earlier. However, much of the ensuing IMS/VS message processing can be bypassed in favor of a more generic mechanism embodied in the usage of a business process engine 124.
In this custom model, the state router 122 still redirects processing to appropriate functionality servers based on the transaction codes received from the user interface engine 117. However, when the functionality server returns, it passes back an event to the business process engine 124 component of the state router 122. The business process engine 124 is an event handler implemented as a conventional non-deterministic finite automaton (NFA).
By way of background, an NFA is a mathematical model that consists of a set of states, a set of input symbols, a transition function that maps state-symbol pairs to sets of states, an initial state, and a set of final states. A special case of NFA is the deterministic finite automaton (DFA), which can have no unlabelled edges and at most one edge with the same label leaving a given state. Where time- space tradeoffs are an issue, an NFA is slower than a DFA but consumes much less space. In any event, an NFA and a DFA are both appropriate representations for real-life business processes. Furthermore, an NFA can automatically be converted into a DFA using fundamental principles of state machines and finite automaton theory. Consequently, which representation is used is of little consequence to a preferred embodiment of the business process engine 124. In addition, because business processes can be composed of a series of unrelated processes or can even be decomposed into sub-processes, more than one NFA, possibly organized in a hierarchical fashion, can be used to represent the various business processes modeled by an application.
In any case, the business process engine 124 preferably implements an NFA as follows. Upon receiving an event from the state router 122, the business process engine 124 first checks the validity of the event. If the event is valid, the business process engine 124 then examines all transitions out of the current state, which could be the initial state if this is the first call to the business process engine 124. If the business process engine 124 does not find a transition that corresponds to the event received from the state router 122, it simply remains in its current state, releasing control back to the state router 122. On the other hand, should the business process engine 124 find a transition that includes the event received, the current state is saved and the next state is derived by starting at the current state and following the transition corresponding to the event received. The next state thus reached now becomes the current state. Because states include initialization routines, the business process engine 124 executes any initialization routine associated with the next state immediately upon arrival at this next state. This initialization function can require another transition followed by another change of state, and therefore the business process engine 124 ends its processing by calling itself recursively, based on the event returned by the initialization function.
A complication can occur when a transition leads to a state that is not part of the business process modeled by the current NFA. In this instance, the business process engine 124 needs to switch to the NFA containing the next state. For this puφose, the business process engine 124 also maintains a current business process set. This enables the business process engine 124 to keep track of its position in the business process or NFA hierarchy.
FIG. 11 is a block diagram of the functionality layer 130 of FIG. 1. Conceptually, the functionality layer 130 manages the business objects manipulated by the business process layer 120. These business objects constitute the fundamental components of an application. In a traditional manual system, a business object is associated with one or more physical paper forms. These forms contain the fields that hold the information relevant to the business object. Forms differ not only in their physical appearance, but also in the rules that govern their use. For example, a highly confidential form is treated differently from a non-confidential form. Other business rules may also govern the handling of forms. For example, some invoices might require more than one signature if their amount is bigger than a certain value. It is the form and the rules that govern its handling that define a business object in a traditional manual system.
The business objects represent the physical forms, the information in those forms, and the rules that govern these forms. As discussed previously in the context of a re-engineering or custom-developed application, the business process engine 124 of the business process layer 120 manages the flow of business objects, inteφrets their rules, and acts on these rules.
In a preferred embodiment of the present invention, the functionality layer 130 must also be able to handle IMS/VS COBOL functionality code. In IMS, functionality codes are structured into transactions composed of a main program called a driver and transaction programs for the various function keys the driver handles. Accordingly, a functionality server 135 performs a number of functions.
These functions comprise include file processing, server initialization, transaction call resolution, transaction entry point processing, and server wrap-up. Include file processing comprises initializing global variables, notably the Program Specification Block (PSB) structures for each transaction. By way of background, a PSB defines, for a given transaction, the database which may be accessed, the database segments that are available, and the type of access (read, update, etc.) which may occur. A PSB is also a collection of Program Communication Blocks (PCB). A PCB is an IMS structure to control the access to data as will be described in detail below.
Server initialization comprises unpacking the message received from the state router 122, to obtain the SPA and its call parameters, and assigning local function pointers. An additional level of indirection for each transaction program main routine is necessary for ANSI C to mimic the COBOL "goto" capability to span across routines and exit at any point in the program.
Transaction call resolution comprises determining the driver to call based on the transaction identifier specified in the RPC received from state router 122, associating the appropriate PSB structure obtained from the include file with the selected driver, and calling the driver with its arguments. Once in the driver code, control flows according to defined COBOL language principles. Two COBOL constructs merit further description in the context of ANSI C functionality code converted from COBOL, namely special routines called entry points and COBOL variables.
Transaction entry point processing comprises performing calls to transaction entry points in the converted COBOL functionality code. Transaction entry points include routines to perform calls to various local (sub) routines or external COBOL library routines, as well as routines to establish communication with the data access layer 140 (ENTRY statement) and perform calls to the database server/IO devices (CBLTDLI). A typical database access consists of an initial GET call to populate the I/O work area, followed by modifications to the I/O work area for subsequent insert (ISRT) or replace (REPL) calls. After each database access, the return status of the call is checked to take action based on the result of the database operation. In a preferred embodiment of the invention, COBOL variables are implemented as COBOL structures. A COBOL structure contains a data field, which consists of a pointer to an area in memory used to store the value of the variable. Another field stores the length of this data memory area. The COBOL structures also contain a mask, which is a string describing the COBOL format specification for the variable. For example, a mask of "PIC X(3)" refers to a string of 3 characters. Sometimes COBOL variables exist in a hierarchy of other COBOL variables. Consequently, the COBOL structures also contain the number of sub- variables or sub COBOL structures in the current variable or COBOL structure hierarchy. A COBOL structure variable can thus be viewed as pointing to a buffer containing its data, all sub COBOL structure variables pointing to the proper offsets in that buffer.
The last function performed by the functionality layer 130 is server wrap-up. Server wrap-up includes preparing return data, notably packing the SPAM for return to the state router 122.
FIG. 12 is a block diagram of the data access layer 140 of FIG. 1. The data access layer 140 comprises a number of data servers. As mentioned previously, the data servers are used to access and retrieve data from the data storage layer 150. Preferably, one data server exists for each of the four application object repositories. Consequently, there is user interface data server 141 to manipulate user interface objects 142, a business process data server 143 for business processes 144, a business object data server 145 for business objects 146, and a database server 147 for application data records 148. The data servers constitute the sole interface between the data storage layer 140 and the functionality layer 130, and each data server is only in charge of exchanging with the functionality layer 130 information about the type of application object it services.
According to client/server technology, a server is any program that runs a function invoked by a different program. A server is thus a software concept that provides a way to package together a set of related functions. Consequently, it could be implemented as a conventional third generation language sub-routine or library.
In the present invention, a number of the components referred to as libraries can be implemented as servers and vice versa. The server implementation, however, is better suited to inter-platform communication, and is a preferred embodiment for the communication links of the present invention.
By way of background, servers can be left to run continuously in stand-alone mode and accept requests from multiple clients. The set of functions, or services, provided by a server constitutes the server interface. This interface is specified in an Interface Definition Language (IDL) file. The concept of servers is well known, and details of server development and operations, including stub generation and IDL file syntax and specification are commercially available.
The data access layer 140 can now be viewed as a set of database access and retrieval functions. There is one function for each one of the data access construct of the source Data Base Management System (DBMS). Each such function must emulate the behavior of the corresponding source DBMS data accessor construct. In the preferred embodiment of the present invention, the target DBMS is typically based on a conventional relational model, and is called a Relational DBMS (RDBMS). The source DBMS can be built around a number of conventional data models. The most common such models are the flat file, hierarchical, network, CODASYL, relational, and object-oriented data models.
By way of background, the flat file model is a generalized file management system that adds report generation and file management additions to third-generation programming languages such as COBOL. An example of such as model is the Report Program Generator (RPG) from International Business Machines,
Incoφorated. The hierarchical model is a hierarchical tree of nodes made of records and fields, with tree search capabilities. An example of such a model is IMS Data Language 1 (DL/1). The network model is an extension of the hierarchical model, where nodes may have more than one parent. The network model is also referred to as CODASYL, which is the initial embodiment of this model using owner and member records linked by pointers, as originated by Honeywell Information Systems, Incoφorated. Examples of the network model are Integrated Data Store (IDS) from IBM, and Integrated Database Management System (IDMS) from Cullinet, Incoφorated. Given the fundamental differences between these models, the data access library must be careful to map the semantics of the source database to the appropriate constructs in the target database.
In its simplest form, this mapping results in a simulation of the source DBMS in a relational model, which is not always ideal for readability and maintainability. A preferred embodiment of this invention extends this mapping to a true conversion of the source data model to the relational data model. The initial relational model thus obtained is further normalized to a specified degree controlled by parameter using a bacchus-normal form utility, leading to a true relational model. In the context of the present invention, such libraries exist for all the common source data models mentioned. Because an overwhelming majority of existing database systems fall into one of the source data models above, it is likely that most existing applications can be handled by one of these libraries with minor or no changes.
In a preferred embodiment of the present invention, the source DBMS is IMS DL/1. As discussed previously, IMS functionality code is structured into transactions composed of a main program called a driver and subprograms for the various function keys the driver handles. For every such IMS transaction in the functionality server, an entry function is called once to initialize the database server. This entry function calls a database server function through an intermediary to initialize the PCB structure in the database server. Then, every time the functionality server needs to access the database server, it calls the function CBLTDLIO, which in turn calls a database server function to call the appropriate database function (e.g. , GET, INSERT, DELETE, and REPLACE primarily). Communication between the functionality server and the database server is thus reduced to two functions: init and CBLTDLI (which, in IMS, stands for CoBoL To Data Language 1). The main function of a database server is to fulfill requests for data from the functionality server 135. In the preferred embodiment of the present invention, this includes implementing the IMS DL/1 CBLTDLI call. This can be decomposed into three tasks: server initialization, CBLTDLI call resolution, and database access function execution. As discussed earlier, server initialization is performed on the PCBs for the current transaction. Then, the database server resolves CBLTDLI database calls.
The database server communicates with the database through ANSI SQL queries. The database server implements each type of IMS DL/1 function as follows. The database server first validates the arguments to the IMS DL/1 function. It then dynamically creates an ANSI SQL query string. In the preferred embodiment of the present invention, this query string is forwarded to the database using the Oracle Call Interface (OCI) from Oracle Coφoration. At a high-level, the process consists in initializing bind and define variables, setting currency information, executing the SQL query, and returning query status. FIG. 13 is a block diagram of the data storage layer 150 of FIG. 1. The data storage layer 150 is a repository for data accessed by the data access layer 140. The user interface data repository 152 provides user interface objects 153 to the data access layer 140. The business process data repository 154 provides business processes 155 to the data access layer 140. The business object data repository 156 provides business objects 157 to the data access layer 140. The application data records repository 158 provides data records 159 to the data access layer 140.
FIG. 14 is a schematic diagram of a hardware platform for the data storage layer 150 of FIG. 19. As shown, the data storage layer 150 is hosted on a platform that includes a host processor 151 , with one or more Central Processing Units (CPU), in which the Data Base Management System (DBMS) is resident, internal or external storage 153, usually an array of mirrored disks, on which all database data resides, and a terminal console 155 which serves as a human interface for host administration puφoses. DBMS log files are stored in storage unit. A printer 157 is usually present for database diagnostics or large data outputs. In addition, a LAN controller, modem or similar device serves as a communication link 159. The
DBMS and the host computer system 151 can be considered conventional in design and may, for example, take the form of an Oracle relational DBMS, manufactured by Oracle Coφoration, and a T500 mini-computer, manufactured by Hewlett Packard Coφoration respectively. A preferred embodiment of the present invention uses the relational data model for the data storage layer. The relational data model can be viewed at three different levels: conceptual, logical, and physical. The conceptual level consists of entities, attributes, and relations. Entities are things that exist on their own, distinguishable from other objects. Entities (records, rows) are described in terms of their attributes (fields, columns). Relations are common fields between entities used to connect entities together. The Entity-Relationship data model (ER) is the predominant conceptual level description tool. It is used as a diagramming technique where rectangles represent entities, circles represent attributes, diamonds represent relationships. The logical level consists of records, fields, and relations. The schema is the logical level description tool. In the relational model, a database schema consists of the description of the tables, their fields, and the fields formats and domains. The relational algebra provides the theoretical basis for the model, with five operators: selection, projection (deleting columns from table), product, union (adding the rows of two tables), difference and a composite: join. Query languages based on relational algebra are Structured Query Language
(SQL) and Query By Example (QBE), both originated by IBM. SQL is usually embedded within a third generation language such as C, called the host language. Because host languages do not typically have multi-record operations, special SQL commands such as the cursor concept are provided to process multi-row query results in a record-at-a-time fashion. A cursor is a name given to a query. When a cursor is opened, the corresponding query is executed. Any subsequent fetch command on the cursor returns a new row to the host language. When the cursor is closed, query results are no longer available to the host language. Other special commands in SQL embedded mode include transaction processing features, dynamic SQL generation, and authorization control. The physical level deals with data dictionaries, data definitions (physical file structures, file space allocation), storage devices (data compression), access methods (sequential, index-sequential, direct). Sequential files use a sorted column to perform sequential search. Index- sequential adds an index to a given column to provide random access. Large indices may themselves be indexed. Sequential files are difficult to maintain because adding or deleting a record requires reorganization of the whole file. Indexed (inverted) files remove the sequential part. Fully inverted refers to indices associated with each column. Indices carry update overhead but enable fast access. Direct access uses a single key and a calculation from that key to locate the physical address of the data in memory. The distribution discussed in the context of the present invention is reduced to process distribution. However, the data storage layer can also be distributed among different platforms. A decision on how the data can be distributed depends on the following four criteria: connectivity, volume, volatility, and usage. The inter-connectivity of the data is defined by the relations between entities. The volume or size of each entity is evaluated in terms of memory usage as well as number of records. The volatility is the rate of change in the volume of each entity. Finally, the usage is determined by the frequency of use of the various screens and the transaction rate. FIG. 15 is a block diagram of the control layer 160 of FIG. 1. The control layer 160 includes utilities for transaction management 161 , security 162, system administration 163, server management 164, accounting 165, network management 166, and configuration management 167. These utilities can take the form of libraries or can consist of graphical user interfaces. Transaction management 161 provides library utilities to manipulate transactions. Transactions are a way to package related application elements together. Transaction processing refers to the manipulation of groups of elements as opposed to the manipulation of the individual elements. A transaction that successfully completes the processing of all the elements that compose the transaction is finalized by a database commit, which saves the results of the processing of all its elements in a permanent form, usually in the database. Should the processing of one of the transaction elements fail, the transaction elements that have already been committed to the database need to be un-committed, and the whole transaction is rolled back, with appropriate error messages posted. Transaction management 161 is useful in distributed systems to insure data consistency in the absence of user-defined integrity constraints.
Security 162 is provided at all layers of an application through a library of functions to manage system as well as data security. At the presentation layer level 110, security functions are available at logon time and at the menu, screen, field, and button levels. At the functionality layer 130 level, access to entire servers or to a subset of the services provided by a server can be restricted. At the data layer 140 level, security functions manage access control lists (ACL), which enable application administrators to set up a hierarchy of user types for controlling access to application resources. In addition, the underlying database management system usually provides a wide range of security features which are implicitly available to the application.
System administration 163 provides graphic facilities for administrators to perform basic application administration tasks, such as lookup table maintenance, user access maintenance, and application backup and recovery. Server management 164 provides mechanisms to organize servers in a hierarchical model in which entities called brokers keep track of the servers available to a given client and of their location. This can increase the robustness of applications through server redundancy.
Accounting libraries 165 are available to perform logging of application operations at all application tiers for performance monitoring, auditing, or error tracing and recovery. Logging is also available on a per client, server, or broker basis. Logging can come in various flavors, with control over the level of detail provided or the application resource or component being monitored.
Network management 166 provides a graphical interface to monitor clients, servers, and brokers. Network traffic and performance can thus be monitored, and network components restarted automatically or manually upon failure.
Configuration management 167 provides libraries for a number of diverse puφoses. For instance, application version management functions are provided. In addition, currency is handled through locking functions to insure data consistency. Data integrity is controllable at the functionality layer by the business objects rules or constraints. The underlying database management system usually provides data integrity controls implicitly available to applications, but the usage of such controls are not recommended because it would mean encoding business logic in the data layer 150 instead of confining it to the functionality layer 130, and would therefore be contrary to the fundamental principle of the preferred multi-tiered architecture. Communication links 170 are used by the other components to exchange information by the way of computer networks. By the way of background, computer networks consist of interconnected collections of autonomous computers. Networks are usually described in terms of the well known International Standards Organization (ISO) Open Systems Interconnection (OSI) reference model. ISO OSI describes networking in terms of seven layers, from lowest to highest: physical, data link, network, transport, session, presentation, and application.
Because distributed systems are a special case of a network that is transparent to the application, the present invention can rely on any one of the prevalent networking standards. For example, using ISO OSI terminology, one embodiment of the present invention can be based on the internet de facto standard. At the lowest physical and data link levels, a preferred embodiment of the present invention can be a standard communication media, such as a telephone network, local area network (LAN), wide area network (WAN) or direct line. The Internet Protocol (IP) can be used as the network protocol and the Transmission Control Protocol (TCP) as the transport protocol. Session and presentation layers do not exist in the internet model. Application protocols include FTP for file transfer, SMTP for electronic mail, and TELNET for remote login.
Because distributed applications are network transparent, the distinction lies in the software. Therefore, the preferred embodiment of the present invention uses commercial tools that hide all of the underlying network complexities and isolate applications from network implementations. These tools are based on the Remote Procedure Call (RPC) operating over TCP/IP or over the Distributed Computing Architecture (DCE) mechanism. Using an RPC, a client program performs what looks like a conventional function call. A piece of RPC generated code called a client stub handles all the aspects of handling the call, including packaging the function arguments for transport, called marshaling, and carrying out the transport.
On the server side, a similar RPC server stub unpacks the function arguments, called unmarshaling, and passes them to the server code that implements in a conventional way the function requested by the client. Upon completing the execution of the requested function, the server returns the results of the call to the client in a similar way. Because all transport complexities are addressed by the RPC generated stubs, RPCs acts just like conventional local calls.
For more complex distributed applications, a preferred embodiment of the present invention can use tools based on DCE, which is a more comprehensive distributed system infrastructure that includes directory services, distributed security, multi-threading, distributed file system, and central time management, in addition to RPCs. As sample implementation of RPCs effective over both TCP/IP and DCE networks, is the Entera toolkit from Open Environment Coφoration. Returning to FIG. 1, the re-architecting system 20 includes a user interface conversion utility 210, a procedural language conversion utility 220, and a data definition language conversion utility 230.
FIG. 16 is a block diagram of the user interface conversion utility 210 of FIG. 1. The user interface conversion utility 210 converts the user interface of an existing application represented by the source user interface definitions 211 into target user interface definitions 213 using the user interface converter 212. In a preferred embodiment of the present invention, the source user interface definitions 211 can be viewed as IMS/VS Message Format Service (MFS) files.
Screen definitions provide structural information about the fields that compose the screen layout. Message definitions provide content information about the fields, such as the data they contain and their attributes (protected, highlighted, etc.).
Target user interface definitions 213 can take one of three forms: database files 246, a header file 247, and a GUI file 248. Database files 246 contain the set of statements necessary to populate user interface repository 152 with screen and message information for MFS file 211. In a preferred embodiment of the present invention, the database files 246 can be viewed as ANSI SQL scripts.
A deletion script removes from the user interface repository 152 any definitions for the MFS file 211. Once this repository cleanup is accomplished, an insertion script adds to the user interface repository 152 any new definitions for the MFS file 211. Consequently, the user interface conversion utility 210 can be run multiple times for the same MFS file without negative effects. In a preferred embodiment of the present invention, the user interface repository 152 is a standard RDBMS such as Oracle Server 7 from Oracle Coφoration. Information stored in the user interface repository 152 is converted at application runtime into the user interface representation structures of the presentation layer 116. The user interface engine 117 of the presentation layer 110 then maps application user interface representation structures 116 into display platform user interface representation structures 118, used by the user interface display platform 115 for display to the user. Accordingly, target user interface definitions 213 effectively constitute an intermediary user interface definition language for storage of user interface information in the user interface repository 152 and eventual user interface representation structures 118.
Header files 247 are an alternative to database files 246. In a preferred embodiment of the present invention, user interface representations are stored in the user interface repository 152 and retrieved as needed from this repository by the business process layer 120. This is an appropriate mode of storing a large amount of user interface representations on a back-end database host, thus alleviating performance and space constraint problems on the client or business process hosts. However, for smaller applications, user interface representations may not need to be stored on a separate user interface repository 152. Accordingly, a user interface converter 212 can generate a header file 247 instead of database files 246.
Such a header file 247 is then passed to the business process layer 120 to provide information necessary during application runtime operations. In this scenario, the header file 247 can be viewed as declarative statements in ANSI C that are compiled as part of the source code for the business process layer 120.
GUI files 248 are used by application developers and maintenance personnel to modify application screens and messages as part of the re-engineering system 30. In a preferred embodiment of the present invention, the GUI file 248 are written in Microsoft Visual Basic. The application re-engineering process 30 then uses the GUI file to load screen information in Visual Basic, which can be viewed as the graphical user interface editor 310, make any modification in Visual Basic, resulting in a modified GUI file, and then run a Visual Basic to Oracle conversion process as described regarding the graphical user interface editor 310 to load the modified GUI file into the user interface repository database 152, ready for usage by the application.
The user interface conversion utility 210 calls the user interface converter 212 to generate the "target" representation just described. In a preferred embodiment of the present invention, the user interface converter 212 is an ANSI C program, which takes a MFS file as an input and generates output files. To perform this function, the user interface converter 212 can be structured using conventional compiler technology, including a scanner 241 , a parser 243, and a code generator 245.
Specifically, the scanner 241 reads characters from the MFS file until a token has been read. The scanner 241 adds the token just obtained to a symbol table in which all the identifiers of the source language are stored, along with their characteristics. The tokens are then passed to the parser 243.
The parser 243 can be viewed as a function that parses the statements of the source language. In this context, the delimiter that enables the user interface converter 212 to determine when the end of a statement has been reached is defined by the particular syntax of the source. Once a statement has been parsed, the parser 243 calls another function, which returns the type of the statement that has just been parsed. This type is then passed to the code generator 245.
The code generator 245 can be viewed as a large switch that, given a statement type, calls the appropriate function to generate "target" code for this statement. The code generator 245 relies on a library of functions that handle the actual code generation for the entire set of statements of the source language. One such library exists for each source language, with ANSI SQL, ANSI C, and Microsoft Visual Basic as the target languages. FIG. 17 is a flow diagram of the procedural language conversion utility 220. The procedural language conversion utility 220 converts the functionality and data access programs of an existing application into the programming language targeted for the implementation of the functionality layer 130 (FIG. 1). This conversion process consists of two main phases. A first phase (Phase A) converts the source language 221 into an intermediary language 225. A second phase (Phase B) then transforms the intermediary language 225 into the final target language 227.
The first transformation is executed by a first phase (Phase A) transformer 224, customized for each source language environment 221. The intermediary language 225 is a meta language designed to facilitate application maintenance. The meta language is independent of source and target languages and supports the use of an independent data dictionary 228. The data dictionary 228 generation is preferably achieved through the use of data population tools 223, which use constructs in the source code and related data files. The meta language is used as the target for the conversion of numerous source languages, and in turn can be transformed into multiple different target languages. The meta language is converted to a target language using a second phase (Phase B) transformer 226. There is a specially customized second phase transformer program 226 for each target language environment 227. The procedural language conversion utility 220 as a whole is applicable to batch as well as on-line applications.
FIG. 18 is an exemplary source code fragment 221'. As illustrated, the source code fragment includes assignment statements 221 -A, 221-C, 221-E, 221-F, 221-H, conditional-branch statements 221 '-B, 221 '-G, 221 '-J, 221-K, 221-M, jumps, 221-D, 221-L function calls 221-1, 221-N, and labels 221-0. The assignment and conditional branch statements can use variable values or literals.
FIG. 19 is a block diagram of the first phase transformer program 224 of FIG. 17. As shown, the main elements of this transformer are a grammar definition for the source language 251, a dynamic symbol table generator for the source language 252, and a number of rules 253 for transforming a source language 221 to the meta language 225. In addition, an external data dictionary 228 contains the data structures, definitions, and common logic constructs pertaining to the source application.
In terms of control flow, the first phase transformer 224 receives a file of source language code 221 as input. This file is then semantically parsed using the source language grammar definition 251. A full grammar for the source language is specified using a programmatic grammar encoding scheme.
The symbol table 252 is dynamically generated during parsing based on data definitions found in the source code 221 as well as in the data dictionary 228. All relevant data (i.e. non-procedural) elements found in the source code 221 are incoφorated into the symbol table 252, while irrelevant elements are discarded based on source language grammar 251. The symbol table 252 is thus dynamically built to contain symbols for all data elements, data structures, data definitions and variables relevant to the source code file 221 being transformed. FIG. 20 illustrates in FIGs. 20A-20B a parse tree for the source code fragment of FIG. 18. As illustrated, the source code 221 is parsed into a series of statement lists 225. Each statement list includes at least one statement. A statement can include an additional statement list. For example, the first instruction 221-A (FIG. 18) is parsed into an assignment (ASSIGN) which assigns the variable (VAR) LOW- VALUE to the variable list (VARLIST) of variables (VAR) YMS-CALL- RESULT and FLAG-AREA. Each source language instruction 221-A,... , 221-0 of FIG. 18 is represented as a respective branch cluster 225-A, ... , 225-0 on the parse tree 225 of FIG. 20. The branch clusters are on branches 225-1 , ..,225-8 of the parse tree 225. From this representation, the source language is converted to the intermediate language.
Once parsing is complete, a complete set of rules 253 for transforming source language code to meta language code is programmed as declarative rules in a separate conversion routine 253. The conversion rules 253 operate as follows. A rule is applied to each source language construct parsed using the grammar 251. When a rule is executed, a source language construct is transformed to its equivalent construct in the meta language. Procedural constructs and primitives are thus re¬ generated in the meta language. Operations on data elements and data structures are first validated using the symbol table 252. Based on this validation, an equivalent operation is custom-generated in the meta language. The rule being executed for this validation operation generates a specific construct to reproduce the semantics of the transformed operation, such as a conversion from integer to floating point, if required.
In addition to procedural constructs and data elements and structures, a subset of the rules specializes in the extraction and transformation of external data access commands into application- independent external data access commands. In a preferred embodiment of the present invention, application-independent external data access commands could be encoded using the ANSI-SQL language. External data access operations are thus parsed and transformed into separate, application- independent data access commands. These generated data access commands are stored in at least one separate output file.
FIG. 21 is an intermediate language file 225' for the source code fragment of FIG. 18. The file 225' is created by traversing the parse tree 225 depth-first, left- to-right. A node is not output to the file 225' until all children are output. This technique results in a reverse polish or postfix notation. As illustrated, each branch 225-1 , ... ,225-8 of the parse tree 225 is represented as a statement 225-1 ' , ... ,225-8' in the file 225'. The trunk nodes of the parse tree 225 are represented as a terminal statement 225-9' .
In summary, executing the transformation rules on the source code produces two separate outputs: the transformed source code in a meta language, which is constituted of procedural source code and data definition structures, and a set of data access command.
FIG. 22 is a block diagram of the second phase transformer program 22 of FIG. 17. Similar to the first phase transformation, the main elements of the second phase transformer 226 are a grammar definition 261 for the meta language 225, a dynamic symbol table generator 262 for the meta language 225, and a number of rules 263 for transforming the meta language 225 to a target language 227. In addition, the second phase transformer program 226 uses the same external data dictionary 228 as does the first phase transformer program 224.
In terms of control flow, the second phase transformer 226 receives as input meta language program files 225, usually constituted by meta language procedural source code and data definition structures files, as well as data access command files, both generated by the first phase transformer 224. The meta language program files 225 are then semantically parsed using the meta language grammar definition 261. A full grammar for the meta language is specified using a programmatic grammar encoding scheme.
The symbol table 262 is dynamically generated during parsing based on data definitions found in the meta code 225 as well as in the data dictionary 228.
The data access command files portions of the meta language program files 225 provided as input are parsed using a different mechanism. Because this mechanism is a simplified version of the one used for procedural source code and because it is based on the exact same principles, it will not be detailed any further here.
Upon completion of parsing, a complete set of rules 263 for transforming the meta language code 225 to the target language code 227 is programmed as declarative rules in a separate conversion module 263. The conversion rules 263 includes rules for transforming meta language data definitions into target language data structures, rules for transforming meta language variable definitions into target language variables, rules for generating target language initialization routines for the data structures and variables mentioned above, rules for transforming procedural meta language source code into target language source code, and optionally rules for customizing the application-independent data access commands for a particular application such as Oracle. A rule is applied to each language construct parsed using the meta language grammar 261.
Language constructs include: data definitions, variable definitions, and procedural constructs. Data definitions in meta language code are transformed into target language data structures by executing a set of rules written for this puφose. Variable definitions in meta language are also transformed into target language variables by executing a set of rules written for that puφose. For each variable definition created, an initialization routine is created. Procedural constructs are transformed into their equivalent in the target language. Data access commands can be tailored for a particular application as required by the target environment. Executing the transformation rules on the meta language source code produces output files containing the transformed code in the target language: procedural source code files, data definition structure files, and final data access command files. The target source code 227 includes calls to specially designed and implemented libraries to support functionality that is not provided natively in the new target environment. These functions include variable handling, value assignment, data access services, transaction processing, and other. Depending on the target environment, different runtime libraries are required in order to guarantee correct execution in the new environment. The scope of these libraries is determined not only by the target environment, but also by the source environment. All source constructs must be mapped to equivalent constructs in the target environment.
FIGs. 23A-23B are C and C + + target code fragements 227', 227", respectively, for the source code fragment of FIG. 18. As illustrated, the intermediate language illustrated in the output file 225' of FIG. 21 is transformed into a select target language source code 227. The target language can be any procedural programming language (such as C) or any object-oriented programming language (such as C + +). As described, a different second phase transformer program 226 is used to generate source code in each target language.
Together with the transformation of the code to the target environment, the transformation process permits new data organization methods. If new methods are used to organize data, additional libraries might be required to achieve complete compliance with the original application behavior. An example of specialized library for IMS/VS data organization method was outlined above in the context of the data access layer 140.
In addition to the transformed code and required libraries, a runtime infrastructure must be provided for application execution. The infrastructure in question corresponds to the multi-tiered architecture 10 detailed above. Because the description of the architecture 10 focused on on-line programs, a number of key differences should be noted in its application to the batch components of applications. Batch-related code modules only interact with their calling process, eliminating the need to maintain a two-way communication structure with the user interface module and the accompanying state information in the business layer. Instead, re-architected batch processes are stand-alone programs constituted by a wrapper that provides means to parse the input arguments and call the top-level batch job. Typically, this top-level batch job requires some form of job scheduling infrastructure. As an example, legacy Job Control Language (JCL) can be converted to a scripting language-equivalent such as UNIX shell, Perl, or REXX. The resulting script then calls the various batch programs, interleaved with scripting commands or library calls that provide functionality that is similar to that of the source legacy system. In spite of these differences, batch conversion and processing follows the same fundamental principles as on-line, in a simplified manner. Consequently, a full discussion of the specifics of batch conversion and runtime execution will not be detailed any further.
FIG. 24 is a block diagram of the data definition language conversion utility 230 of FIG. 1. The database conversion utility 230 is used to convert a source database language 231 into a target database language 237 using a database converter 234. As illustrated, the conversion must address the database structure, encoded using a Data Definition Language (DDL), and referred to as a schema, as well as the database data.
In a preferred embodiment of the present invention, the target DDL 238 is a relational database schema specified using conventional ANSI SQL language. Such a schema defines the tables that compose an application, along with their key fields, and other descriptive fields. Initial values and other constraints such as referential integrity clauses may also be included in this schema. Because relational schemas are well understood, and ANSI SQL syntax is well-documented, the primary task of the DDL converter 235 is to map the syntax of source DDL 232 to the corresponding ANSI SQL syntax. In a preferred embodiment of the present invention, this "target" DDL 238 can be viewed as an intermediary language that can then be converted to the final target DDL language for increased maintainability and flexibility, as was the case with the user interface and procedural language conversion utility. For illustrative puφoses, IMS DL/1 can be considered as the source DLL 232.
FIG. 25 is a block diagram illustrating a schema conversion. As shown, the DDL converter 235 is sub-divided into a first converter 235a and a second converter 235b. The first converter 235a takes DBDxx 232a, DBDxxL 232b, and COPYLIB 232c as inputs and generates a table creation SQL statement file 238a, an index creation SQL statement file 238b, a primary key creation SQL statement file 238c, and a database schema ANSI C header file 238d.
By way of background, an IMS database schema depends on Data Base Descriptions (DBD) and COBOL copy libraries (COPYLIB). All IMS data bases must be defined through DBD generation prior to use by application programs. A DBD is the DL/1 control block that contains all the information necessary to describe a data base, namely segment types, physical and logical relationships between segment types, database organization and access method, and physical characteristics of the database. COPYLIB contains COBOL data structures definition and is used to create corresponding C structures and IMS segment definitions.
The first converter 235a generates a table file 238a, which is used to create tables in the target RDBMS. The table file 238a includes simple relational table creation statements, without indices, keys, or reference integrity. Consequently, it can be generated directly from COPYLIB 232c information, without any DBD input. For example, the COPYLIB entry for a segment is used to generate a corresponding relational table.
A relational table is build from an IMS segment as follows. First, all the key fields of all the ancestors of the segment in question in the IMS hierarchy are included in the relational table into which the segment in question is being converted. Then, all the local key fields of the segment being converted are included in the target relational table. Finally, all the local non-key fields of the segment to convert are added to the target relational table.
The first converter 235a also generates the index file 238b and the primary key file 238c, which are derived from the table file 238a. The first converter 235a creates one index for each parent of the converted segment by concatenating the keys for that parent. One index is also created for each local key field.
The first converter 235a also creates the schema header file 238d having information for each segment using the DBDxx 232a and corresponding DBDxxL 232b to provide schema information to application programs. Preferably, a segment header file includes two ANSI C data structures: a segment and a segment array. The segment structure includes the following information: a segment name, the names of the segment columns, the segment child index in the form of another header file, the length of each segment column, the expanded column length, the PIC mask for each segment column indicating column type and size, the column usage, a logical key and the corresponding local key index, the number of columns in the segment, the number of parent keys in the segment, and the number of local keys for this segment. The segment array structure includes the following information: a segment name, physical child names, the number of children, a logical flag, and a pointer to the corresponding segment data structure.
In addition to the first converter 235a, the second converter 235b is used to convert PSB definitions 232d into PSB header files 238e. As mentioned previously, a PSB defines the database which can be accessed, the segments within the database which are available, and the type of access (read, update, etc.) which can occur. The PSB header file 238e provides such database access information to application programs.
FIG. 26 is a block diagram of a converter 235a, 235b of FIG. 25. Both converters 235a, 235b are built using the conventional principles of compiler design. This includes a scanner 271 to decompose source data definition language 232 into tokens 272, a parser 273 to assemble tokens 272 into a syntactic parse tree 274, and a code generator 275 to generate target data definition language constructs 238 from the parse tree 274. This technology is well-understood and documented in existing literature and the details of a particular compiler are highly dependent on the source and target languages. Consequently, the converters 235a, 235b will not be detailed any further.
Once the database structure is converted, the next task is to convert and load database data. In the IMS example, source data 233 is stored in a hierarchical fashion. The first converter 235a generates a data loading pattern file DBDxx. dip 238f for a given physical DBD using DBDxx 232a and COPYLIB 232c information. FIG. 27 is a block diagram of the data converter 236 of FIG. 24. A DBDxx. dip file 231a is provided as input to the data converter 236, along with a flat file 231b that contains the data to be converted. The data converter 236 uses the data loading pattern specified in the DBDXX. dip file 231a to determine the desired target format for each data record in the data flat file 231b and generate an ANSI SQL file 239a containing the INSERT statements necessary to populate the target database with the data provided.
The data converter 236 needs to take into account a number of technical issues in performing its task on IMS data, including packed data handling and field redefinition. In IMS, some numerical field are compressed into a binary representation for storage efficiency. Such packed data still present in binary format in data flat files 231b, is first unpacked and then moved to the end of the record, before using a filler, namely clearing the packed data original positions with blanks. When a data loading pattern file 231a specifies packed data fields, the data converter 236 searches the end of the record instead of the original field position to locate the proper data in unpacked format.
Another peculiar situation arises with redefined fields. COPYLIB 232c sometimes specifies a redefinition for one or more fields. Such re-definitions are ignored and left to the functionality code to handle. When redefined fields include packed data however, the data converter 236 creates one filler for each redefine after moving all unpacked data for the redefine in question to the end of record. Combination between re-definitions and packed data fields is thus treated as a special case of the latter. Once all conversion is complete and all output files are available, the order of creation for a given target database table is first to create the table using the table creation file 238a, next load the data from the target data 239, then create the primary key using the primary key creation file 238c, and finally to create the indices from the index creation file 238b. Once the target database structure is established and all database data is loaded, the ANSI C structures in the schema header file 238d and the PSB header file 238e are used at runtime by application programs to access the target database structures.
As mentioned previously with regard to FIG. 1 , the custom and re- engineering system 30 focuses on providing an enteφrise a facility for maintaining and enhancing distributed infrastructure. Even though this facility is an integral part of the overall system of the present invention, it is really an add-on facility that becomes paramount once the transition is complete. Consequently, only an overview of the custom and re-engineering system 30 will be provided here. At a high-level therefore, the custom and re-engineering system 30 includes a graphical user interface editor 310, a graphical business process editor 320, a graphical business object editor 330, a graphical data record editor 340, a logic development environment 350, and facilitation tools 360.
The graphical editors 310, 320, 330, 340 are preferably fourth generation languages (4GL) or Computer Aided Software Engineering (CASE) tools that facilitate the application development task by enabling a certain amount of the application code to be generated automatically from graphical representations. In particular, the graphical user interface editor 310 can be a commercially available user interface display platforms or GUI builders discussed in the context of the presentation layer 110. FIG. 28 is a block diagram of the graphical user interface editor 310 of FIG.
1. The graphical user interface editor 310 is a typical user interface made to create menus and paint screens. As such, the graphical user interface editor 310 includes a screen editor 311 to position graphical representations of business objects on a screen or form. Screens can thus include text fields, labels, buttons, selection boxes, pull down lists, and similar graphical objects that compose a user interface. These graphical representations of business objects can be grouped so that a screen can be composed of sub-screens. This is useful to represent screen overlays, which are screens that have a fixed area as well as a variable area that changes depending on user actions. Sub-screens are also useful for grouping together business objects that need to be displayed across a number of application screens. The screen editor 311 creates internal user interface representations 312 which are processed by a user interface code generator 313 into data stored in the user interface repository 152. FIG. 29 is a block diagram of the graphical business process editor 320 of FIG. 1. The graphical business process editor 320 is a tool that enables application developers to represent the business processes that an application is meant to automate in a more intuitive, graphical form, referred to as a process flowchart. Because a business process can be broken down into sub-processes, an application can be viewed as a hierarchy of process flowcharts. This modularization enables an application to look at high-level business processes separately from detailed business sub-processes. As illustrated, a business process editor 321 generates internal business process representations 322, which are converted by a business process code generator 323 into data stored in the business process repository 154.
In a preferred embodiment of the present invention, process flowcharts can be viewed as conventional transition diagrams. Transition diagrams are networks of nodes represented graphically by circles and are called states. The states are connected by directed labeled arrows, called edges. Edge labels represent the transformations that lead from one state to the next.
As an example, the process of applying for a driver's license includes routing a driver's license application paper form through the various departments in charge of eye exams, written test, driving test and the like, with a progression from department to department. This process can be modeled using a transition diagram in which the states represent the various departments, and the edges represent the changes to the electronic driver's license form that need to be performed before that form is routed to the next department. A transition diagram can be deterministic, or non-deterministic, where non- deterministic means that more than one edge with the same label is possible out of a state. In a preferred embodiment of the present invention, non-deterministic transition diagrams are used to represent business processes graphically. These non- deterministic transition diagrams constitute a process representation perfectly suited for inteφretation by business process engine 124 (FIG. 8), which, as mentioned earlier, is the event handler based on NFA theory that processes the business process flowcharts resulting from the graphical business process editor 320.
FIG. 30 is a block diagram of the graphical business object editor 330 of FIG. 1. The graphical business object editor 330 is a tool that enables the graphical editing of business objects and their relationships. A business object editor 331 generates internal business object representations which are converted by a business object code generator into data stored in the business object repository 156.
In a preferred embodiment of the present invention, the graphical business object editor 330 can be viewed as a Entity-Relationship (ER) diagramming tool. The ER data model is the predominant conceptual level description tool and is used as a diagramming technique where rectangles represent entities, circles represent attributes, diamonds represent relationships. This graphical ER diagram can be used to generated automatically the application database schema, and a number of the basic data accessor queries. In addition, default constraints can be automatically associated to business objects based on the business object type. This can lead to automatic generation of maintenance screens for lookup business objects that can take a known range of values. The graphical business object editor can also be used to create templates that can be reused throughout an application. For instance, every screen may have a number of fixed function keys or buttons such as display, insert, delete, update, clear, refresh, backup, or quit, as well as a number of variable function keys whose semantics change from screen to screen. These function keys can be treated as a group and provided automatically as part of the template for every screen in an application.
FIG. 31 is a block diagram of the graphical data record editor 340 of FIG. 1. The graphical data record editor 340 is a tool that provides access to the data stored in the relational tables of the data layer RDBMS. As such, it is an interface that provides graphical access to each application table and permits the application developer or maintainer to view, insert, delete or update specific data records. As illustrated, a data record editor 341 generates internal data record representations 342 which are converted by a data record code generator 343 into data stored in the data record repository 158.
This focus on application data is complemented by an ability to manipulate DDL structures. In this function, the data record editor can be viewed as a data repository used to generate the database schema, either initially in its totality, or subsequently, for incremental updates. In this regards, the data record editor is similar to commercially-available off-the-shelve packages such as PeopleSoft Inc. 's Record Editor or ERwin from Logic Works Coφoration. As a whole, the data record editor greatly facilitates application maintenance and data error recovery for day to day application development, maintenance, and operation.
FIG. 32 is a block diagram of the logic development environment 350 of FIG. 1. The logic development environment 350 is an environment that adheres to the "open system" standards. As defined herein, an open system is a system that implements sufficient open specifications for interfaces, services, and supporting formats to enable properly engineered application software to be ported across a wide range of systems with minimal changes, to interoperate with other applications on local and remote systems, and to interact with users in a style which facilitates user portability. Open specifications are defined herein as a public specification that is maintained by an open, public consensus process to accommodate new technology over time and that is consistent with standards.
Functionality, the logic development environment 350 includes, at a minimum, an operating system 351 , a third generation programming language compiler 352 and debugger 353, a runtime building facility 354, a source control system 355, and a screen oriented text editor 356. One possible embodiment of the logic development environment could use the UNIX operating system, the ANSI C programming language, the XDB debugging facility, the MAKE build utility, the RCS revision control system, and the EMACS text editor.
FIG. 33 is a schematic block diagram of the facilitation tools 360 of FIG. 1. The facilitation tools 360 are graphic editing tools. The primary concept is to provide a structured, yet flexible, methodology for gathering user and application requirements while enabling the use of the resulting documentation to automatically generate a number of the architectural constructs that would otherwise have to be encoded manually. These facilitation tools 360 can include project tools 361, organizational tools 362, communication tools 363, office tools 364, groupware tools 365, and templates 366 for processing user inputs.
Equivalents
While this invention has been particularly shown and described with reference to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. In particular, the invention is not limited to particular communications links, protocols, data structure formats, etc. In addition, although various features of the invention are disclosed as being either hardware or software, it is understood that any feature of the invention can be embodied in hardware, software or firmware.
These and all other equivalents are intended to be encompassed by the following claims.

Claims

CLAIMSWhat is claimed is:
1. A system to transition source applications to a distributed infrastructure, the system comprising: a multi-tiered computer architecture including a process control tier for modelling the internal procedures of an enteφrise and a functionality tier for performing functions of the enteφrise; and an automated converter to transition a source application to a target application operable on the multi-tiered computer architecture.
2. The system of Claim 1 wherein the multi-tiered computer architecture is a client-server architecture having at least four tiers.
3. The system of Claim 1 where the multi-tiered architecture further includes a presentation tier for interfacing with a user, a data retrieval tier, and a data storage tier.
4. The system of Claim 1 wherein the converter includes an intermediate language, the language of the source application being translated to the intermediate language and from the intermediate language to the language of the target application.
5. The system of Claim 1 wherein the target application is an internet accessible application.
6. The system of Claim 1 wherein the target application is an object-oriented application.
7. The system of Claim 1 further comprising an implementation plan which provides a prioritized list of source applications to be transitioned by the automated converter.
8. The system of Claim 7 wherein the implementation plan further provides instructions for controlling the operation of the automated converter.
9. The system of Claim 1 further comprising an implementation strategy which identifies inputs to a target system and provides a list of action items for obtaining the identified outputs from the source system.
10. A method for transitioning source applications to a distributed infrastructure, comprising the steps of: providing a multi-tiered architecture including a process control tier for modelling the internal procedures of an enteφrise and a functionality tier for performing functions of the enteφrise; and in a computer, automatically converting a source application to a target application operable on the multi-tiered computer architecture.
11. The method of Claim 10 wherein the step of providing comprises providing a client-server architecture having at least four tiers.
12. The method of Claim 10 where the multi-tiered computer architecture further includes a presentation tier for interfacing with a user, a data retrieval tier, and a data storage tier.
13. The method of Claim 10 wherein the step of converting comprises translating the language of the source application to an intermediate language and translating the intermediate language to the language of the target application.
14. The method of Claim 10 wherein the target application is an internet accessible application.
15. The method of Claim 10 wherein the target application is an object-oriented application.
16. The method of Claim 10 further comprising the step of providing a prioritized list of source applications to be transitioned by the automated converter.
17. The method of Claim 16 further comprising the step of providing instructions for controlling the operation of the automated converter based on the prioritized list.
18. The method of Claim 10 further comprising the steps of: identifying inputs to a target system including the target application; and providing a list of action items for obtaining the identified outputs from the source applications.
19. In a computer, a converter for translating a source program component operating in a source language to a target program component operating in a target language, the converter comprising: an intermediate language; a first converter for translating the source program component from the source language to an intermediate component in the intermediate language; and a second converter for translating the intermediate component from the intermediate language to the target program component in the target language.
20. The converter of Claim 19 wherein the intermediate language is independent of the source language and the target language.
21. The converter of Claim 19 wherein the source language is operable on a source processor and the target language is operable on a target processor different from the source processor.
22. The converter of Claim 21 wherein the intermediate language is inoperable on either the source processor or the target processor.
23. The converter of Claim 21 wherein the first converter parses the source program component into a parse tree, the intermediate component representing the parse tree in a postfix notation.
24. The method of Claim 13 wherein the step of translating comprises: in a first converter, translating a source program component from the source language to an intermediate component in the intermediate language; and in a second converter, translating the intermediate component from the intermediate language to the target application in the target language.
25. The method of Claim 13 wherein the intermediate language independent of the source language and the target language.
26. The method of Claim 13 wherein the source language is operable on a source processor and the target language is operable on a target processor different from the source processor.
27. The method of Claim 13 wherein the intermediate language is inoperable on either the source processor or the target processor.
28. The method of Claim 13 wherein the step of translating the source program component comprises: parsing a source program component into a parse tree; and representing the parse tree in a postfix notation.
PCT/US1997/007348 1996-05-03 1997-05-01 Enterprise transition system for a distributed infrastructure WO1997042572A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU28222/97A AU2822297A (en) 1996-05-03 1997-05-01 Enterprise transition system for a distributed infrastructure

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US1633096P 1996-05-03 1996-05-03
US60/016,330 1996-05-03
US08/714,205 1996-09-16
US08/714,205 US5960200A (en) 1996-05-03 1996-09-16 System to transition an enterprise to a distributed infrastructure

Publications (1)

Publication Number Publication Date
WO1997042572A1 true WO1997042572A1 (en) 1997-11-13

Family

ID=26688459

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1997/007348 WO1997042572A1 (en) 1996-05-03 1997-05-01 Enterprise transition system for a distributed infrastructure

Country Status (3)

Country Link
US (1) US5960200A (en)
AU (1) AU2822297A (en)
WO (1) WO1997042572A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1264254A1 (en) * 2000-03-14 2002-12-11 Eontec R & D Limited A transaction control system
US7519577B2 (en) 2003-06-23 2009-04-14 Microsoft Corporation Query intermediate language method and system
US9087085B2 (en) 2012-12-10 2015-07-21 International Business Machines Corporation Pre-assimilation values and post-assimilation values in hardware instance identifiers
CN112632133A (en) * 2020-12-31 2021-04-09 中国农业银行股份有限公司 Data link query method and device

Families Citing this family (299)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5694596A (en) * 1995-05-25 1997-12-02 Kangaroo, Inc. On-line database updating network system and method
US7266725B2 (en) 2001-09-03 2007-09-04 Pact Xpp Technologies Ag Method for debugging reconfigurable architectures
GB9600854D0 (en) * 1996-01-16 1996-03-20 British Telecomm Distributed processing
GB9620196D0 (en) * 1996-09-27 1996-11-13 British Telecomm Distributed processing
US7249344B1 (en) * 1996-10-31 2007-07-24 Citicorp Development Center, Inc. Delivery of financial services to remote devices
US5867153A (en) 1996-10-30 1999-02-02 Transaction Technology, Inc. Method and system for automatically harmonizing access to a software application program via different access devices
US8112330B1 (en) 1997-08-07 2012-02-07 Citibank Development Center, Inc. System and method for delivering financial services
US7668781B2 (en) 1996-10-31 2010-02-23 Citicorp Development Center, Inc. Global method and system for providing enhanced transactional functionality through a customer terminal
DE19651075A1 (en) 1996-12-09 1998-06-10 Pact Inf Tech Gmbh Unit for processing numerical and logical operations, for use in processors (CPU's), multi-computer systems, data flow processors (DFP's), digital signal processors (DSP's) or the like
DE19654595A1 (en) 1996-12-20 1998-07-02 Pact Inf Tech Gmbh I0 and memory bus system for DFPs as well as building blocks with two- or multi-dimensional programmable cell structures
ATE243390T1 (en) 1996-12-27 2003-07-15 Pact Inf Tech Gmbh METHOD FOR INDEPENDENT DYNAMIC LOADING OF DATA FLOW PROCESSORS (DFPS) AND COMPONENTS WITH TWO- OR MULTI-DIMENSIONAL PROGRAMMABLE CELL STRUCTURES (FPGAS, DPGAS, O.L.)
US6460020B1 (en) 1996-12-30 2002-10-01 De Technologies, Inc. Universal shopping center for international operation
US6542998B1 (en) 1997-02-08 2003-04-01 Pact Gmbh Method of self-synchronization of configurable elements of a programmable module
GB2326010A (en) * 1997-06-07 1998-12-09 Ibm Data processing system using active tokens
US5978836A (en) 1997-07-28 1999-11-02 Solectron Corporation Workflow systems and methods
US7546346B2 (en) * 1997-07-28 2009-06-09 Juniper Networks, Inc. Workflow systems and methods for project management and information management
GB2327786B (en) * 1997-07-31 2002-04-03 Ibm Method and apparatus for strategic compilation of source programs into two or more target languages
US7502752B1 (en) * 1997-08-07 2009-03-10 Citicorp Development Center, Inc. System and method for delivering financial services
US8686549B2 (en) 2001-09-03 2014-04-01 Martin Vorbach Reconfigurable elements
US6314429B1 (en) * 1997-10-08 2001-11-06 Mitel Corporation Bi-directional conversion library
US6128622A (en) * 1997-11-26 2000-10-03 International Business Machines Corporation IMS web studio taskguide
DE19861088A1 (en) 1997-12-22 2000-02-10 Pact Inf Tech Gmbh Repairing integrated circuits by replacing subassemblies with substitutes
US6167565A (en) * 1998-01-08 2000-12-26 Microsoft Corporation Method and system of custom marshaling of inter-language parameters
US6898792B1 (en) * 1998-02-18 2005-05-24 Iona Technologies, Plc Foreign object definition information repository
US20020087048A1 (en) * 1998-02-24 2002-07-04 Brock David L. Flexible instrument
US6269473B1 (en) * 1998-03-23 2001-07-31 Evolve Software, Inc. Method and apparatus for the development of dynamically configurable software systems
US6058400A (en) * 1998-04-28 2000-05-02 Sun Microsystems, Inc. Highly available cluster coherent filesystem
US6223186B1 (en) * 1998-05-04 2001-04-24 Incyte Pharmaceuticals, Inc. System and method for a precompiled database for biomolecular sequence information
US6304882B1 (en) * 1998-05-05 2001-10-16 Informix Software, Inc. Data replication system and method
US6446109B2 (en) * 1998-06-29 2002-09-03 Sun Microsystems, Inc. Application computing environment
JP4982819B2 (en) * 1998-07-10 2012-07-25 インタレクチュアル ヴェンチャーズ ファースト エルエルシー Information management apparatus and method, and recording medium
US6305007B1 (en) * 1998-07-24 2001-10-16 Computer Associates Think, Inc. Object property meta model emulator for legacy data structures
US6167563A (en) * 1998-09-17 2000-12-26 Unisys Corporation Method and system for building components in a framework useful in developing integrated business-centric applications
US7131069B1 (en) * 1998-10-22 2006-10-31 Made2 Manage Systems, Inc. Navigational interface for ERP system
AU770160B2 (en) * 1998-10-23 2004-02-12 Unisys Corporation Automated web interface generation for software coded applications
US6360218B1 (en) * 1998-10-26 2002-03-19 Microsoft Corporation Compact record format for low-overhead databases
US7017142B1 (en) * 1998-12-03 2006-03-21 International Business Machines Corporation Method and apparatus for applying business rules in an object model driven context
US8069407B1 (en) * 1998-12-08 2011-11-29 Yodlee.Com, Inc. Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes
US7356482B2 (en) * 1998-12-18 2008-04-08 Alternative Systems, Inc. Integrated change management unit
US6370537B1 (en) * 1999-01-14 2002-04-09 Altoweb, Inc. System and method for the manipulation and display of structured data
US6510468B1 (en) * 1999-01-22 2003-01-21 Micro Focus International Limited Adaptively transforming data from a first computer program for use in a second computer program
US6772180B1 (en) * 1999-01-22 2004-08-03 International Business Machines Corporation Data representation schema translation through shared examples
US6714926B1 (en) * 1999-02-02 2004-03-30 Amazon.Com, Inc. Use of browser cookies to store structured data
US7003660B2 (en) 2000-06-13 2006-02-21 Pact Xpp Technologies Ag Pipeline configuration unit protocols and communication
US6574635B2 (en) * 1999-03-03 2003-06-03 Siebel Systems, Inc. Application instantiation based upon attributes and values stored in a meta data repository, including tiering of application layers objects and components
US7016951B1 (en) * 1999-04-30 2006-03-21 Mantech Ctx Corporation System and method for network security
US7188168B1 (en) * 1999-04-30 2007-03-06 Pmc-Sierra, Inc. Method and apparatus for grammatical packet classifier
US7185081B1 (en) * 1999-04-30 2007-02-27 Pmc-Sierra, Inc. Method and apparatus for programmable lexical packet classifier
US6507945B1 (en) * 1999-05-05 2003-01-14 Symyx Technologies, Inc. Synthesizing combinatorial libraries of materials
US6560770B1 (en) * 1999-05-25 2003-05-06 Oracle Corporation Extending the attributes of an application generated using a fourth generation programming tool
US7752535B2 (en) 1999-06-01 2010-07-06 Yodlec.com, Inc. Categorization of summarized information
FR2794543B1 (en) * 1999-06-04 2001-08-24 Gemplus Card Int MIGRATION OF DIFFERENT SOURCE LANGUAGES TO EXECUTION MEDIA
US6889260B1 (en) * 1999-06-10 2005-05-03 Ec Enabler, Ltd Method and system for transferring information
AU5805300A (en) 1999-06-10 2001-01-02 Pact Informationstechnologie Gmbh Sequence partitioning in cell structures
US7398262B1 (en) * 1999-06-18 2008-07-08 Multex.Com, Inc. Method and system for referencing, archiving and retrieving symbolically linked information
US7356390B2 (en) 1999-06-29 2008-04-08 Space Data Corporation Systems and applications of lighter-than-air (LTA) platforms
US6427151B1 (en) * 1999-06-29 2002-07-30 International Business Machines Corporation Method, computer program product, system and data structure for formatting transaction results data
WO2002087112A2 (en) 2001-04-18 2002-10-31 Space Data Corporation Unmanned lighter-than-air safe termination and recovery methods
US7219327B1 (en) * 1999-07-01 2007-05-15 Affinity Internet, Inc. Extensible data model for use in an integrated platform for creating a distribution multiapplication online presence
US6601233B1 (en) 1999-07-30 2003-07-29 Accenture Llp Business components framework
US7100195B1 (en) 1999-07-30 2006-08-29 Accenture Llp Managing user information on an e-commerce system
US6704873B1 (en) 1999-07-30 2004-03-09 Accenture Llp Secure gateway interconnection in an e-commerce based environment
US6718535B1 (en) * 1999-07-30 2004-04-06 Accenture Llp System, method and article of manufacture for an activity framework design in an e-commerce based environment
EP1208512A1 (en) * 1999-08-16 2002-05-29 Versata, Inc. Business rules automation in database application development and maintenance
US6640238B1 (en) 1999-08-31 2003-10-28 Accenture Llp Activity component in a presentation services patterns environment
US6549949B1 (en) 1999-08-31 2003-04-15 Accenture Llp Fixed format stream in a communication services patterns environment
US6601192B1 (en) 1999-08-31 2003-07-29 Accenture Llp Assertion component in environment services patterns
US7289964B1 (en) 1999-08-31 2007-10-30 Accenture Llp System and method for transaction services patterns in a netcentric environment
US6640244B1 (en) 1999-08-31 2003-10-28 Accenture Llp Request batcher in a transaction services patterns environment
US6601234B1 (en) 1999-08-31 2003-07-29 Accenture Llp Attribute dictionary in a business logic services environment
US6636242B2 (en) 1999-08-31 2003-10-21 Accenture Llp View configurer in a presentation services patterns environment
US6578068B1 (en) 1999-08-31 2003-06-10 Accenture Llp Load balancer in environment services patterns
US6954220B1 (en) 1999-08-31 2005-10-11 Accenture Llp User context component in environment services patterns
US6715145B1 (en) 1999-08-31 2004-03-30 Accenture Llp Processing pipeline in a base services pattern environment
US6742015B1 (en) 1999-08-31 2004-05-25 Accenture Llp Base services patterns in a netcentric environment
US6842906B1 (en) 1999-08-31 2005-01-11 Accenture Llp System and method for a refreshable proxy pool in a communication services patterns environment
US6615253B1 (en) 1999-08-31 2003-09-02 Accenture Llp Efficient server side data retrieval for execution of client side applications
US6571282B1 (en) 1999-08-31 2003-05-27 Accenture Llp Block-based communication in a communication services patterns environment
US6640249B1 (en) 1999-08-31 2003-10-28 Accenture Llp Presentation services patterns in a netcentric environment
WO2001025969A1 (en) * 1999-10-01 2001-04-12 Ivis International Mapping business concepts to stored data in application databases
EP1228404A1 (en) 1999-10-05 2002-08-07 Togethersoft Corporation Method for generating and defining a pattern
AU7996100A (en) * 1999-10-06 2001-05-10 Accenture Llp Method and estimator for providing change control
TW494319B (en) * 1999-11-29 2002-07-11 Citicorp Developmemt Ct Inc A method and system for generating display screen templates
US6578195B1 (en) * 1999-12-29 2003-06-10 Lucent Technologies Inc. Process for data encapsulation in large scale legacy software
US6986128B2 (en) * 2000-01-07 2006-01-10 Sony Computer Entertainment Inc. Multiple stage program recompiler and method
US7113959B1 (en) 2000-01-10 2006-09-26 Imagex, Inc. System and method of using human resources data to generate printed products
US7818285B1 (en) 2000-01-10 2010-10-19 Fedex Office And Print Services, Inc. System and method of using a sales management system to generate printed products
WO2001065417A1 (en) * 2000-03-02 2001-09-07 Idini Corporation Improved device independent remote data management
US7114147B2 (en) * 2000-03-09 2006-09-26 Electronic Data Systems Corporation Method and system for reporting XML data based on precomputed context and a document object model
US7111233B1 (en) 2000-03-09 2006-09-19 Electronic Data Systems Corporation Method and system for applying XML schema
US6993745B1 (en) * 2000-03-09 2006-01-31 Electronic Data Systems Corporation Method and system for modeling a legacy computer system
US7448000B2 (en) * 2000-03-17 2008-11-04 Schlucktronix Llc Methods and devices for reconstructing visual stimuli observed through browser-based interfaces over time
US7243310B2 (en) 2000-03-17 2007-07-10 Schlucktronix Llc Methods and devices for recording changes in visual stimuli observed through browser-based interfaces
US6681383B1 (en) * 2000-04-04 2004-01-20 Sosy, Inc. Automatic software production system
US7334216B2 (en) * 2000-04-04 2008-02-19 Sosy, Inc. Method and apparatus for automatic generation of information system user interfaces
WO2001080054A1 (en) * 2000-04-13 2001-10-25 N-Tier Financial Services, Llc Business objects process development framework for data reconciliation
US6857023B2 (en) * 2000-04-25 2005-02-15 Pegasus Solutions, Inc. System uses an interface controller for managing operations of devices that each has a unique communication protocol
US7320004B1 (en) * 2000-04-28 2008-01-15 Microsoft Corporation System and method for managing database files in a client management tool
US7313782B2 (en) * 2000-05-05 2007-12-25 @Hand Corporation Method for distributing, integrating, and hosting a software platform
US6738817B1 (en) 2000-05-18 2004-05-18 International Business Machines Corporation System and method for enabling graphic applications in an interactive programming model
US6941371B2 (en) * 2000-05-18 2005-09-06 International Business Machines Corporation System and method for enabling graphic applications in an interactive programming model
KR20010105932A (en) * 2000-05-19 2001-11-29 정재현 A management system with connect function achieved systems exchange to internet
US8719562B2 (en) * 2002-10-25 2014-05-06 William M. Randle Secure service network and user gateway
WO2001095123A1 (en) * 2000-06-05 2001-12-13 Altoweb Systems, Inc. System and method for accessing, organizing, and presenting data
US6898783B1 (en) * 2000-08-03 2005-05-24 International Business Machines Corporation Object oriented based methodology for modeling business functionality for enabling implementation in a web based environment
US7171455B1 (en) * 2000-08-22 2007-01-30 International Business Machines Corporation Object oriented based, business class methodology for generating quasi-static web pages at periodic intervals
US6675373B1 (en) * 2000-09-07 2004-01-06 Universal Conversion Technologies Automatic generation of balancing logic for data conversion
WO2002029559A1 (en) * 2000-09-27 2002-04-11 Conducive Technology Corp Scripting business logic in a distributed object oriented environment
US6873989B1 (en) * 2000-10-04 2005-03-29 Bmc Software, Inc. Graphical display of IMS space usage characteristics
US8058899B2 (en) 2000-10-06 2011-11-15 Martin Vorbach Logic cell array and bus system
US6738955B2 (en) * 2000-11-30 2004-05-18 International Business Machines Corporation Method and system for formal characterization of average performance
US7062749B2 (en) * 2000-12-15 2006-06-13 Promenix, Inc. Measuring, monitoring and tracking enterprise communications and processes
US7103666B2 (en) * 2001-01-12 2006-09-05 Siemens Medical Solutions Health Services Corporation System and user interface supporting concurrent application operation and interoperability
US7043752B2 (en) * 2001-01-12 2006-05-09 Siemens Medical Solutions Health Services Corporation System and user interface supporting concurrent application initiation and interoperability
US7334031B2 (en) 2001-01-12 2008-02-19 Siemens Medical Solutions Health Services Corporation System and user interface supporting processing and activity management for concurrently operating applications
US7483979B1 (en) 2001-01-16 2009-01-27 International Business Machines Corporation Method and system for virtualizing metadata between disparate systems
US20020099583A1 (en) * 2001-01-24 2002-07-25 Matusek Lawrence W. Architecture and techniques for providing product configurations to an enterprise resource planner
US7076782B2 (en) * 2001-02-06 2006-07-11 International Business Machines Corporation Method, computer program product, and system for creating form independent applications operative on IMS resources
US20030028589A1 (en) * 2001-02-23 2003-02-06 Hittleman Ken D. System and method to transfer an application to a destination server module in a predetermined storage format
US7290243B1 (en) * 2001-02-28 2007-10-30 Apple Inc. Method and apparatus for application building using build styles
US7210129B2 (en) * 2001-08-16 2007-04-24 Pact Xpp Technologies Ag Method for translating programs for reconfigurable architectures
US7444531B2 (en) 2001-03-05 2008-10-28 Pact Xpp Technologies Ag Methods and devices for treating and processing data
US7844796B2 (en) 2001-03-05 2010-11-30 Martin Vorbach Data processing device and method
US9037807B2 (en) 2001-03-05 2015-05-19 Pact Xpp Technologies Ag Processor arrangement on a chip including data processing, memory, and interface elements
US6925632B2 (en) * 2001-03-08 2005-08-02 Martin Shiu System for configuration programming
US7406682B2 (en) * 2001-03-26 2008-07-29 Emc Corporation Translator-compiler for converting legacy management software
US20030018510A1 (en) * 2001-03-30 2003-01-23 E-Know Method, system, and software for enterprise action management
US9908608B2 (en) 2001-04-18 2018-03-06 Space Data Corporation Systems and applications of lighter-than-air (LTA) platforms
US9632503B2 (en) 2001-04-18 2017-04-25 Space Data Corporation Systems and applications of lighter-than-air (LTA) platforms
US9643706B2 (en) 2001-04-18 2017-05-09 Space Data Corporation Systems and applications of lighter-than-air (LTA) platforms
US8452714B2 (en) 2001-04-26 2013-05-28 Celcorp, Inc. System and method for the automatic creation of a graphical representation of navigation paths generated by intelligent planner
US7278134B2 (en) * 2001-04-27 2007-10-02 International Business Machines Corporation Three dimensional framework for information technology solutions
US20020169738A1 (en) * 2001-05-10 2002-11-14 Giel Peter Van Method and system for auditing an enterprise configuration
US8843909B2 (en) * 2001-05-11 2014-09-23 Ca, Inc. Method and apparatus for transforming legacy software applications into modern object-oriented distributed systems
US20020184194A1 (en) * 2001-05-30 2002-12-05 International Business Machines Corporation Multipurpose web-enabled browser
US7231460B2 (en) * 2001-06-04 2007-06-12 Gateway Inc. System and method for leveraging networked computers to view windows based files on Linux platforms
US20020188727A1 (en) * 2001-06-08 2002-12-12 Lessard Michael R. Method for processing external data for access and manipulation through a host operating environment
US20020188774A1 (en) * 2001-06-08 2002-12-12 Lessard Michael R. Virtualizing external data as native data
WO2002103532A2 (en) 2001-06-20 2002-12-27 Pact Xpp Technologies Ag Data processing method
US20030009741A1 (en) * 2001-07-06 2003-01-09 Tsung-Wei Tu Method and apparatus for development of a business process software application
US7996827B2 (en) 2001-08-16 2011-08-09 Martin Vorbach Method for the translation of programs for reconfigurable architectures
US7434191B2 (en) 2001-09-03 2008-10-07 Pact Xpp Technologies Ag Router
US6876993B2 (en) * 2001-09-14 2005-04-05 International Business Machines Corporation Method and system for generating management solutions
US8686475B2 (en) 2001-09-19 2014-04-01 Pact Xpp Technologies Ag Reconfigurable elements
US7177856B1 (en) 2001-10-03 2007-02-13 International Business Machines Corporation Method for correlating data from external databases
US20030084046A1 (en) * 2001-10-25 2003-05-01 Abm Systems Ltd. Versatile database interface system
US20030126109A1 (en) * 2002-01-02 2003-07-03 Tanya Couch Method and system for converting message data into relational table format
EP1483682A2 (en) 2002-01-19 2004-12-08 PACT XPP Technologies AG Reconfigurable processor
US8127061B2 (en) 2002-02-18 2012-02-28 Martin Vorbach Bus systems and reconfiguration methods
US20040205576A1 (en) * 2002-02-25 2004-10-14 Chikirivao Bill S. System and method for managing Knowledge information
US8914590B2 (en) 2002-08-07 2014-12-16 Pact Xpp Technologies Ag Data processing method and device
US6934706B1 (en) 2002-03-22 2005-08-23 International Business Machines Corporation Centralized mapping of security credentials for database access operations
US20030195785A1 (en) * 2002-04-15 2003-10-16 Honeywell Inc. Token based control flow for workflow
US7203924B2 (en) * 2002-04-30 2007-04-10 Microsoft Corporation Behavioral analysis for message-passing application programs
US7703077B2 (en) * 2002-04-30 2010-04-20 Microsoft Corporation Programming model to detect deadlocks in concurrent programs
US7945636B2 (en) * 2002-05-15 2011-05-17 In-Store Broadcasting Network, Llc Providing a multi-tier enterprise level application
US6895409B2 (en) * 2002-06-17 2005-05-17 Adaptik Corporation Method and apparatus for creating an adaptive application
AU2003247560A1 (en) * 2002-06-18 2003-12-31 Oryxa, Inc. Data movement platform
US20050021348A1 (en) * 2002-07-19 2005-01-27 Claribel Chan Business solution management (BSM)
AU2003286131A1 (en) 2002-08-07 2004-03-19 Pact Xpp Technologies Ag Method and device for processing data
US7657861B2 (en) 2002-08-07 2010-02-02 Pact Xpp Technologies Ag Method and device for processing data
US7424702B1 (en) 2002-08-19 2008-09-09 Sprint Communications Company L.P. Data integration techniques for use in enterprise architecture modeling
AU2003289844A1 (en) 2002-09-06 2004-05-13 Pact Xpp Technologies Ag Reconfigurable sequencer structure
US20040054969A1 (en) * 2002-09-16 2004-03-18 International Business Machines Corporation System and method for generating web services definitions for MFS-based IMS applications
US7421701B2 (en) 2002-09-16 2008-09-02 International Business Machines Corporation System for facilitating transactions between thin-clients and message format service (MFS)-based information management system (IMS) applications
US7130893B2 (en) 2003-05-19 2006-10-31 International Business Machines Corporation System and method for representing MFS control blocks in XML for MFS-based IMS applications
US20040103370A1 (en) * 2002-11-27 2004-05-27 International Business Machines Corporation System and method for rendering MFS XML documents for display
FR2845174B1 (en) * 2002-09-27 2005-04-08 Thales Sa METHOD FOR MAKING USER-SYSTEM INTERACTION INDEPENDENT OF THE APPLICATION AND INTERACTION MEDIA
US20060004887A1 (en) * 2002-10-04 2006-01-05 Andre Schenk Method and device for generating distributed java applications by means of a central xml configuration file
US7370270B2 (en) 2002-10-23 2008-05-06 Aol Llc A Delaware Limited Liability Company XML schema evolution
US7316008B1 (en) * 2002-10-31 2008-01-01 First Data Corporation Method and system for extracting business logic from computer code
EP1416439A1 (en) * 2002-10-31 2004-05-06 Sap Ag Identifying solutions to computer problems by expert system using contexts and distinguishing versions
EP1416382A1 (en) * 2002-10-31 2004-05-06 Sap Ag Identifying solutions to computer problems in main system by service system
KR100501410B1 (en) * 2002-11-27 2005-07-18 한국전자통신연구원 System and method of generating EJB component from reusable business logic in servlet
US7149752B2 (en) 2002-12-03 2006-12-12 Jp Morgan Chase Bank Method for simplifying databinding in application programs
US7085759B2 (en) 2002-12-06 2006-08-01 Jpmorgan Chase Bank System and method for communicating data to a process
US7349949B1 (en) 2002-12-26 2008-03-25 International Business Machines Corporation System and method for facilitating development of a customizable portlet
US7359982B1 (en) 2002-12-26 2008-04-15 International Business Machines Corporation System and method for facilitating access to content information
US20040139141A1 (en) * 2002-12-31 2004-07-15 Lessard Michael R. Integration of virtual data within a host operating environment
US7383168B2 (en) * 2003-01-06 2008-06-03 Fujitsu Limited Method and system for design verification and debugging of a complex computing system
US8032439B2 (en) 2003-01-07 2011-10-04 Jpmorgan Chase Bank, N.A. System and method for process scheduling
US7401156B2 (en) 2003-02-03 2008-07-15 Jp Morgan Chase Bank Method using control interface to suspend software network environment running on network devices for loading and executing another software network environment
US7379998B2 (en) * 2003-03-31 2008-05-27 Jp Morgan Chase Bank System and method for multi-platform queue queries
US20080320054A1 (en) * 2003-04-09 2008-12-25 Cindy Howard Database and Software Conversion System and Method
US7366722B2 (en) 2003-05-15 2008-04-29 Jp Morgan Chase Bank System and method for specifying application services and distributing them across multiple processors using XML
US7509641B2 (en) * 2003-05-16 2009-03-24 Jp Morgan Chase Bank Job processing framework
EP1676208A2 (en) 2003-08-28 2006-07-05 PACT XPP Technologies AG Data processing device and method
CA2438997A1 (en) * 2003-08-28 2005-02-28 Ibm Canada Limited - Ibm Canada Limitee System and method for carrying out legacy application transitions
US7370280B2 (en) * 2003-09-23 2008-05-06 International Business Machines Corporation Apparatus, system, and method for defining a web services interface for MFS-based IMS applications
US7290278B2 (en) 2003-10-02 2007-10-30 Aol Llc, A Delaware Limited Liability Company Identity based service system
US20050080759A1 (en) * 2003-10-08 2005-04-14 International Business Machines Corporation Transparent interface to a messaging system from a database engine
US20050091346A1 (en) * 2003-10-23 2005-04-28 Brijesh Krishnaswami Settings management infrastructure
US20050144226A1 (en) * 2003-11-10 2005-06-30 Churchill Software Services Systems and methods for modeling and generating reusable application component frameworks, and automated assembly of service-oriented applications from existing applications
US7506335B1 (en) 2003-11-29 2009-03-17 Cisco Technology, Inc. Method and apparatus for software loading and initialization in a distributed network
US7461374B1 (en) 2003-12-01 2008-12-02 Cisco Technology, Inc. Dynamic installation and activation of software packages in a distributed networking device
US7376945B1 (en) 2003-12-02 2008-05-20 Cisco Technology, Inc. Software change modeling for network devices
US7418508B2 (en) 2004-01-26 2008-08-26 International Machines Corporation System and method to facilitate XML enabled IMS transactions between a remote client and an IMS application program
US7617459B2 (en) 2004-01-28 2009-11-10 International Business Machines Corporation Apparatus, system, and method for automatically generating a web interface for an MFS-based IMS application
US7797669B1 (en) 2004-02-13 2010-09-14 Microsoft Corporation Analysis of distributed software systems via specification substitution
US7376830B2 (en) 2004-04-26 2008-05-20 Jp Morgan Chase Bank System and method for routing messages
US20050261969A1 (en) * 2004-05-10 2005-11-24 International Business Machines Corporation Layered architecture for POS (point-of sale) systems
US20050262037A1 (en) * 2004-05-19 2005-11-24 Christensen Barbara A Method and apparatus for controlling result dataset generation in a javascript environment
US7849438B1 (en) * 2004-05-27 2010-12-07 Sprint Communications Company L.P. Enterprise software development process for outsourced developers
US7617501B2 (en) 2004-07-09 2009-11-10 Quest Software, Inc. Apparatus, system, and method for managing policies on a computer having a foreign operating system
US7392471B1 (en) 2004-07-28 2008-06-24 Jp Morgan Chase Bank System and method for comparing extensible markup language (XML) documents
US7831958B2 (en) * 2004-07-28 2010-11-09 International Business Machines Corporation Systems and methods for distributing updated information
US9189756B2 (en) * 2004-09-21 2015-11-17 International Business Machines Corporation Case management system and method for collaborative project teaming
US8230426B2 (en) * 2004-10-06 2012-07-24 Digipede Technologies, Llc Multicore distributed processing system using selection of available workunits based on the comparison of concurrency attributes with the parallel processing characteristics
US8458467B2 (en) * 2005-06-21 2013-06-04 Cisco Technology, Inc. Method and apparatus for adaptive application message payload content transformation in a network infrastructure element
US7987272B2 (en) 2004-12-06 2011-07-26 Cisco Technology, Inc. Performing message payload processing functions in a network element on behalf of an application
US7797739B2 (en) 2004-12-14 2010-09-14 International Business Machines Corporation Automated verification of correctness of aspects of an information technology system
US8028334B2 (en) * 2004-12-14 2011-09-27 International Business Machines Corporation Automated generation of configuration elements of an information technology system
US8645513B2 (en) * 2004-12-14 2014-02-04 International Business Machines Corporation Automation of information technology system development
US7568022B2 (en) * 2004-12-14 2009-07-28 International Business Machines Corporation Automated display of an information technology system configuration
US7937462B2 (en) * 2004-12-14 2011-05-03 International Business Machines Corporation Verification of correctness of networking aspects of an information technology system
US7523092B2 (en) * 2004-12-14 2009-04-21 International Business Machines Corporation Optimization of aspects of information technology structures
US11477093B2 (en) 2004-12-14 2022-10-18 Kyndryl, Inc. Coupling of a business component model to an information technology model
US20060133412A1 (en) * 2004-12-22 2006-06-22 Rockwell Automation Technologies, Inc. Integration of control and business applications using integration servers
CA2594754A1 (en) 2005-01-13 2006-07-20 Hsbc North America Holdings Inc. Computer software implemented framework for configuration and release management of group systems software, and method for same
US7706895B2 (en) * 2005-02-25 2010-04-27 Rockwell Automation Technologies, Inc. Reliable messaging instruction
US8209366B2 (en) * 2005-02-28 2012-06-26 Hitachi Global Storage Technologies Netherlands B.V. Method, apparatus and program storage device that provides a shift process with saturation for digital signal processor operations
US7406683B2 (en) * 2005-03-02 2008-07-29 Cisco Technology, Inc. System and method providing for interaction between programming languages
US20060200548A1 (en) * 2005-03-02 2006-09-07 N-Able Technologies International, Inc. Automation engine and method for providing an abstraction layer
US7565351B1 (en) 2005-03-14 2009-07-21 Rockwell Automation Technologies, Inc. Automation device data interface
US8126990B2 (en) 2005-04-21 2012-02-28 Fiducci Thomas E Data backup and transfer system, method and computer program product
US7849165B2 (en) 2005-04-21 2010-12-07 Fiducci Thomas E Data backup, storage, transfer, and retrieval system, method and computer program product
US20060252417A1 (en) * 2005-05-05 2006-11-09 Avaya Technology Corp. Changing the user interface at a telecommunications terminal
US9269117B2 (en) * 2005-05-10 2016-02-23 Mckesson Technologies Inc. Enterprise management system
US7233830B1 (en) * 2005-05-31 2007-06-19 Rockwell Automation Technologies, Inc. Application and service management for industrial control devices
FR2888018A1 (en) * 2005-07-01 2007-01-05 Medience Sa METHOD AND SYSTEM FOR REALIZING A VIRTUAL DATABASE FROM DATA SOURCES HAVING HETEROGENEOUS SCHEMES
US8484065B1 (en) 2005-07-14 2013-07-09 Sprint Communications Company L.P. Small enhancement process workflow manager
US20070067756A1 (en) * 2005-09-20 2007-03-22 Trinity Millennium Group, Inc. System and method for enterprise software portfolio modernization
US20070079229A1 (en) * 2005-10-04 2007-04-05 Johnson Peter C Ii Method and system for automatically determining the server-side technology underlying a dynamic web site
US7499933B1 (en) 2005-11-12 2009-03-03 Jpmorgan Chase Bank, N.A. System and method for managing enterprise application configuration
US7904949B2 (en) 2005-12-19 2011-03-08 Quest Software, Inc. Apparatus, systems and methods to provide authentication services to a legacy application
US7461038B2 (en) * 2005-12-21 2008-12-02 General Electric Company Method and apparatus for evaluating robustness of proposed solution to constraint problem and considering robustness in developing a constraint problem solution
US8250503B2 (en) 2006-01-18 2012-08-21 Martin Vorbach Hardware definition method including determining whether to implement a function as hardware or software
US8087075B2 (en) 2006-02-13 2011-12-27 Quest Software, Inc. Disconnected credential validation using pre-fetched service tickets
US20070192152A1 (en) * 2006-02-13 2007-08-16 Itt Manufacturing Enterprises, Inc. Software phase sequencer editor and method of editing
US20070239505A1 (en) * 2006-03-30 2007-10-11 Microsoft Corporation Abstract execution model for a continuation-based meta-runtime
US20070250295A1 (en) * 2006-03-30 2007-10-25 Subx, Inc. Multidimensional modeling system and related method
US20070265900A1 (en) * 2006-05-09 2007-11-15 Moore Dennis B Business process evolution
US8799181B2 (en) * 2006-05-09 2014-08-05 Sag Ag Business process federated repository
US20070265895A1 (en) * 2006-05-09 2007-11-15 Sap Ag Ad-hoc workflow as a business process template
US8171482B1 (en) * 2006-05-09 2012-05-01 Vmware, Inc. Application environment specifications for provisioning application specific runtime environments using subsets of resources required for execution
US20070280454A1 (en) * 2006-06-01 2007-12-06 Avaya Technology Llc Signaling a Telecommunications Terminal Through a Remote System
US20070283283A1 (en) * 2006-06-05 2007-12-06 Jun-Fu Lin Method of Editing Default Graphic Object for Man-Machine Interface and Editor using the same
US8429712B2 (en) 2006-06-08 2013-04-23 Quest Software, Inc. Centralized user authentication system apparatus and method
US7610172B2 (en) 2006-06-16 2009-10-27 Jpmorgan Chase Bank, N.A. Method and system for monitoring non-occurring events
US7693257B2 (en) * 2006-06-29 2010-04-06 Accuray Incorporated Treatment delivery optimization
US7643666B2 (en) * 2006-08-08 2010-01-05 Asml Netherlands B.V. Method and apparatus for angular-resolved spectroscopic lithography characterization
US7606752B2 (en) 2006-09-07 2009-10-20 Yodlee Inc. Host exchange in bill paying services
US7895332B2 (en) 2006-10-30 2011-02-22 Quest Software, Inc. Identity migration system apparatus and method
US8086710B2 (en) 2006-10-30 2011-12-27 Quest Software, Inc. Identity migration apparatus and method
US7853925B2 (en) * 2006-12-13 2010-12-14 Sap Ag System and method for managing hierarchical software development
US8140609B2 (en) * 2007-01-25 2012-03-20 International Business Machines Corporation Congruency and similarity of information technology (IT) structures and associated applications
US8019781B2 (en) * 2007-02-15 2011-09-13 Microsoft Corporation Host context framework
US20080208645A1 (en) * 2007-02-23 2008-08-28 Controlpath, Inc. Method for Logic Tree Traversal
US9223622B2 (en) * 2007-03-09 2015-12-29 Hewlett-Packard Development Company, L.P. Capacity planning of multi-tiered applications from application logs
US20080275743A1 (en) * 2007-05-03 2008-11-06 Kadambe Shubha L Systems and methods for planning
US7958188B2 (en) * 2007-05-04 2011-06-07 International Business Machines Corporation Transaction-initiated batch processing
US8577937B1 (en) 2007-05-09 2013-11-05 Vmware, Inc. Repository including exclusion list
US11262996B2 (en) 2007-05-09 2022-03-01 Vmware, Inc. Repository including exclusion list
US8347263B1 (en) 2007-05-09 2013-01-01 Vmware, Inc. Repository including installation metadata for executable applications
US9015180B1 (en) 2007-05-09 2015-04-21 Vmware, Inc. Repository including file identification
US8219987B1 (en) 2007-08-24 2012-07-10 Vmware, Inc. Optimized virtual machine specification for provisioning application specific runtime environment
US9379914B2 (en) 2007-05-11 2016-06-28 At&T Intellectual Property I, L.P. Method and system for implementing aggregate endpoints on IMS networks
US20090119415A1 (en) * 2007-11-02 2009-05-07 Chiang Chenhuei J System and method for representing mfs control blocks in xml for mfs-based ims applications
US20090125751A1 (en) * 2007-11-13 2009-05-14 Colin Scott Dawson System and Method for Correlated Analysis of Data Recovery Readiness for Data Assets
US8201145B2 (en) * 2007-11-13 2012-06-12 International Business Machines Corporation System and method for workflow-driven data storage
US9424323B2 (en) * 2008-01-31 2016-08-23 Oracle International Corporation Application tier data dictionary
US8055630B2 (en) * 2008-06-17 2011-11-08 International Business Machines Corporation Estimating recovery times for data assets
US8769482B2 (en) * 2008-12-16 2014-07-01 International Business Machines Corporation Method and system for building an application
US8813048B2 (en) 2009-05-11 2014-08-19 Accenture Global Services Limited Single code set applications executing in a multiple platform system
US8832699B2 (en) 2009-05-11 2014-09-09 Accenture Global Services Limited Migrating processes operating on one platform to another platform in a multi-platform system
US8255984B1 (en) 2009-07-01 2012-08-28 Quest Software, Inc. Single sign-on system for shared resource environments
US8595284B2 (en) * 2009-12-14 2013-11-26 Samsung Electronics Co., Ltd Web application script migration
US20120131559A1 (en) * 2010-11-22 2012-05-24 Microsoft Corporation Automatic Program Partition For Targeted Replay
US20120204149A1 (en) * 2011-02-03 2012-08-09 International Business Machines Corporation Discovery-based migration correctness testing
EP2602678B1 (en) * 2011-12-07 2014-08-13 Siemens Aktiengesellschaft Method for translating a control program in an automated language to an intermediate language
US9400983B1 (en) 2012-05-10 2016-07-26 Jpmorgan Chase Bank, N.A. Method and system for implementing behavior isolating prediction model
US10296968B2 (en) 2012-12-07 2019-05-21 United Parcel Service Of America, Inc. Website augmentation including conversion of regional content
US9117177B1 (en) * 2013-05-30 2015-08-25 Amazon Technologies, Inc. Generating module stubs
US9621424B2 (en) 2013-10-04 2017-04-11 Microsoft Technologies Licensing, LLC Providing a common interface for accessing and presenting component configuration settings
US10122717B1 (en) 2013-12-31 2018-11-06 Open Text Corporation Hierarchical case model access roles and permissions
US9965466B2 (en) 2014-07-16 2018-05-08 United Parcel Service Of America, Inc. Language content translation
US10032124B1 (en) 2014-07-31 2018-07-24 Open Text Corporation Hierarchical permissions model for case management
WO2016105523A1 (en) 2014-12-24 2016-06-30 Space Data Corporation Techniques for intelligent balloon/airship launch and recovery window location
WO2016105522A1 (en) 2014-12-24 2016-06-30 Space Data Corporation Breaking apart a platform upon pending collision
US10059421B2 (en) 2014-12-30 2018-08-28 Space Data Corporation Multifunctional balloon membrane
US9760734B2 (en) * 2015-06-26 2017-09-12 Sap Se Catalog-based user authorization to access to multiple applications
US20170228225A1 (en) * 2016-02-05 2017-08-10 Honeywell International, Inc. System and method for preserving value and extending life of legacy software in face of processor unavailability, rising processor costs, or other issues
US9996328B1 (en) * 2017-06-22 2018-06-12 Archeo Futurus, Inc. Compiling and optimizing a computer code by minimizing a number of states in a finite machine corresponding to the computer code
US10481881B2 (en) * 2017-06-22 2019-11-19 Archeo Futurus, Inc. Mapping a computer code to wires and gates
US10853049B2 (en) * 2017-12-01 2020-12-01 Adp, Llc Methods for enabling a computer to migrate microservices and to perform microservice templating
US10747932B2 (en) * 2018-08-09 2020-08-18 International Business Machines Corporation Smart placement, visualization and optimization methodology for component placement and planning
US10901698B2 (en) * 2018-11-30 2021-01-26 International Business Machines Corporation Command tool development using a description file
US11429358B2 (en) * 2020-08-12 2022-08-30 Microsoft Technology Licensing, Llc Representing asynchronous state machine in intermediate code
US11435989B2 (en) 2020-08-25 2022-09-06 Microsoft Technology Licensing, Llc Thread-local return structure for asynchronous state machine

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5228137A (en) * 1985-10-29 1993-07-13 Mitem Corporation Method for controlling execution of host computer application programs through a second computer by establishing relevant parameters having variable time of occurrence and context
US5119465A (en) * 1989-06-19 1992-06-02 Digital Equipment Corporation System for selectively converting plurality of source data structures through corresponding source intermediate structures, and target intermediate structures into selected target structure
EP0456249B1 (en) * 1990-05-10 1998-12-09 Hewlett-Packard Company System for integrating application programs in a heterogeneous network enviroment
DE69232165T2 (en) * 1991-12-17 2002-07-11 Texas Instruments Inc Method and device for isolating data and components of information collections from other components in a distributed environment
EP0746816B1 (en) * 1993-08-03 2001-10-24 Sun Microsystems, Inc. Flexible multi-platform partitioning for computer applications
JP3190773B2 (en) * 1993-09-30 2001-07-23 日本電気株式会社 Compile processing method of language processing program

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
BERG K S: "Business objects done right", BYTE, APRIL 1995, USA, vol. 20, no. 4, ISSN 0360-5280, pages 175 - 176, XP002039049 *
CALLAHAN J R ET AL: "A PACKAGING SYSTEM FOR HETEROGENEOUS EXECUTION ENVIRONMENTS", IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, vol. 17, no. 6, 1 June 1991 (1991-06-01), pages 626 - 635, XP000260966 *
LADD D A ET AL: "A*:A LANGUAGE FOR IMPLEMENTING LANGUAGE PROCESSORS", PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER LANGUAGES, TOULOUSE, MAY 16 - 19, 1994, no. CONF. 5, 16 May 1994 (1994-05-16), INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, pages 1 - 10, XP000479355 *
LEYMANN F ET AL: "BUSINESS PROCESS MANAGEMENT WITH FLOWMARK", INTELLECTUAL LEVERAGE: DIGEST OF PAPERS OF THE SPRING COMPUTER SOCI INTERNATIONAL CONFERENCE (COMPCON), SAN FRANCISCO, FEB. 28 - MAR. 4, 1994, no. -, 28 February 1994 (1994-02-28), INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, pages 230 - 234, XP000479395 *
SCANDURA J M: "CONVERTING LEGACY CODE INTO ADA: A COGNITIVE APPROACH", COMPUTER, vol. 27, no. 4, 1 April 1994 (1994-04-01), pages 55 - 61, XP000447752 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1264254A1 (en) * 2000-03-14 2002-12-11 Eontec R & D Limited A transaction control system
US7519577B2 (en) 2003-06-23 2009-04-14 Microsoft Corporation Query intermediate language method and system
US9087085B2 (en) 2012-12-10 2015-07-21 International Business Machines Corporation Pre-assimilation values and post-assimilation values in hardware instance identifiers
CN112632133A (en) * 2020-12-31 2021-04-09 中国农业银行股份有限公司 Data link query method and device
CN112632133B (en) * 2020-12-31 2023-10-10 中国农业银行股份有限公司 Data link query method and device

Also Published As

Publication number Publication date
US5960200A (en) 1999-09-28
AU2822297A (en) 1997-11-26

Similar Documents

Publication Publication Date Title
US5960200A (en) System to transition an enterprise to a distributed infrastructure
US5754845A (en) Portable and dynamic distributed applications architecture
US6571282B1 (en) Block-based communication in a communication services patterns environment
US6434628B1 (en) Common interface for handling exception interface name with additional prefix and suffix for handling exceptions in environment services patterns
US6549949B1 (en) Fixed format stream in a communication services patterns environment
US7457815B2 (en) Method and apparatus for automatically providing network services
US6842906B1 (en) System and method for a refreshable proxy pool in a communication services patterns environment
US6477665B1 (en) System, method, and article of manufacture for environment services patterns in a netcentic environment
US6434568B1 (en) Information services patterns in a netcentric environment
US6601234B1 (en) Attribute dictionary in a business logic services environment
US20030058277A1 (en) A view configurer in a presentation services patterns enviroment
WO2001016727A2 (en) A system, method and article of manufacture for a locally addressable interface in a communication services patterns environment
WO2001016706A2 (en) System, method, and article of manufacture for an exception response table in environment services patterns
WO2001016735A2 (en) A system, method and article of manufacture for a globally addressable interface in a communication services patterns environment
WO2001016733A2 (en) System, method, and article of manufacture for a request batcher in a transaction services patterns environment
WO2001016729A2 (en) System, method, and article of manufacture for distributed garbage collection in environment services patterns
WO2001016705A2 (en) System, method, and article of manufacture for piecemeal retrieval in an information services patterns environment
WO2001016739A2 (en) System, method and article of manufacture for load balancing requests among servers
WO2001016734A2 (en) A system, method and article of manufacture for a self-describing stream in a communication services patterns environment
EP1259879A2 (en) A system, method and article of manufacture for a multi-object fetch component in an information services patterns environment
WO2001017195A2 (en) A system and method for stream-based communication in a communication services patterns environment
WO2001016724A2 (en) A system, method and article of manufacture for a legacy wrapper in a communication services patterns environment
WO2001016728A2 (en) A system, method and article of manufacture for business logic services patterns in a netcentric environment
WO2001016704A2 (en) System, method, and article of manufacture for a request sorter in a transaction services patterns environment
EP1222532A2 (en) A system, method and article of manufacture for a constant class component in a business logic services patterns environment

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH HU IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG US UZ VN YU AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 97540023

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA