-
公开(公告)号:US20160342651A1
公开(公告)日:2016-11-24
申请号:US14715662
申请日:2015-05-19
Applicant: International Business Machines Corporation
Inventor: Peter Bendel , Nicole Y. Finnie , Christian W. Hoerst , Knut Stolze
IPC: G06F17/30
CPC classification number: G06F17/30463 , G06F17/3051 , G06F17/30575 , G06F17/30592 , G06F21/6218 , G06F21/6236
Abstract: A method includes storing a first stored procedure in a first database management module and a second stored procedure in a second database management module, receiving by the first database management module a request to run a computational task with the first stored procedure, receiving a request to perform the computational task and in response thereto causing a first query optimizer in the first database management module to automatically compute a query execution plan for the first stored procedure, using the query execution plan to identify all first data containers on the first database management module that provide input data for the requested computational task, identifying a list of names of all second data containers mapped to the identified first data containers, and performing the second stored procedure using the list of names. A corresponding computer program product and data management system are also disclosed herein.
Abstract translation: 一种方法包括将第一存储过程存储在第一数据库管理模块中,第二存储过程存储在第二数据库管理模块中,由第一数据库管理模块接收与第一存储过程一起运行计算任务的请求, 执行计算任务并响应于此,使得第一数据库管理模块中的第一查询优化器自动计算第一存储过程的查询执行计划,使用查询执行计划来识别第一数据库管理模块上的所有第一数据容器, 提供所请求的计算任务的输入数据,识别映射到所识别的第一数据容器的所有第二数据容器的名称列表,以及使用名称列表执行第二存储过程。 本文还公开了相应的计算机程序产品和数据管理系统。
-
公开(公告)号:US10387643B2
公开(公告)日:2019-08-20
申请号:US16050172
申请日:2018-07-31
Applicant: International Business Machines Corporation
Inventor: Peter Bendel , Nicole Y. Finnie , Claus Kempfert , Knut Stolze
IPC: H04L9/00 , G06F21/53 , G06F16/178 , G06F16/242 , G06F21/62
Abstract: Securing invocation of stored procedures is provided herein. A first database management system (DBMS) can include a first database with first tables, a first user management module configured to manage privileges of database users (DB-users) of the first DBMS, and at least one first stored procedure. A second DBMS can include a second database with second tables, a second user management module configured to manage privileges of DB-users of the second DBMS, and at least one second stored procedure, the at least one second stored procedure configured to perform a computational task in the second DBMS. A synchronization mapping can map at least a portion of the first tables to respective ones of the second tables. Thus, a transfer of data of at least some of the first tables to the respective ones of the second tables in accordance with the synchronization-mapping can be performed.
-
公开(公告)号:US20180336347A1
公开(公告)日:2018-11-22
申请号:US16050209
申请日:2018-07-31
Applicant: International Business Machines Corporation
Inventor: Peter Bendel , Nicole Y. Finnie , Claus Kempfert , Knut Stolze
CPC classification number: G06F21/53 , G06F17/30174 , G06F17/30415 , G06F21/6218 , G06F21/6227 , G06F21/629 , G06F2221/034
Abstract: Securing invocation of stored procedures is provided herein. A first database management system (DBMS) can include a first database with first tables, a first user management module configured to manage privileges of database users (DB-users) of the first DBMS, and at least one first stored procedure. A second DBMS can include a second database with second tables, a second user management module configured to manage privileges of DB-users of the second DBMS, and at least one second stored procedure, the at least one second stored procedure configured to perform a computational task in the second DBMS. A synchronization mapping can map at least a portion of the first tables to respective ones of the second tables. Thus, a transfer of data of at least some of the first tables to the respective ones of the second tables in accordance with the synchronization-mapping can be performed.
-
公开(公告)号:US09952855B2
公开(公告)日:2018-04-24
申请号:US14849999
申请日:2015-09-10
Applicant: International Business Machines Corporation
Inventor: Nicole Y. Finnie , Christian W. P. Hoerst , Johannes S. Kern
CPC classification number: G06F8/70 , G06F8/447 , G06F11/3664 , G06F11/3672
Abstract: In an approach for testing a software application on a target system, a computer provides a test framework being executed on a test framework system, the system being coupled with the target system via network and receives a test scenario by the test framework, the scenario including information regarding a software application to be tested, the target system on which said software application should be executed and regarding one or multiple protocols supported by the target system. The computer interprets information included in said scenario by said test framework and deriving properties associated with at least one software application to be generated based on said information interpretation. The computer then generates an executable software application in a programming language, said application being adapted to the target system by using said derived software application properties. The computer triggers execution of said application thereby obtaining test results, and evaluates said results.
-
公开(公告)号:US20160170863A1
公开(公告)日:2016-06-16
申请号:US14849999
申请日:2015-09-10
Applicant: International Business Machines Corporation
Inventor: Nicole Y. Finnie , Christian W.P. Hoerst , Johannes S. Kern
CPC classification number: G06F8/70 , G06F8/447 , G06F11/3664 , G06F11/3672
Abstract: In an approach for testing a software application on a target system, a computer provides a test framework being executed on a test framework system, the system being coupled with the target system via network and receives a test scenario by the test framework, the scenario including information regarding a software application to be tested, the target system on which said software application should be executed and regarding one or multiple protocols supported by the target system. The computer interprets information included in said scenario by said test framework and deriving properties associated with at least one software application to be generated based on said information interpretation. The computer then generates an executable software application in a programming language, said application being adapted to the target system by using said derived software application properties. The computer triggers execution of said application thereby obtaining test results, and evaluates said results.
Abstract translation: 在用于在目标系统上测试软件应用程序的方法中,计算机提供在测试框架系统上执行的测试框架,该系统通过网络与目标系统耦合,并且由测试框架接收测试场景,该场景包括 关于要测试的软件应用的信息,应该执行所述软件应用的目标系统以及与目标系统支持的一个或多个协议。 计算机通过所述测试框架解释包括在所述场景中的信息,并且基于所述信息解释来导出与要生成的至少一个软件应用相关联的属性。 然后,计算机以编程语言生成可执行软件应用程序,所述应用程序通过使用所述导出的软件应用程序属性来适应目标系统。 计算机触发所述应用程序的执行,从而获得测试结果,并评估所述结果。
-
公开(公告)号:US09886482B2
公开(公告)日:2018-02-06
申请号:US15180398
申请日:2016-06-13
Applicant: International Business Machines Corporation
Inventor: Peter Bendel , Nicole Y. Finnie , Christian W. Hoerst , Knut Stolze
CPC classification number: G06F17/30463 , G06F17/3051 , G06F17/30575 , G06F17/30592 , G06F21/6218 , G06F21/6236
Abstract: A method includes storing a first stored procedure in a first database management module and a second stored procedure in a second database management module, receiving by the first database management module a request to run a computational task with the first stored procedure, receiving a request to perform the computational task and in response thereto causing a first query optimizer in the first database management module to automatically compute a query execution plan for the first stored procedure, using the query execution plan to identify all first data containers on the first database management module that provide input data for the requested computational task, identifying a list of names of all second data containers mapped to the identified first data containers, and performing the second stored procedure using the list of names. A corresponding computer program product and data management system are also disclosed herein.
-
公开(公告)号:US20160342654A1
公开(公告)日:2016-11-24
申请号:US15180398
申请日:2016-06-13
Applicant: International Business Machines Corporation
Inventor: Peter Bendel , Nicole Y. Finnie , Christian W. Hoerst , Knut Stolze
CPC classification number: G06F17/30463 , G06F17/3051 , G06F17/30575 , G06F17/30592 , G06F21/6218 , G06F21/6236
Abstract: A method includes storing a first stored procedure in a first database management module and a second stored procedure in a second database management module, receiving by the first database management module a request to run a computational task with the first stored procedure, receiving a request to perform the computational task and in response thereto causing a first query optimizer in the first database management module to automatically compute a query execution plan for the first stored procedure, using the query execution plan to identify all first data containers on the first database management module that provide input data for the requested computational task, identifying a list of names of all second data containers mapped to the identified first data containers, and performing the second stored procedure using the list of names. A corresponding computer program product and data management system are also disclosed herein.
-
公开(公告)号:US10210327B2
公开(公告)日:2019-02-19
申请号:US16050209
申请日:2018-07-31
Applicant: International Business Machines Corporation
Inventor: Peter Bendel , Nicole Y. Finnie , Claus Kempfert , Knut Stolze
Abstract: Securing invocation of stored procedures is provided herein. A first database management system (DBMS) can include a first database with first tables, a first user management module configured to manage privileges of database users (DB-users) of the first DBMS, and at least one first stored procedure. A second DBMS can include a second database with second tables, a second user management module configured to manage privileges of DB-users of the second DBMS, and at least one second stored procedure, the at least one second stored procedure configured to perform a computational task in the second DBMS. A synchronization mapping can map at least a portion of the first tables to respective ones of the second tables. Thus, a transfer of data of at least some of the first tables to the respective ones of the second tables in accordance with the synchronization-mapping can be performed.
-
公开(公告)号:US20180365413A1
公开(公告)日:2018-12-20
申请号:US16050172
申请日:2018-07-31
Applicant: International Business Machines Corporation
Inventor: Peter Bendel , Nicole Y. Finnie , Claus Kempfert , Knut Stolze
CPC classification number: G06F21/53 , G06F16/178 , G06F16/2443 , G06F21/6218 , G06F21/6227 , G06F21/629 , G06F2221/034
Abstract: Securing invocation of stored procedures is provided herein. A first database management system (DBMS) can include a first database with first tables, a first user management module configured to manage privileges of database users (DB-users) of the first DBMS, and at least one first stored procedure. A second DBMS can include a second database with second tables, a second user management module configured to manage privileges of DB-users of the second DBMS, and at least one second stored procedure, the at least one second stored procedure configured to perform a computational task in the second DBMS. A synchronization mapping can map at least a portion of the first tables to respective ones of the second tables. Thus, a transfer of data of at least some of the first tables to the respective ones of the second tables in accordance with the synchronization-mapping can be performed.
-
公开(公告)号:US10095861B2
公开(公告)日:2018-10-09
申请号:US14951936
申请日:2015-11-25
Applicant: International Business Machines Corporation
Inventor: Peter Bendel , Nicole Y. Finnie , Claus Kempfert , Knut Stolze
Abstract: Securing invocation of stored procedures is provided herein. A first database management system (DBMS) can include a first database with first tables, a first user management module configured to manage privileges of database users (DB-users) of the first DBMS, and at least one first stored procedure. A second DBMS can include a second database with second tables, a second user management module configured to manage privileges of DB-users of the second DBMS, and at least one second stored procedure, the at least one second stored procedure configured to perform a computational task in the second DBMS. A synchronization mapping can map at least a portion of the first tables to respective ones of the second tables. Thus, a transfer of data of at least some of the first tables to the respective ones of the second tables in accordance with the synchronization-mapping can be performed.
-
-
-
-
-
-
-
-
-