Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

476 results about "Data access layer" patented technology

A data access layer (DAL) in computer software, is a layer of a computer program which provides simplified access to data stored in persistent storage of some kind, such as an entity-relational database. This acronym is prevalently used in Microsoft environments.

Dynamic caches with miss tables

A middle-tier Web server with a queryable cache that contains items from one or more data sources. Items are included in the cache on the basis of the probability of future hits on the items. When the data source determines that an item that has been included in the cache has changed, it sends an update message to the server, which updates the item if it is still included in the cache. In a preferred embodiment, the data source is a database system and triggers in the database system are used to generate update messages. In a preferred embodiment, the data access layer determines whether a data item required by an application program is in the cache. If it is, the data access layer obtains the item from the cache; otherwise, it obtains the item from the data source. The queryable cache includes a miss table that accelerates the determination of whether a data item is in the cache. The miss table is made up of miss table entries that relate the status of a data item to the query used to access the data item. There are three statuses: miss, indicating that the item is not in the cache, hit, indicating that it is, and unknown, indicating that it is not known whether the item is in the cache. When an item is referenced, the query used to access it is presented to the table. If the entry for the query has the status miss, the data access layer obtains the item from the data source instead of attempting to obtain it from the cache. If the entry has the status unknown, the data access layer attempts to obtain it from the cache and the miss table entry for the item is updated in accordance with the result. When a copy of an item is added to the cache, miss table entries with the status miss are set to indicate unknown.
Owner:ORACLE INT CORP

Integrated high-performance application software architecture and construction method thereof

The invention relates to the field of development of computer application software, in particular to an integrated high-performance application software architecture and a construction method thereof. The integrated high-performance application software architecture comprises a WEB layer cluster, a backend application cluster, a database cluster and a message-oriented middleware cluster, wherein the WEB layer cluster supports a J2EE cluster technology and is used for providing the capacity of a business presentation layer of a J2EE frame; the backend application cluster supports the J2EE cluster technology and is used for providing the processing capacity of a business logic layer of the J2EE frame; the database cluster supports the J2EE cluster technology and is used for providing the capacity of a data access layer of the J2EE frame; and the message-oriented middleware cluster supports the J2EE cluster technology and is used for providing the message communication capacity between distributed J2EE components. Based on the integrated high-performance application software architecture and the construction method thereof, a software architect and a developer can determine a software scheme and a deployment scheme within short time and provides high-performance application service; and a J2EE application system designed according to the software architecture can meet the requirements on high availability, extensibility and fault tolerance.
Owner:武汉烽火普天信息技术有限公司

Hybrid-mode smartphone application development framework

The invention discloses a hybrid-mode smartphone application development framework. The development framework comprises a JS SDK framework, a client framework and a server framework; the JS SDK framework comprises a control layer, an interface layer and a scheduling layer; the control layer comprises a built-in component module and a built-in control module; the interface layer comprises a friendly interface and a JS subscription interface; the scheduling layer comprises a JS interface scheduler and a WebviewJsBridge object module; the client framework is used for providing an operating environment for a web page of a Hybrid APP in an offline package page mode; the server framework comprises a server control layer, a service layer and a data access layer; the server control layer is used for connection and interaction between operation on the page and a bottom layer; the service layer is connected into a kernel in a plug-in form to provide support for the server control layer; and the data access layer is connected into the kernel in a plug-in form to provide a network request and sqlite data operation. The development framework provides a whole set of solution for rapid iterative development, online deployment and building block type integration of application programs according to functional requirements.
Owner:GUANGZHOU TIANGAO SOFTWARE TECH CO LTD

Hadoop-based k-means clustering analysis system and method of network security log

The invention provides a hadoop-based k-means clustering analysis system and method of a network security log. The hadoop-based k-means clustering analysis system comprises a log data acquisition subsystem, a log data mixing mechanism storage management subsystem and a log data analysis subsystem. The method includes the steps that in a data storage layer, a mixing storage mechanism with Hadoop cooperating with a traditional data warehouse is adopted to store log data, a Hive operation interface is provided in a data access layer, the data storage layer and a computing layer receive instructions from a Hive engine, and efficient query analysis on the data is achieved by being matched with MapReduce through HDFS; when mining analysis is conducted on log data, MapReduce is adopted to conduct clustering mining analysis on the network security log through a k-means algorithm; the framework with the Hadoop cooperating with the traditional data warehouse is adopted, the detects of the traditional data warehouse on the aspects of mass data processing, storage and the like, and meanwhile an original traditional data warehouse is fully used; clustering analysis is conducted through the MapReduce-based k-means algorithm, and safety grade evaluation and early warning can be conducted on log data timely.
Owner:NORTHWEST UNIV(CN)

Configurable method for automatically generating database and accessing data

The invention discloses a configurable method for automatically generating a database and accessing data. The configurable method includes converting a UML (unified modeling language) class image designed in a business requirement analysis stage into an XML (extensible markup language) file; generating metadata information by means of analyzing and reading the XML file; selecting a used database and used business processing language by means of selecting a configuration file by a user; generating a database template, an entity class template and a data access class template; and generating a database, an entity class and a data access class of a system by the aid of a generator of the system according to the metadata information and the generated templates. The metadata information includes basic attributes including the accessibility, the name and the type of an object. By the aid of the configurable method, the UML class image is converted to the database, the entity class, the data access class and the like, accordingly, the database and a data access layer can adapt to change of the object and change of the attributes of the object, when the type of the database and the business processing language are changed, only the design of the UML class image needs to be modified to regenerate a database and a data access layer, and extensibility and maintainability of the system are improved.
Owner:BEIJING YUCHEN SHIMEI SCI & TECH

Internet of things heterogeneous data storage method and system

ActiveCN103312791AWith data redundancyScalableTransmissionThe InternetManagement efficiency
The invention discloses an Internet of things heterogeneous data storage method and a storage system. The internet of things heterogeneous data storage method comprises the steps that various types of data are stored in a column-based mode through an HBase distributed storage system, an MySQL metadatabase carries out registration management on the stored data, and finally the data access layer is configured in a centralized manner, so that applications based on the database can use the unified data interface. According to the Internet of things heterogeneous data storage method and the storage system, the unified storage mode is adopted through the unified data interface, the storage of different types of data and data from different sources is effectively supported; the column-oriented storage mechanism is extended by utilizing the HBase technology, so that the storage volume can be extended horizontally; the memory mapping file mechanism is adopted to effectively improve the storage and management efficiency of large files; and the data redundancy storage technology is adopted to greatly improve the system reliability and the accessibility. The Internet of things heterogeneous data storage method and the storage system can well solve the storage problem of various types of data, has efficient storage and utilization capability on large files, and is also low in cost and high in robustness.
Owner:上海和伍物联网系统有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products