会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Extract, transform and load using metadata
    • 使用元数据提取,转换和加载
    • US08442935B2
    • 2013-05-14
    • US13076291
    • 2011-03-30
    • Aaron D. CottleJagan M. PeriSrinivasa R. BurugapalliVeerendra K. Koya
    • Aaron D. CottleJagan M. PeriSrinivasa R. BurugapalliVeerendra K. Koya
    • G06F17/00
    • G06F17/30563
    • The extract and transformation operation performed on multiple data sources. In the extract operation, a computing system periodically performs an extraction operation on the data sources, perhaps as defined by metadata. The transformation operation is performed on at least some the extracted data, and is periodically performed, perhaps also in a manner that is defined by metadata. When performing each iteration of the transformation operation, the computing system performs a transformation operation on valid data, marks other data as suspect (due to a dependency on data that is not present), and completes transformation on yet other data that had previously been marked as suspect or perhaps reaffirms its suspect status if the needed data is still not available.
    • 对多个数据源执行提取和转换操作。 在提取操作中,计算系统可以周期地对数据源执行提取操作,可能是由元数据定义的。 对至少一些提取的数据执行变换操作,并且可以也以也由元数据定义的方式周期性地进行。 当执行转换操作的每次迭代时,计算系统对有效数据执行变换操作,将其他数据标记为可疑(由于依赖于不存在的数据),并且对先前已被标记的其他数据完成转换 作为嫌疑人,或者如果所需数据仍然不可用,可能重申其可疑状态。
    • 4. 发明申请
    • EXTRACT, TRANSFORM AND LOAD USING METADATA
    • 使用元数据提取,变换和加载
    • US20120254103A1
    • 2012-10-04
    • US13076291
    • 2011-03-30
    • Aaron D. CottleJagan M. PeriSrinivasa R. BurugapalliVeerendra K. Koya
    • Aaron D. CottleJagan M. PeriSrinivasa R. BurugapalliVeerendra K. Koya
    • G06F17/30
    • G06F17/30563
    • The extract and transformation operation performed on multiple data sources. In the extract operation, a computing system periodically performs an extraction operation on the data sources, perhaps as defined by metadata. The transformation operation is performed on at least some the extracted data, and is periodically performed, perhaps also in a manner that is defined by metadata. When performing each iteration of the transformation operation, the computing system performs a transformation operation on valid data, marks other data as suspect (due to a dependency on data that is not present), and completes transformation on yet other data that had previously been marked as suspect or perhaps reaffirms its suspect status if the needed data is still not available.
    • 对多个数据源执行提取和转换操作。 在提取操作中,计算系统可以周期地对数据源执行提取操作,可能是由元数据定义的。 对至少一些提取的数据执行变换操作,并且可以也以也由元数据定义的方式周期性地进行。 当执行转换操作的每次迭代时,计算系统对有效数据执行变换操作,将其他数据标记为可疑(由于依赖于不存在的数据),并且对先前已被标记的其他数据完成转换 作为嫌疑人,或者如果所需数据仍然不可用,可能重申其可疑状态。