-
公开(公告)号:IL287252D0
公开(公告)日:2021-12-01
申请号:IL28725221
申请日:2021-10-13
Applicant: IBM , OBERHOFER MARTIN , MENTZEL FLORIAN , PHAM THE HIEN , THEVARAJAH THISHANTH
Inventor: OBERHOFER MARTIN , MENTZEL FLORIAN , PHAM THE HIEN , THEVARAJAH THISHANTH
Abstract: The invention relates to a method for a model-driven extraction of event data representing an event occurring on a blockchain network by a computational device with access to the blockchain network. The computational device is configured as an ETL-device for executing an ETL-code to modify a data content of an external data structure external of the blockchain network using the extracted event data. The method comprising detecting the event, determining an event schema, providing and executing a the ETL-code. The ETL-code comprises machine-executable instructions for extracting the event data representing the detected event, transforming the extracted event data using the event schema to comply with a data model defining a logical structure of the external data structure and loading the transformed data to the external data structure to modify the data content of the external data structure.
-
公开(公告)号:AU2020261982A1
公开(公告)日:2021-09-30
申请号:AU2020261982
申请日:2020-03-19
Applicant: IBM
Inventor: OBERHOFER MARTIN , MENTZEL FLORIAN , PHAM THE HIEN , THEVARAJAH THISHANTH
Abstract: The invention relates to a method for a model-driven extraction of event data representing an event occurring on a blockchain network by a computational device with access to the blockchain network. The computational device is configured as an ETL-device for executing an ETL-code to modify a data content of an external data structure external of the blockchain network using the extracted event data. The method comprising detecting the event, determining an event schema, providing and executing a the ETL-code. The ETL- code comprises machine-executable instructions for extracting the event data representing the detected event, transforming the extracted event data using the event schema to comply with a data model defining a logical structure of the external data structure and loading the transformed data to the external data structure to modify the data content of the external data structure.
-
公开(公告)号:DE112018004946T5
公开(公告)日:2020-07-23
申请号:DE112018004946
申请日:2018-10-23
Applicant: IBM
Inventor: MAIER ALBERT , OBERHOFER MARTIN , SAILLET YANNICK
IPC: G06F21/62
Abstract: Ein computerimplementiertes Verfahren für Datenanonymisierung umfasst: Empfangen einer Anfrage nach Daten, die einer Anonymisierung bedürfen. Die Anfrage weist mindestens einen Felddeskriptor abzurufender Daten und ein Verwendungsszenario eines Nutzers für die angefragten Daten auf. Auf Grundlage des Verwendungsszenarios wird dann ein Anonymisierungsalgorithmus ermittelt, der auf die Daten anzuwenden ist, auf die sich der Felddeskriptor bezieht. Anschließend wird der ermittelte Anonymisierungsalgorithmus auf die Daten angewendet, auf die sich der Felddeskriptor bezieht. Es erfolgt ein Testen, ob der Anonymisierungsgrad eine das Verwendungsszenario betreffende Anforderung erfüllt. Falls die Anforderung erfüllt wird, wird Zugriff auf die anonymisierten Daten bereitgestellt.
-
14.
公开(公告)号:GB2507287A
公开(公告)日:2014-04-30
申请号:GB201219102
申请日:2012-10-24
Applicant: IBM
Inventor: OBERHOFER MARTIN , UHL ANDREAS , TRINKS ANDREAS , NEEF ALEXANDER
IPC: G06F11/14
Abstract: Disclosed is a method by which restore points can be determined for an in-memory application, the application having several states during its execution. At least one state is associated with data stored in a memory of the host computer and is being accessed by the application. The method determines a first restore point of the application, the first restore point representing a first time point in the execution time associated with a first state of the at which the application accesses the data stored in a first group of memory locations, wherein the access is performed using first addresses and first pointers to contents in the first group of memory locations. The first addresses and first pointers are stored in a first data structure. Then the method assigns a first restore point identifier to the first restore point, then stores the first restore point identifier in a first entry of a second data structure of the computer. Finally the method associates, in the first data structure, the first addresses to second pointers to contents in a second group of memory locations. Thereby redirecting writing operations into the first group of memory locations to the second group of memory locations after the first restore point determination.
-
公开(公告)号:IL287252B2
公开(公告)日:2025-01-01
申请号:IL28725221
申请日:2021-10-13
Applicant: IBM , OBERHOFER MARTIN , MENTZEL FLORIAN , PHAM THE HIEN , THEVARAJAH THISHANTH
Inventor: OBERHOFER MARTIN , MENTZEL FLORIAN , PHAM THE HIEN , THEVARAJAH THISHANTH
Abstract: According to at least one embodiment, a method, computer system, and computer program product for model-driven extraction of event data by a computational device is provided. The present invention may include transforming event data of an event occurring on a blockchain network using an event schema to comply with a data model of an external data structure; mapping, based on the event schema and the data model, the event data to a logical structure of the external data structure; and loading the transformed event data to the external data structure to modify a data content of the external data structure based on the mapping.
-
公开(公告)号:SG11202109836QA
公开(公告)日:2021-10-28
申请号:SG11202109836Q
申请日:2020-03-19
Applicant: IBM
Inventor: OBERHOFER MARTIN , MENTZEL FLORIAN , PHAM THE HIEN , THEVARAJAH THISHANTH
Abstract: The invention relates to a method for a model-driven extraction of event data representing an event occurring on a blockchain network by a computational device with access to the blockchain network. The computational device is configured as an ETL-device for executing an ETL-code to modify a data content of an external data structure external of the blockchain network using the extracted event data. The method comprising detecting the event, determining an event schema, providing and executing a the ETL-code. The ETL-code comprises machine-executable instructions for extracting the event data representing the detected event, transforming the extracted event data using the event schema to comply with a data model defining a logical structure of the external data structure and loading the transformed data to the external data structure to modify the data content of the external data structure.
-
公开(公告)号:CA3137242A1
公开(公告)日:2020-10-29
申请号:CA3137242
申请日:2020-03-19
Applicant: IBM
Inventor: OBERHOFER MARTIN , MENTZEL FLORIAN , PHAM THE HIEN , THEVARAJAH THISHANTH
Abstract: The invention relates to a method for a model-driven extraction of event data representing an event occurring on a blockchain network by a computational device with access to the blockchain network. The computational device is configured as an ETL-device for executing an ETL-code to modify a data content of an external data structure external of the blockchain network using the extracted event data. The method comprising detecting the event, determining an event schema, providing and executing a the ETL-code. The ETL- code comprises machine-executable instructions for extracting the event data representing the detected event, transforming the extracted event data using the event schema to comply with a data model defining a logical structure of the external data structure and loading the transformed data to the external data structure to modify the data content of the external data structure.
-
公开(公告)号:GB2521198A
公开(公告)日:2015-06-17
申请号:GB201322053
申请日:2013-12-13
Applicant: IBM
Inventor: OBERHOFER MARTIN , LIMBURN JONATHAN , MILMAN IVAN MATTHEW , KANELLOS NICHOLAS
IPC: G06F17/30
Abstract: A method of refactoring or normalising databases to convert soft type information, e.g. tuples of or columns of XML data into hard type information, comprising: profiling the soft type data to generate an attribute list with mapping suggestions to a hardened database structure; generating a data model definition and extract, transform, and load logic for transforming the soft type data based on the attribute list and mapping suggestions; executing the data model definition to create a new or modified database structure; moving data from an existing database structure to the new or modified database structure; and regenerating a services interface for access to the data.
-
公开(公告)号:GB2505185A
公开(公告)日:2014-02-26
申请号:GB201214854
申请日:2012-08-21
Applicant: IBM
Inventor: OBERHOFER MARTIN , TRINKS ANDREAS , UHL ANDREAS , TAUSCH MICHAIL
IPC: G06F11/14
Abstract: Disclosed is a computer implemented method of creating a backup of data by a computer system. The method starts by assigning a first memory space in a main memory to data and loading the data into the first memory space, and allocating a second memory space in the main memory to act as container of an image of the first memory space. Next, an image is created and stored in the second memory space, as well as a copy of the image is stored in non-volatile storage media. The storing of the backup image is executed in accordance with a set of predefined back-up rules. Also, disclosed is a method of restoring the data. The restoring method comprising reading an image from the second memory space or the non-volatile memory according to a set of predefined restore rules. Then copying the read image to the first memory space. The images may be snap-shots of an application running on the computer system.
-
公开(公告)号:GB2505183A
公开(公告)日:2014-02-26
申请号:GB201214851
申请日:2012-08-21
Applicant: IBM
Inventor: OBERHOFER MARTIN , SAILLET YANNICK , NELKE SEBASTIAN , SEIFERT JENS
IPC: G06F17/30
Abstract: A computer-implemented method for detecting one or more multi-column composite key column sets, the method comprising: accessing (102) a plurality of first columns (Pl-P3); selecting (104) two or more of the first columns for use as a current set (218) of candidate columns; determining (106), by comparing object-identifiers stored in association with parameter values of the candidate columns with each other, if for the current sec of candidate columns at least one tuple (219) of parameter values exists whose parameter values are respectively stored in association with two or more shared ones of the object identifiers; in case said at least one tuple does not exist, identifying (110) the current candidate column set as a multi-column composite key column set; otherwise, replacing (112) the second candidate column by another selected one of the first columns or adding said other selected one of the first columns to the candidate column set.
-
-
-
-
-
-
-
-
-