Extracting data from a blockchain network

    公开(公告)号:IL287252D0

    公开(公告)日:2021-12-01

    申请号:IL28725221

    申请日:2021-10-13

    Abstract: The invention relates to a method for a model-driven extraction of event data representing an event occurring on a blockchain network by a computational device with access to the blockchain network. The computational device is configured as an ETL-device for executing an ETL-code to modify a data content of an external data structure external of the blockchain network using the extracted event data. The method comprising detecting the event, determining an event schema, providing and executing a the ETL-code. The ETL-code comprises machine-executable instructions for extracting the event data representing the detected event, transforming the extracted event data using the event schema to comply with a data model defining a logical structure of the external data structure and loading the transformed data to the external data structure to modify the data content of the external data structure.

    Extracting data from a blockchain network

    公开(公告)号:AU2020261982A1

    公开(公告)日:2021-09-30

    申请号:AU2020261982

    申请日:2020-03-19

    Applicant: IBM

    Abstract: The invention relates to a method for a model-driven extraction of event data representing an event occurring on a blockchain network by a computational device with access to the blockchain network. The computational device is configured as an ETL-device for executing an ETL-code to modify a data content of an external data structure external of the blockchain network using the extracted event data. The method comprising detecting the event, determining an event schema, providing and executing a the ETL-code. The ETL- code comprises machine-executable instructions for extracting the event data representing the detected event, transforming the extracted event data using the event schema to comply with a data model defining a logical structure of the external data structure and loading the transformed data to the external data structure to modify the data content of the external data structure.

    KOGNITIVE DATENANONYMISIERUNG
    13.
    发明专利

    公开(公告)号:DE112018004946T5

    公开(公告)日:2020-07-23

    申请号:DE112018004946

    申请日:2018-10-23

    Applicant: IBM

    Abstract: Ein computerimplementiertes Verfahren für Datenanonymisierung umfasst: Empfangen einer Anfrage nach Daten, die einer Anonymisierung bedürfen. Die Anfrage weist mindestens einen Felddeskriptor abzurufender Daten und ein Verwendungsszenario eines Nutzers für die angefragten Daten auf. Auf Grundlage des Verwendungsszenarios wird dann ein Anonymisierungsalgorithmus ermittelt, der auf die Daten anzuwenden ist, auf die sich der Felddeskriptor bezieht. Anschließend wird der ermittelte Anonymisierungsalgorithmus auf die Daten angewendet, auf die sich der Felddeskriptor bezieht. Es erfolgt ein Testen, ob der Anonymisierungsgrad eine das Verwendungsszenario betreffende Anforderung erfüllt. Falls die Anforderung erfüllt wird, wird Zugriff auf die anonymisierten Daten bereitgestellt.

    Associating restore points of a program with execution states and data stored in memory.

    公开(公告)号:GB2507287A

    公开(公告)日:2014-04-30

    申请号:GB201219102

    申请日:2012-10-24

    Applicant: IBM

    Abstract: Disclosed is a method by which restore points can be determined for an in-memory application, the application having several states during its execution. At least one state is associated with data stored in a memory of the host computer and is being accessed by the application. The method determines a first restore point of the application, the first restore point representing a first time point in the execution time associated with a first state of the at which the application accesses the data stored in a first group of memory locations, wherein the access is performed using first addresses and first pointers to contents in the first group of memory locations. The first addresses and first pointers are stored in a first data structure. Then the method assigns a first restore point identifier to the first restore point, then stores the first restore point identifier in a first entry of a second data structure of the computer. Finally the method associates, in the first data structure, the first addresses to second pointers to contents in a second group of memory locations. Thereby redirecting writing operations into the first group of memory locations to the second group of memory locations after the first restore point determination.

    EXTRACTING DATA FROM A BLOCKCHAIN NETWORK

    公开(公告)号:SG11202109836QA

    公开(公告)日:2021-10-28

    申请号:SG11202109836Q

    申请日:2020-03-19

    Applicant: IBM

    Abstract: The invention relates to a method for a model-driven extraction of event data representing an event occurring on a blockchain network by a computational device with access to the blockchain network. The computational device is configured as an ETL-device for executing an ETL-code to modify a data content of an external data structure external of the blockchain network using the extracted event data. The method comprising detecting the event, determining an event schema, providing and executing a the ETL-code. The ETL-code comprises machine-executable instructions for extracting the event data representing the detected event, transforming the extracted event data using the event schema to comply with a data model defining a logical structure of the external data structure and loading the transformed data to the external data structure to modify the data content of the external data structure.

    EXTRACTING DATA FROM A BLOCKCHAIN NETWORK

    公开(公告)号:CA3137242A1

    公开(公告)日:2020-10-29

    申请号:CA3137242

    申请日:2020-03-19

    Applicant: IBM

    Abstract: The invention relates to a method for a model-driven extraction of event data representing an event occurring on a blockchain network by a computational device with access to the blockchain network. The computational device is configured as an ETL-device for executing an ETL-code to modify a data content of an external data structure external of the blockchain network using the extracted event data. The method comprising detecting the event, determining an event schema, providing and executing a the ETL-code. The ETL- code comprises machine-executable instructions for extracting the event data representing the detected event, transforming the extracted event data using the event schema to comply with a data model defining a logical structure of the external data structure and loading the transformed data to the external data structure to modify the data content of the external data structure.

    Refactoring of databases to include soft type information

    公开(公告)号:GB2521198A

    公开(公告)日:2015-06-17

    申请号:GB201322053

    申请日:2013-12-13

    Applicant: IBM

    Abstract: A method of refactoring or normalising databases to convert soft type information, e.g. tuples of or columns of XML data into hard type information, comprising: profiling the soft type data to generate an attribute list with mapping suggestions to a hardened database structure; generating a data model definition and extract, transform, and load logic for transforming the soft type data based on the attribute list and mapping suggestions; executing the data model definition to create a new or modified database structure; moving data from an existing database structure to the new or modified database structure; and regenerating a services interface for access to the data.

    Creating a backup image of a first memory space in a second memory space.

    公开(公告)号:GB2505185A

    公开(公告)日:2014-02-26

    申请号:GB201214854

    申请日:2012-08-21

    Applicant: IBM

    Abstract: Disclosed is a computer implemented method of creating a backup of data by a computer system. The method starts by assigning a first memory space in a main memory to data and loading the data into the first memory space, and allocating a second memory space in the main memory to act as container of an image of the first memory space. Next, an image is created and stored in the second memory space, as well as a copy of the image is stored in non-volatile storage media. The storing of the backup image is executed in accordance with a set of predefined back-up rules. Also, disclosed is a method of restoring the data. The restoring method comprising reading an image from the second memory space or the non-volatile memory according to a set of predefined restore rules. Then copying the read image to the first memory space. The images may be snap-shots of an application running on the computer system.

    Discovering composite keys
    20.
    发明专利

    公开(公告)号:GB2505183A

    公开(公告)日:2014-02-26

    申请号:GB201214851

    申请日:2012-08-21

    Applicant: IBM

    Abstract: A computer-implemented method for detecting one or more multi-column composite key column sets, the method comprising: accessing (102) a plurality of first columns (Pl-P3); selecting (104) two or more of the first columns for use as a current set (218) of candidate columns; determining (106), by comparing object-identifiers stored in association with parameter values of the candidate columns with each other, if for the current sec of candidate columns at least one tuple (219) of parameter values exists whose parameter values are respectively stored in association with two or more shared ones of the object identifiers; in case said at least one tuple does not exist, identifying (110) the current candidate column set as a multi-column composite key column set; otherwise, replacing (112) the second candidate column by another selected one of the first columns or adding said other selected one of the first columns to the candidate column set.

Patent Agency Ranking