![]() APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF DATABASES.
专利摘要:
公开号:BE1020921A4 申请号:E201300315 申请日:2013-05-08 公开日:2014-09-02 发明作者: 申请人:Combell Group Nv; IPC主号:
专利说明:
Title: Application for the efficient configuration and management of databases j! A. Description A.l. Technical domain The present invention relates to an IT system for an efficient installation and management of IT systems for databases, which are made available to users via a physical, virtual or wireless network. More specifically, it concerns a specific set-up of an IT environment from which administrators of such systems are offered the opportunity to manage different database platforms, systems and applications simultaneously, as well as to users and users of databases and database applications. to manage and use such databases and applications efficiently. A.2. Background Art 1. Until today, most of the internet-based applications are installed and data stored on a computer connected to an internal network and / or to the internet, from where they are made accessible to and made available to all or certain users of these applications and data. In most cases this concerns one or a limited number of physical machines that is or are capable of controlling or managing various applications and processes. 2. Various applications and processes are usually housed and controlled from these physical machines (commonly referred to as "servers"), such as receiving, storing and sending e-mails, storing and making websites available, etc. In both For example, individual software applications are installed on one physical machine (in both cases a mail server and a Web server) that the administrator (s) of the installed applications must configure, manage and maintain separately. 3. These physical machines can be owned by a company that specializes in providing such data and applications (a so-called "hosting company"). If the machines are also the property of the owner of the data and the applications, but are located at a hosting company because of the fact that it has a suitable environment, this is called "housing". 4. In order to be able to easily locate and assign the data and the applications made available via the network to the owner (and users) thereof, this data and applications, both of which can be intrinsically different in nature, are often placed on a single machine. 5. Such an arrangement intrinsically entails a number of significant limitations and risks, including: (i) the failure of the physical machine automatically means that the various software applications, processes and data are no longer made available to users , and in the worst case are even permanently lost. Such failures can be the result of a technical problem inside the machine itself, or an external factor such as fire, power outages, etc .; For such situations or incidents, different solutions are traditionally possible, which entail all technical difficulties, human intervention and increased costs: making backup copies (so-called backups) of the applications and data installed on the physical machine at different times or made available, which should be placed on another physical server in the event of the failure of the physical server, and thus be made available again to users. This solution has several disadvantages: the data must be copied at repeated times; the copies must be kept at a different location; if the physical machine fails, the last backups must be retrieved and installed on a new physical machine to be configured such as the initial physical machine, etc. Such acts also entail intrinsically that additional costs must be incurred by the manager or owner of the server no longer functioning, the temporary unavailability of potentially critical applications and data for users, and in most cases also the loss of the latter version of this data (namely those that were created since the creation of the last backup). Another possible solution is to permanently have another physical machine available at a different location that always has a complete copy of the applications, processes and data made available on the initial server. It goes without saying that such an arrangement may entail considerable additional costs for the owner or manager of these servers, since it is not only necessary to invest in one but in two or even several physical machines, the purchase of multiple applications licenses and the provided with a permanent network connection between the different servers. Ideally, these physical machines should also be placed at different physical locations, to cope with the impact of major disasters (eg devastating company fire). (ii) Since the physical server must be connected to the Internet or to another network in order to perform the above-mentioned tasks, the failure of the network connection also results in the applications, processes and data available on the Web server - albeit temporarily , until the time when the connection is restored - no longer available to users. Hence also the reason why the different physical servers are connected to different information society service providers, and in particular those companies that provide access to the internet or install private networks and make them available to users, which also entails significant additional costs for the owner or managers of the servers; 6. In all cases mentioned above, the owner or managers of the various physical machines / servers must be responsible for the installation, configuration and permanent management of not only the physical machines (eg the replacement of network connections, hard disks, memory modules, edm) but also the software applications, processes and data that are installed on the machines and made available to users. This often implies - in particular for business-critical applications - the need for permanent personnel to be able to carry out technical interventions (at both hardware and software level). In addition, such personnel must always be aware of the latest developments in hardware, applications and processes offered by the service providers, but at the same time they must continue to support potentially outdated technology purchased by users. 7. The ubiquitous availability of high-capacity networks, the fact that costs for computers and storage devices are coming under increasing pressure, as well as the widespread introduction of virtualization of hardware, IT-based architecture, autonomous and utility computing to a huge growth in cloud computing. 8. This virtualization means that keeping an IT system (platform, applications, processes and data) available does not depend on being available to a single physical machine (server), but that tasks are divided between different physical machines. In this way the so-called "single point of failure" risk is taken care of: in such a case the failure of the machine on which all platforms, applications, processes and data are housed would result in none of these elements being accessible anymore . 9. In autonomous computing (or "autonomy computing"), system administrators install applications on the various physical machines, allowing these machines to autonomously manage the various components required for the processes being monitored (e.g., storage space, connectivity, processor capacity, computer memory) In this way, these different processes and sources can be used in a more efficient way. 10. Utility computing involves the provision of various IT services as individual products, whereby users do not pay for hardware, but only for the actual sources that they use. Hereby, customers of such service packages are paid for the processes and resources that are used, rather than for (the rent of) physical machines. Utility computing therefore formed the basis on which cloud computing was developed. 11. The evolution that cloud computing has entailed therefore essentially involves the virtualization of physical equipment, network connectivity and software applications and processes, as well as data that can be created, consulted and modified with the help of these applications and processes. In the context of cloud computing, the various applications, processes and data are not hosted or controlled on a single server, but on different (physical) servers. 12. These physical servers are housed in a network that is therefore configured to make decisions on the basis of the demand for specific data or processes regarding the number of locations where this data is stored, the number of copies made of this data, and the way in which this data is made available. For example, a data file that is frequently consulted (but not modified) will be made available on different physical machines in the network. 13. Consequently, any preparation of an information society service involving the management and making available of data requires a distinction to be made between the above three elements in the service, usually referring to "layers": an infrastructure layer , a platform layer, and an application layer. 14. In the first place, the service provider must make a choice about which infrastructure he or she offers. This is often a combination of hardware (servers, network connections, etc.) and software that is installed and configured on this hardware. The choice of the infrastructure often determines the choice of the platform to be placed on top of this infrastructure. 15. The platform usually involves the so-called management system of the systems to be set up, in addition to the interfaces used by managers of these systems to install, configure and manage computer applications. The platform is therefore usually this layer in a computer infrastructure that is used to make applications available to users. In turn, the chosen platform is often determining for the applications that can be installed on the IT system, in which programming language these applications should be written, etc. 16. It is mainly the applications that are relevant to users, since they come into direct contact with these elements, work, create data, change them and make them available to others if necessary. In most cases, users only sporadically or only indirectly come into contact with the actual platform or infrastructure, since these last two layers have a critical but purely supportive function for the correct and permanent functioning of the applications. 17. The most important common feature of each of the above categories of information society services is that they are all based on the concept that IT infrastructures, platforms, applications, processes and data directly or indirectly related to them upon request can be made available to the user via secure or non-secured channels, such as the internet, or otherwise, remotely (ie without the service provider and the user having to be at the same physical location). 18. From the above categories, certain specific applications, functions and functionalities can also be supplied separately as a service, in some cases even independent of the way in which the infrastructure or platform is managed and used. 19. The invention described and claimed herein relates to an IT system that manages various databases, database platforms, systems, and applications. 20. In practice there are different types of database platforms, systems and applications that are responsible for configuring and managing databases, each with their own advantages and disadvantages, and each also focused on specific applications. 21. However, since there are different IT infrastructures, managers of such infrastructures have to make choices between the different database systems, platforms and the applications used to manage these systems and platforms. In particular, when these system administrators manage different types of database platforms and systems, they must take into account important constraints imposed by the infrastructures, platforms, systems and applications they set up. 22. The choices made by a manager are mainly inspired by the fact that different customers of databases wish to set up separate configurations of such databases, which compels managers and / or customers to provide separate installations of the same database platforms, systems and applications. 23. The consequence of this is that a single IT infrastructure contains several installations of the same database platforms, systems and applications, each with their own specific characteristics, functions and functionalities. This also entails various problems for its manager, who - for example when a new update or version of a certain database platform, system, or application is made available by the manufacturer - does not affect all its customers must offer only the possibility to install this new release or version, but must also perform separate installations of this release or update for every customer who wishes to use it. 24. This logically means that - over time - the management of the various database platforms, systems and applications becomes unclear, both for the system administrator and for its customers. 25. In view of this problem, system administrators therefore offer their customers a limited choice of database platforms, systems and applications. 26. One of the solutions offered for this is to offer a multitude of systems on different IT infrastructures, but this usually has a negative impact on the (efficient) management of the systems offered: flexibility in the scalability of each individual system is limited, migration from one system to another system is often difficult, administrators often risk losing sight of which customers and users are using which system, administrators are difficult to respond to changing needs of customers and users by rigid configurations of such systems, etc. 27. The objective of the invention described herein is to allow a system administrator to offer different database platforms, systems and applications to customers and users with different needs and technical backgrounds, eliminating the inefficiencies described above. A.3. Description of the invention 28. The invention described herein relates to an IT system that provides for more efficient and personalized installation, configuration and management of one or more database platforms, systems and applications, both for the manager of such systems and for the customers and their users. 29. This system consists of a set of interdependent and independent processes with the aim of: (i) eliminating certain disadvantages and difficulties of the technologies used and commercialized today, whereby users, based on their own level of knowledge , can make certain adjustments to the chosen IT infrastructure, platforms, applications, and processes in order to make optimal use of the services purchased; (ii) make the management of these IT infrastructures, platforms, applications, processes and data more efficient for system administrators; (iii) facilitate the expansion of these IT infrastructures, platforms, applications, processes, limiting "down-time" and, in some cases, eliminating them altogether, (iv) interdependence between the different IT platforms, - eliminate applications and processes that are managed and made available to users on a single IT infrastructure and give individual users or groups of users the opportunity to create individualized solutions and configurations of such platforms, applications, and - select and use processes independently of the underlying IT infrastructure (v) improve the functionality of the various processes, applications and data made available (vi) the speed of processing the various processes, applications and data made available to increase. 30. The IT system is an integrated set of physical machines and hardware and software components that detect changes to the IT system and autonomously optimizes the IT system in terms of operation, maintenance, security and use based on the parameters specified by the system administrator . These changes to the IT system may consist of the expansion or curtailment of the physical machines and components by the system administrator, as well as the provision by this manager of additional (new) versions of computer programs that are managed on the IT system and / or used. In view of the technical possibilities and limitations that these changes imply, the system, if appropriate instructed by the manager, will detect these changes to the system (autonomously) and provide them with the most optimal configuration possible based on these new elements. This optimization may involve moving to new physical machines certain (frequently used) data or applications (such as websites) in order to relieve the existing physical machines from which these data and applications were made available. versions of management systems, computer programs that control hardware (so-called "drivers"), databases, etc. that are made available via the management interface to the system administrator or the customer, without separate interventions on the individual machines that are part of the IT system are needed. 31. One of the most important components that form part of the invention therefore entails that existing and future users of one or more components relating to the hosting and making available of database platforms, applications, processes and data with using a single (graphical) interface. With the help of this interface, an authorized user can first of all make his own choices about the database platform (s), application (s), functionality (s) and / or process (s) that he wishes to use Thus it is possible for the user to make detailed choices himself about the necessary IT infrastructure, the platforms, applications, functionalities and processes to be used that are offered either as standard or can be supplied by him or third parties at the user's request. adjusted or parameterized. 32. In addition, based on parameters that can be set by the system administrator, the system will autonomously make suggestions and possibly even decide which database platform (s), applications], functionalities] and / or process fsen] or the most The system will take into account the specific profile of the user, his needs and knowledge, or autonomously add additional IT applications and / or functionalities to the configuration based on the parameters mentioned above. These parameters include in particular the following: the total volume of data traffic that is processed and managed by the system administrator infrastructures, platforms, applications, functionalities and data; - the total volume of data traffic reserved for the specific user; the applications, functionalities and nature of the data processed and made available by the system administrator and selected by the user; - the applications, functionalities and data made available by the system administrator and used by the user from third parties that have been integrated by the user into their own environment. Moreover, via the interface it can be determined when creating a new user for (a) specific database application (s) on which IT infrastructure, and / or platform this user and his application (s) can be served in the most optimal way , respectively managed and used. 33. If one or more limits set by the system administrator for a specific user or category of users are exceeded, the system will also be able to autonomously decide on one or more of the IT infrastructure employed by this user or users (u) r ( and), platform (s), application (s), functionality (s), process (s) and / or transfer data to other physical machines. This functionality has a number of advantages, both for the user (s) and the system administrator, namely: the services provided by the user are not interrupted during the migration; - the system administrator will only have to make limited changes to the existing IT infrastructure, namely the addition of physical machines, since the entire level is taken over by the level of the control and management system; - the system administrator will not have to configure the added physical machines, nor provide the necessary software, since the control and management system is responsible for the actual installation and parameterization of the newly added physical machine (s). 34. The benefits of this application are the following: (i) In the first place, the user and the application (s) activated or installed by him or her will always be able to enjoy the latest new versions, releases and functionalities provided by the system administrator is offered to all users at the same time without having to perform individual installations or configurations per user; (ii) In the second place, this application offers the IT infrastructure manager (s) on which one or more different database platforms, systems and / or applications are managed and uses the possibility and the flexibility to add additional or other servers to the server network, or to replace certain servers without affecting the settings or configurations of the other servers. With the help of this application, the server network administrator can manage his server network more optimally and efficiently. (iii) Thirdly, this application allows the server network administrator to gradually move certain servers or the entire network to one or more other physical locations in the event of any hardware problems, without this having a negative impact on the server network. data, applications and processes made available by the network to its users; (iv) Fourth, the system administrator is enabled to perform certain processes that are critical in providing databases, such as user authentication, receiving, storing and transmitting data, and making and making security copies of these. allocate data to one or more servers within the infrastructure (s) described above, which benefits the speed of processing of these processes, guarantees higher availability, in view of the specialization, and faster re-availability of data in case of errors in the data, the database platforms, systems and / or applications; (V) The migration of a database platform, system, and / or application, as well as the data in this database to another platform, system or application, and even from one system on a given infrastructure "A" to another system on a given infrastructure "B" can be done much more efficiently and faster; (vi) All this under a central management for the system administrator, whereby the recipient of the service is offered the possibility of carrying out self-determined interventions within the limitations imposed by the system administrator (and not necessarily only the infrastructure or the systems offered on it) are indicated. 35. This system also determines autonomously how incoming and outgoing data traffic should be managed, which data flows and instructions should be given priority, and which specific processes should be controlled. Such a system has several advantages. 36. In the first place, the system will autonomously control incoming data traffic (for the use or delivery of applications, processes or data) in such a way that the different servers within the network are burdened in an even way. Since users have the possibility to link priorities to certain data, processes and applications, the system also takes these preferences and qualifications into account and will manage and control the various data, processes and applications based on these parameters. . However, if it should appear that a particular server would be overloaded - which could be the case, for example, in an unlawful attempt to gain access to the infrastructure or make it unavailable (a so-called "distributed déniai of service attack" or "DDoS"), then the system will autonomously ensure that the data traffic is evenly distributed over a number of other points that grant access to the system, the applications, the processes and / or the data, or that it is isolated and directed to a server within the network that was specifically set up to prevent such unlawful attacks, and to centralize and answer (or not respond to) these requests. In this way, the entire infrastructure is never overloaded, nor is it possible to make this infrastructure completely or partially unavailable in such a way that legitimate users are hindered by this attack. 37. Second, the system decides autonomously, on the basis of the nature of the incoming requests, to query certain specific systems managed and made available by the service provider and the systems made available by them, pass on applications, processes and data to the applicant. Examples of such requests may have the following characteristics: electronic mail, search or inclusion of data in a database, requesting a web page, etc. 38. The application may also identify certain instructions given to the computer system and - in the event of an attempt to unlawfully break into the computer system, consult data, delete or modify - autonomously isolate this instruction and not execute it. The advantage of this application is that the management of security applications is considerably more efficient, that security incidents are avoided, and that human intervention in the event of a security incident is limited. 39. Subsequently, this arrangement offers the possibility to bundle the range of IT infrastructures, platforms, applications, functionalities and / or processes. As a result, different service packages can be developed that are aligned with one or more specific target groups or users, and this. based on the specific needs, needs and requests of these target groups and / or users. 40. This arrangement also offers the possibility to third parties who do not have the necessary IT infrastructure, hardware and software to, in their own name and for their own account, general or specific IT infrastructures, platforms, applications, bundle functionalities and / or processes and offer them to customers. 41. The service packages put together by system operators or resellers in accordance with margins 40 and 41 may include one or more specific services of the information society, which in turn can also be individually configured and parameterised. These specific services may include the provision of storage space, one or more websites, databases, e-mail addresses and storage space for emails, caching, etc. The configurations and parameters that can be set by the customer can include data volume, storage capacity, as well as specific functionalities, software, and hardware.
权利要求:
Claims (15) [1] A system responsible for the configuration and management of: a. A group of computers, each containing at least one memory module, network interface, and one or more central processing units ("central processing units" or "CPUs"), and which all are able to receive and answer orders for processing data; b. a network that includes the connection between the above computers; c. which have the purpose and function of receiving, sending, storing and making available databases and database data (collectively referred to as "environment"); wherein this system autonomously makes decisions about the way in which data flows are received, passed on and answered, as well as the initiation and answering of orders to receive, send, process and store database data in the broadest sense of the word, and the renewal or modification thereof, as well as the execution of these assignments and the storage of data; [2] 2. The system mentioned in Claim 1, which offers the possibility for the administrators of such systems to manage and offer different platforms, systems and applications for sending, receiving, managing and making available data, taking into account the various IT infrastructures, platforms, processes and protocols that are used or made available by databases; [3] 3. The system mentioned in Claim 1, which offers the possibility of configuring, adapting and making available to users various platforms, applications, processes and protocols that relate to databases and database data; [4] 4. The system mentioned in Claim 1, which offers the possibility for the administrators of the environment mentioned in Claim 1 to adjust, increase or increase the number of computers, processing units, storage media, memory modules, etc. that are part of the environment reduce without adversely affecting the environment as a whole or the individual components in particular, and without further human intervention being required in the configuration of the environment; [5] 5. The system mentioned in Claim 1, which offers the possibility for the administrators of the environment mentioned in Claim 1 to change or expand the network used by the administrator, without further human intervention being required at the configuration of the environment; [6] 6. The system mentioned in Claim 1, which offers the possibility for the administrators and users of the environment to add, change or modify applications offered through the environment to the environment without further human intervention is necessary for the configuration of the environment; [7] 7. The system stated in Claim 1, which autonomously determines the infrastructure (s), platform (s), applications and processes used in such a way based on the parameters specified by the administrator and the users of the environment to set up and configure the environment to be set up and used in the most efficient way possible, which efficiency is expressed in reduced energy consumption, faster response times of the various elements that are part of the environment, limitation of the capacity of the storage media and network , etc. [8] 8. An application, integrated or not integrated into the environment described in Claim 1, that allows the user to extend the network security applications of the environment provided by the information society service provider to the user's IT environment, including the ability to make adjustments to the settings of these applications; [9] 9. An application, whether or not integrated into the environment described in Claim 1, that allows the user to use the caching applications used by the information society service provider in his or her own environment [being the temporary storage and quickly making available certain data that is repeatedly and frequently requested in the short term) to be extended to the user's IT environment, including the possibility to make adjustments to the settings of these applications; [10] 10. An application that offers the possibility of making the environment described in Claim 1, whether or not extended with the applications described in Claim 7 and / or 8, available to other information society service providers, whereby they have the option of autonomously to compile service packages, including one or more elements included in the environment and applications described in Claims 1, 7 and 8, and to configure and offer these environments. [11] 11. An application that makes it possible for information society service providers who configure, manage and offer autonomous environments within the framework of an environment managed by another service provider as described in Claim 1, offering the possibility of making such an offer in their own the name and for its own account of the former service providers, and whereby any reference to the name of the actual manager / service provider can be removed from the technical and operational specifications and arrangement of the environments offered. [12] 12. An IT application that makes it possible to configure services packages based on the system stated in Claim 1, including the IT infrastructures, platforms, applications, processes and protocols made available through this system, and adjust; [13] 13. The IT application mentioned in Claim 12, on the basis of which the composite service packages as well as the underlying IT infrastructures, platforms, applications, processes and protocols can be managed; [14] 14. The IT application stated iri Claims 12 and 13 that collectively or individually manage the IT applications, processes and protocols made available by the administrator and / or user; [15] 15. The IT application stated in Claim 12 that manages IT applications, processes and protocols based on availability and load of the configured IT applications, processes and protocols, whereby the IT application is autonomous, but taking into account the settings stated in Claim 14, autonomously controls such processes in the most efficient manner.
类似技术:
公开号 | 公开日 | 专利标题 RU2666475C1|2018-09-07|Control and containers dispatching system CN101449559B|2013-08-21|Distributed storage US9705979B2|2017-07-11|Policy-based file management for a storage delivery network JP2019511051A|2019-04-18|Method, apparatus, computer program product, and data center facility for realizing non-intensive computing system US7584282B2|2009-09-01|Object-based service oriented architecture method, apparatus and media TWI473029B|2015-02-11|Extensible and programmable multi-tenant service architecture US7444395B2|2008-10-28|Method and apparatus for event handling in an enterprise US8019872B2|2011-09-13|Systems, methods and computer program products for performing remote data storage for client devices US20110282909A1|2011-11-17|Secregating anonymous access to dynamic content on a web server, with cached logons JP5584910B2|2014-09-10|Distributed storage US20090144183A1|2009-06-04|Managing user accounts for storage delivery network CN102985919B|2016-03-02|For the system and method for serialized data service AU2020220160B2|2021-07-01|System, method and computer-readable storage medium for customizable event-triggered computation at edge locations WO2019005400A1|2019-01-03|Access control manager configuration based on log files mining BE1020921A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF DATABASES. BE1020923A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF DNS DATA AND DOMAIN NAMES. BE1020920A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF ELECTRONIC MAIL. BE1020919A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF A INFORMATION SYSTEM FOR INFORMATION SOCIETY SERVICES. BE1020922A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF A SHARED HOSTING SYSTEM. US20130086623A1|2013-04-04|Systems and methods for establishing isolation between content hosting services executing on common support server CN110198346A|2019-09-03|Method for reading data, device, electronic equipment and readable storage medium storing program for executing US9612927B1|2017-04-04|Managing server processes with proxy files SE513538C2|2000-09-25|Method and apparatus of a data communication network in which services are provided EP1860846B1|2014-11-26|Method and devices for managing distributed storage WO2021030219A1|2021-02-18|System and method for tag based resource limits or quotas in a cloud infrastructure environment
同族专利:
公开号 | 公开日 BE1020921B1|2019-09-16|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
法律状态:
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 BE201300315|2013-05-08| BE20130315A|BE1020921B1|2013-05-08|2013-05-08|APPLICATION FOR EFFICIENT CONFIGURATION AND MANAGEMENT OF DATABASES.|BE20130315A| BE1020921B1|2013-05-08|2013-05-08|APPLICATION FOR EFFICIENT CONFIGURATION AND MANAGEMENT OF DATABASES.| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|