The present subject mater relates to configuring computer systems and, more particularly, to data migration.
As software applications are used by organizations, large amounts of data are generated and stored. With many applications, the data is stored in a proprietary format of the application used to generate the data. Other applications store data in proprietary database architectures. Thus over time, it becomes more and more difficult for an organization to transition to different applications.
The difficulty of transitioning between applications can come from the size of effort necessary to move data from legacy systems to a new system. The size of effort can require a large amount of human resources, time, and cost. Further, there can be exposure for an organization choosing to transition to a new application. As a result, not only are organizations discouraged from such transitions due to difficulties related to the scale of such projects, organizations that are not comfortable with the exposure are even more reluctant to make an application transition.
Thus, absent a solution that can reduce application transition difficulties, cost, and exposure, organizations will continue to be reluctant to transition from legacy applications.
The embodiments described herein provide solutions to many of the issues involved with transitioning between software applications, such as Enterprise Resource Planning (“ERP”) applications. Some of these embodiments may obtain information descriptive of an organization's legacy systems. These embodiments may further obtain information descriptive of how the organization would utilize a new application. A data migration planning method may then propose a data migration plan to move or copy data from legacy systems to the new application if implemented. However, some embodiments may include proposing a data integration plan that allows all or part of the legacy data to remain where it is currently stored, but directs the new application to access the data from that location.
In some embodiments, this data migration plan may propose use of application “plugins” that may execute within, or on the data of, the legacy application to move or copy data to the new application. The data migration process may also propose use of other data migration tools or processes. Some such proposed processes may include a proposed manual process that specifies a file format to extract from a legacy system. Some such proposals may specify the file format to extract based on a process that may be executed to import a file to the new application according to the specified format. In other embodiments, the data migration plan may provide instructions for manually causing a file extracted according to the specified format to the new application.
In some embodiments, the data migration planner may included as a part of a new application to be transitioned to. However, the architecture of the data migration planner allows augmentation by third parties. Such augmentation may include additional data migration requirements, data migration tools, legacy system identification questions, and other items as provided by third parties.
Such embodiments may reduce, or at least mask, the complexity of such application transitions. Further, utilization of existing tools that have not only been tested, but also previously used to make such application transitions, mitigates exposure from such large projects. Additionally, if an organization chooses to follow the data migration plan, the skill of a user executing the plan may be lower because the amount of experience and skill necessary to move or copy the data are minimized. These and other embodiments are described in greater detail below.
In the following detailed description, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific embodiments in which the inventive subject matter may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice them, and it is to be understood that other embodiments may be utilized and that structural, logical, electrical, or other changes may be made without departing from the scope of the inventive subject matter. Such embodiments of the inventive subject matter may be referred to, individually and/or collectively, in the present application by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed.
The following description is, therefore, not to be taken in a limited sense, and the scope of the inventive subject matter is defined by the appended claims.
The functions or algorithms described in the present application are implemented in hardware, software or a combination of software and hardware in one or more embodiments. The software comprises computer executable instructions stored on computer readable media such as memory or other type of storage devices. Further, such functions correspond to modules, which may be one or more, or a combination of, software, hardware, or firmware. Multiple functions are performed in one or more modules as desired, and the embodiments described are merely examples. The software may be executed on a digital signal processor, ASIC, microprocessor, or other type of processor operating on a system, such as a personal computer, server, a router, or other device capable of processing data including devices interconnected by a network.
Some embodiments implement the functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the exemplary process flow is applicable to software, firmware, and hardware implementations.
In the following detailed description, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific embodiments in which the inventive subject matter may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice them, and it is to be understood that other embodiments may be utilized and that structural, logical, electrical, or other changes may be made without departing from the scope of the inventive subject matter. Such embodiments of the inventive subject matter may be referred to, individually and/or collectively, in the present application by the term “invention” merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed.
The following description is, therefore, not to be taken in a limited sense, and the scope of the inventive subject matter is defined by the appended claims.
The functions or algorithms described in the present application are implemented in hardware, software or a combination of software and hardware in one or more embodiments. The software comprises computer executable instructions stored on computer readable media such as memory or other type of storage devices. Further, such functions correspond to modules, which may be one or more, or a combination of, software, hardware, or firmware. Multiple functions are performed in one or more modules as desired, and the embodiments described are merely examples. The software may be executed on a digital signal processor, ASIC, microprocessor, or other type of processor operating on a system, such as a personal computer, server, a router, or other device capable of processing data including devices interconnected by a network.
Some embodiments implement the functions in two or more specific interconnected hardware modules or devices with related control and data signals communicated between and through the modules, or as portions of an application-specific integrated circuit. Thus, the exemplary process flow is applicable to software, firmware, and hardware implementations.
The application configuration environment 102 is a system 100 environment within which an application can be configured. However, the application will, or does, execute within the application execution environment 104. In some embodiments, this arrangement of the application configuration environment 102 and the application execution environment 104 separates the configuration of an application from the environment within which it executes. When an application configuration has been established, all or part of the configuration can then be deployed to the application execution environment 104. This deployment can occur to one or more separate instance of the application in the application execution environment 104. Although only a single application execution environment 104 is illustrated, multiple application execution environments 104 can exist, and the deployment can be made to one or more of the multiple application execution environments 104.
The configuration scoping application 202 typically is a software tool that executes on a computing device, such as a portable computer, on a same computing device within which the application configuration environment 102 exists, or on another computing device that can be communicatively coupled to the application configuration environment 102.
The configuration scoping application 202, when executed, typically presents a set of scoping questions to a user. The scoping questions ma be linked to one of many adaptation catalog entries. The adaptation catalog entries may include a representation of all of the solution capabilities of an application to be configured, and eventually executed. In some embodiments, the solution capabilities are hierarchically divided into areas, packages, topics, and options. There may be multiple areas, and each area may have multiple packages. Each package may have multiple topics, and each topic may have multiple options.
In some embodiments, such as in an example embodiment where the application to be configured is an ERP application, the adaptation catalog may provide in the area Sales, a package Customer Order Management that contains the topics Sales Order Quote, Sales Order, Sales Order Analysis, and others. On that level, one or more options typically exist such as Approval Processing.
In the configuration scoping application 202, as stated above, scoping question may be linked to an adaptation catalog entry. An adaptation catalog entry further includes a rule. These rules typically model dependencies between the areas, packages, topics, and options and corresponding solution capabilities of the application. A rule can may specify required inclusion or exclusion of other areas, packages, topics, or options, or may require specification of further areas, packages, topics, or options. A rule may also specify a recommendation or default area, package, topic, or option.
For example, a first example scoping question, “What is the primary focus of your business?” may have three possible answers including “Sales,” “Service,” and “Logistics.” Such a first scoping question typically is aimed at identifying an area of business in which the application is going to be used. Answering “Sales” typically tells the configuration scoping application 202 that the area is “Sales” and a rule tied to the adaptation catalog entry for “Sales” specifies dependencies with packages, topics, and options and the corresponding solution capabilities of the application necessary or optional in using the application in a sales business. Such a rule can also specify that other packages, topics, and options and the corresponding solution capabilities be excluded.
Thus, when a user answers scoping questions, the configuration of the application is being performed. Further, when a question is answered that is associated with an adaptation catalog entry having a rule that excludes another area, package, topic, or option, that rule may be applied to eliminate questions from consideration. Conversely, when a question is answered that is associated with an adaptation catalog entry having a rule that requires another area, package, topic, or option, that same rule may be applied to determine a next question, or group of questions, to ask a user. However, in the event that a question is not answered that is linked to a rule providing defaults, the question may be skipped without adversely affecting the application configuration.
In some embodiments, such as the embodiment of the system 200, the scoping questions further include a group of questions that request information regarding legacy systems to be replaced or augmented by an application. This group of questions requests and receives input through one or more user interfaces of the configuration scoping application 202. The answers to these questions identify systems, applications operating the systems, and data stores, such as databases, file storage, and other data storage mechanisms, that hold data on the systems that is accessed by the applications. In some embodiments, the questions further receive data necessary for connecting to the data stores. This information, once obtained, is made available to the data migration planner 204, which determines, and provides as output, a data migration plan to move, copy, or integrate data from legacy applications and data stores to the new application.
The configuration scoping application 202, in some embodiments, may include a deduction engine 212, and an adaptation catalog 214′. In this embodiment, the configuration scoping application 202 may further include a solution proposal and estimate engine 216, a data migration planner 218, data migration tools 219, and an input cache 220.
The application configuration environment 102, in some embodiments, may include an adaptation catalog 214, a content repository 222, and a configuration package repository 224. In some such embodiments, the application configuration environment 102 may further include a scoping input database 226, a configuration workspace 118, and a deployment module 230.
The adaptation catalog 214 may include a representation of all of the solution capabilities of an application to be configured, and eventually executed. Each capability of an application to be configured is identified in an adaptation catalog 214 entry. The adaptation catalog 214 entries each may be identified as an area, package, topic, or option and may be organized in a hierarchy with a child identifying the parent. An example hierarchy is a “General Ledger” capability, which in some embodiments typically is a package having two topics, “cash based” and “accrual based” which are two application capabilities within the “General Ledger” capability. In some embodiments, the adaptation catalog 214′ entries may be encoded in a markup language, such as eXtensible Markup Language (“XML”), or by another proprietary standard or open standards based encoding standard.
The adaptation catalog 214 entries may further include scoping questions directed toward obtaining scoping information to determine what areas, packages, topics, and options are relevant to the user's needs. Additionally, the adaptation catalog entries typically include rules, the application of which can require inclusion or exclusion, or specify default inclusion or exclusion, of certain other areas, packages, topics, and options. Thus, because the areas, packages, topics, and options correlate to application capabilities, the inclusion, exclusion, and defaulting specifies what capabilities will be enabled and disabled in the application when deployed.
In some embodiments, rules and entries in the adaptation catalog can be linked to a configuration package that exists in the configuration package repository 224. A configuration package includes one or more configuration settings that enable or disable functionality of the application when deployed.
In one embodiment, the rules may be applied by the deduction engine 212 of the configuration scoping application 202. The configuration scoping application 202 typically presents a user interface to a user that requests answers to questions. The questions asked via the user interface are identified by the deduction engine 212 based on the adaptation catalog 214′. The adaptation catalog 214′ is typically a copy of the adaptation catalog 214 of the application configuration environment 102. When an answer is received, the answer may be stored in the input cache 220 of the configuration scoping application 202. The deduction engine 212 then typically applies the rule associated with the adaptation catalog 214′ entry of the question asked to the received answer. Through the application of the rule, in view of answers already received and rules already applied, the deduction engine 212 may be configured to identify a next question to ask. The identified question typically is then presented to the user through the user interface. This process may be configured to continue until either all of the questions have been asked or the user is out of time. If questions remain that have not been answered, the process can be continued at a later time or rules specifying default areas, packages, topics, and options in order to supply enough information to allow deployment of the application in a functional form.
In some embodiments, the configuration scoping application 207 further includes a data migration planner 218. In such embodiments, one or more additional scoping questions typically can be asked. These additional scoping questions may be directed toward obtaining information from the user about legacy systems and how data is stored within them. In some embodiments, the questions simply ask what systems are currently in use. In other embodiments, the questions are more detailed to obtain information such as what type of database a system is utilizing and what type of customization has been made or custom systems developed. In some embodiments, the scoping questions request information to identify one or more of data source types, data source connectivity information, location of certain data items within a data source, data item types, and information describing one or more data items. The data migration planner 218 typically uses the answers to these additional questions to propose a data migration plan to the new application.
The data migration planner 218, in some embodiments, may evaluate the answers to the scoping questions to identify legacy systems utilized and how the data is stored. The data migration planner 218 may also evaluates the scoping question answers to identify what data is needed, and in what form, in an application to be deployed, or otherwise proposed. The data migration planner 218 then typically makes a data migration plan recommendation utilizing one or more data migration tools 219. A copy of the data migration plan may be stored in the configuration workspace 228 or other data storage location accessible within or to the application configuration environment 102.
The data migration tools 219, in some embodiments, typically include a representation of one or more tools that may be utilized to migrate data from a legacy application to the new application. Such tools may include legacy application plugins that execute within a legacy system to move or copy data. Some tools also include a data migration process recommendation for extraction of files from a legacy system and uploading to the files to the data stores of the new application. Some other tools include integration tools that operate between a legacy application and the new application to facilitate sharing of data between the two applications. Other tools and tool types are contemplated as well. Such other tools typically include tools developed by third parties that leverage an open architecture of the system 210 to facilitate data migration and integration between a legacy application and the new application.
In some embodiments, the configuration scoping application 202 includes a solution proposal and estimate engine 216. The solution proposal and estimate engine 216 may be used in a sales situation. For example, if a sales person is discussing with a sales lead what a certain application product can do for the sales lead, the sales person typically can utilize the configuration scoping application 202 to obtain information about the needs of the sales lead via the scoping questions. The scoping question answers may then be utilized by the solution proposal and estimate engine 216 to make an initial determination of what will be involved if the sales lead decides to purchase the application. The solution proposal and estimate engine 216 normally is configured to output information for the sales lead to make several determinations, such as the size of effort necessary to implement or transition to the application from legacy system, the cost involved, and cost. In some embodiments, the output of the solution proposal and estimate engine 216 outputs one or more of an implementation cost estimate, an application solution proposal, and a recommended project roadmap. In some embodiments, the solution proposal and estimate engine 216 outputs a proposal for one or more other options, application descriptions, sales literature, benefit statements of using the application, and addition documents, such as a proposal of key performance indicators the application can monitor to assist in managing the application or enterprise of the sales lead.
After the scoping question have been answered, the answers, and any other information obtained from a sales lead or other user of the configuration scoping application 202, the information typically is uploaded to the application configuration environment 102. However, in embodiments, where the configuration scoping application 202 executes on the same computing device as the application configuration environment 202, the scoping question answers and other information may be stored directly to the application configuration environment 102.
When the configuration question answers and other information is uploaded, or otherwise stored to the application environment 102, the scoping question answers are stored to the scoping input database 226. The scoping question answers, in some instances, will be referred to interchangeably as the “scoping information.”
After the scoping information is within the scoping input database 226, a process within the application configuration environment 102 may execute to begin configuring an application in the configuration workspace 228. The configuration workspace typically includes a set of configuration tables that mirrors, at least in part, the configuration tables of the application.
The process that configures the application may determine one or more configuration packages to instantiate in the configuration workspace 228. Configuration packages, in some embodiments, may include one or a set of configuration settings to enable or disable certain capabilities of the application. Configuration packages, as mentioned above, may be linked to adaptation catalog 214 entries and rules associated with adaptation catalog entries. Thus, the process that configures the application in the configuration workspace 228 may be configured to query the scoping information in the scoping input database 226 to identify configuration packages to instantiate.
In some embodiments, demonstration data may exist to facilitate instantiation of a demonstration instance of the application for a sales lead, training session, or other purpose. The demonstration data, in some embodiments, is linked to one or more configuration packages from the configuration package repository 224. The demonstration data typically exists in the content repository 222 so that it can be copied into a set of application tables in the data repository 244 of the configuration workspace 228. These tables may hold such data as transactional data, operational data, master data, or other data that can exist in the application when the application is ready for execution or is executed.
Once the demonstration data is copied to the data repository 244, that data may be fine-tuned to more closely match the intended use of the demonstration data. For example, the system may be configured so that a sales person, or other individual, can fine-tune demonstration data values to more closely match a sales lead's expectations of the application. Such fine tuning may include modifying sales order documents in the demonstration data to include a name, address, and logo of the sales lead's enterprise, or other similar modifications to the demonstration data.
After the application has been configured in the configuration workspace and the demonstration data, if any, is ready, the configuration typically is deployed by the deployment module 230. The deployment module 230 may be configured to deploy configuration settings to a baseline application that has already been instantiated in an application execution environment. In some embodiments, the deployment module includes a configuration setting deployment process, an activation process, and a data deployment process. The configuration setting deployment process typically copies configuration settings from configuration tables in the configuration workspace 228. The data deployment process may be configured to execute if there is demonstration data in the configuration workspace 228. If there is demonstration data, the data typically is copied from the configuration workspace 228 to application tables in the application execution environment. Some embodiments further utilize the activation process.
The activation process, in some of such embodiments, executes to activate the application in the application execution environment after it has been successfully deployed. In some instances, the activation process requires an activation key, message, code, or other authorization from an activation authority to activate the application. The activation authority may be configured to include one or more of a number of individuals or entities. An example of an activation authority is an entity selling the application to be activated. This activation functionality requiring an activation key or other mechanism can be utilized for several purposes. Some of such purposes typically include allowing the entity selling the application to ensure the application is properly configured, has passed certain testing necessary for the entity to ensure it will meet guaranteed service level agreements or objectives, for billing purposes, or other purposes that can benefit from such an activation process.
In some embodiments, the deployment module 230 further includes a delta deployment process that is relevant only after an application has already been deployed. When an application is deployed, or subsequently modified, the scoping information in the scoping input database 226 typically is updated. In some embodiments, enables tracking of a current configuration of a deployed application. In embodiments including the delta deployment process, the scoping information typically is further tracked on a historical basis to at least allow a view of a current configuration and a modified configuration not yet deployed, if applicable. The delta deployment process then typically uses that historical tracking of the application configuration to identify changes between the current application configuration and the modified configuration not yet deployed. The delta deployment process then normally only deploys the changes to the application configuration.
The application execution environment 104 is a data processing environment within which an application, or an application to be deployed, can execute. When deploying an application, the deployment module 230 needs to know what application execution environment 104 and what application instance within that environment to deploy to. In embodiments including only one application execution environment 104, the application execution environment 104 may already be known. Similarly, in an application execution environment including only a single application instance, the instance may already be known.
Each instance of the application (i.e., application instances A, B, . . . X) typically includes a set of identical configuration tables which can include distinct configuration settings from one another. In some embodiments, multiple instances of the application exist to provide a development instance, a test instance, and a production instance. In such embodiments where there are multiple application instances, the deployment module 230 may be configured to deploy the configuration settings from one of the application instances in the application execution environment 104 to another application in the same or another application execution environment 104. Although the deployment module 230 is illustrated as being a part of the application configuration environment 102, the deployment module 230, in other embodiments, can be a standalone application or a part of another application or process.
The data migration process 302, in some embodiments, in configured to migrate legacy data 304 to application instance data 306. In some such embodiments, the data migration process 302 may be a legacy application plugin, or other process, that executes within the legacy application to migrate the data. In other embodiments, the data migration process 302 may be a plugin, or other process, that executes within an application instance to migrate the data. In yet further embodiments, the data migration process 302 may be a data integration process that makes data from the legacy system available to an application instance and vice-versa.
The data migration process 302, in some embodiments, is configured to identify data to migrate based upon the data migration plan stored in the configuration workspace 228 of the application execution environment 102. In some such embodiments, the data migration plan may identify not only data items to move, but any data item type conversions that might be necessary, such as converting a string data item type to an integer or a string data item length.
Some embodiments may include more than one data migration process 302. In such embodiments, the data migration processes may be of varying types. For example, one data migration process 302 may be an application plugin, while another data migration process 302 may be a standalone application that executes to move or copy data between applications.
In some embodiments, the data migration process 302 may be leveraged for additional purposes. One such purpose may be to move data from application instance, such as application instance A, to another application instance, such as application instance B. Such a move may be useful when performing application instance upgrades or for copying data from a production instance to a test or development instance.
The data migration planning question answers identify customer data source information. The customer data source information can include one or more of data source type, data source connectivity information, locations of data items within the data source, data item types, data item descriptive information, and other data source information. In some embodiments, the data migration planning question answers provide information to identify data sources within one or more customer legacy applications and target application data destinations for the customer data.
The method 400, in yet further embodiments, includes providing a recommendation of one or more data migration tools to migrate data from the customer legacy applications to the target application, wherein recommended data migration tools are identified as a function of the data migration planning question answers and scoping information. The plan to migrate the customer data from the legacy application to a target application can include a file format for at least a portion of the customer data and identify a data loading process to load data from a file in the file format to the target application.
Computer-readable instructions stored on a computer-readable medium are executable by the processing unit 502 of the computer 510. A hard drive, CD-ROM, and RAM are some examples of articles including a computer-readable medium. For example, a computer program 525 capable of providing a generic technique to perform access control check for data access and/or for doing an operation on one of the servers in a component object model (COM) based system according to the teachings of the present invention may be included on a CD-ROM and loaded from the CD-ROM to a hard drive. The computer-readable instructions allow computer 510 to provide generic access controls in a COM based computer network system having multiple users and servers.
It is emphasized that the Abstract is provided to comply with 37 C.F.R. §1.72(b) requiring an Abstract that will allow the reader to quickly ascertain the nature and gist of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims.
In the foregoing Detailed Description, various features are grouped together in a single embodiment to streamline the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments of the invention require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment.
It will be readily understood to those skilled in the art that various other changes in the details, material, and arrangements of the parts and method stages which have been described and illustrated in order to explain the nature of this invention may be made without departing from the principles and scope of the invention as expressed in the subjoined claims.
Number | Name | Date | Kind |
---|---|---|---|
4079452 | Larson et al. | Mar 1978 | A |
4501528 | Knapp | Feb 1985 | A |
5307499 | Yin | Apr 1994 | A |
5459868 | Fong | Oct 1995 | A |
5680624 | Ross | Oct 1997 | A |
5754845 | White | May 1998 | A |
5758062 | McMahon et al. | May 1998 | A |
5857102 | McChesney et al. | Jan 1999 | A |
5978579 | Buxton et al. | Nov 1999 | A |
6044461 | Agha et al. | Mar 2000 | A |
6067525 | Johnson et al. | May 2000 | A |
6128730 | Levine | Oct 2000 | A |
6161123 | Renouard et al. | Dec 2000 | A |
6161176 | Hunter et al. | Dec 2000 | A |
6185587 | Bernardo et al. | Feb 2001 | B1 |
6189139 | Ladd | Feb 2001 | B1 |
6301710 | Fujiwara | Oct 2001 | B1 |
6324578 | Cox et al. | Nov 2001 | B1 |
6397232 | Cheng-Hung et al. | May 2002 | B1 |
6449624 | Hammack et al. | Sep 2002 | B1 |
6453302 | Johnson et al. | Sep 2002 | B1 |
6466972 | Paul et al. | Oct 2002 | B1 |
6470464 | Bertram et al. | Oct 2002 | B2 |
6513045 | Casey et al. | Jan 2003 | B1 |
6523027 | Underwood | Feb 2003 | B1 |
6539372 | Casey et al. | Mar 2003 | B1 |
6538668 | Ruberg et al. | May 2003 | B1 |
6728877 | Mackin et al. | Apr 2004 | B2 |
6804709 | Manjure et al. | Oct 2004 | B2 |
6810401 | Thompson et al. | Oct 2004 | B1 |
6868392 | Ogasawara | Mar 2005 | B1 |
7031951 | Mancisidor et al. | Apr 2006 | B2 |
7181731 | Pace et al. | Feb 2007 | B2 |
7228326 | Srinivasan et al. | Jun 2007 | B2 |
7299382 | Jorapur | Nov 2007 | B2 |
7340411 | Cook | Mar 2008 | B2 |
7360211 | Hyden et al. | Apr 2008 | B2 |
7376682 | Ramacher et al. | May 2008 | B2 |
7426694 | Gross et al. | Sep 2008 | B2 |
7487231 | Brown et al. | Feb 2009 | B2 |
7526457 | Duevel et al. | Apr 2009 | B2 |
7540014 | Vasishth et al. | May 2009 | B2 |
7593124 | Sheng et al. | Sep 2009 | B1 |
7599895 | Nugent | Oct 2009 | B2 |
7606840 | Malik | Oct 2009 | B2 |
7610582 | Becker et al. | Oct 2009 | B2 |
7617256 | Mohamed et al. | Nov 2009 | B2 |
7640542 | Herenyi et al. | Dec 2009 | B2 |
7657887 | Kothandaraman et al. | Feb 2010 | B2 |
7665082 | Wyatt et al. | Feb 2010 | B2 |
7685577 | Pace et al. | Mar 2010 | B2 |
7716634 | Ross et al. | May 2010 | B2 |
7725877 | Andrade et al. | May 2010 | B2 |
20010044834 | Bradshaw et al. | Nov 2001 | A1 |
20010054091 | Lenz et al. | Dec 2001 | A1 |
20020026572 | Joory | Feb 2002 | A1 |
20020095663 | Joory | Jul 2002 | A1 |
20020099578 | Eicher et al. | Jul 2002 | A1 |
20020116373 | Nishikawa et al. | Aug 2002 | A1 |
20020138570 | Hickey | Sep 2002 | A1 |
20020147784 | Gold et al. | Oct 2002 | A1 |
20020188625 | Jans et al. | Dec 2002 | A1 |
20030005411 | Gerken | Jan 2003 | A1 |
20030115292 | Griffin et al. | Jun 2003 | A1 |
20030135842 | Frey et al. | Jul 2003 | A1 |
20030227392 | Ebert et al. | Dec 2003 | A1 |
20030237093 | Marsh et al. | Dec 2003 | A1 |
20040019669 | Viswanath et al. | Jan 2004 | A1 |
20040019670 | Viswanath et al. | Jan 2004 | A1 |
20040060047 | Talati et al. | Mar 2004 | A1 |
20040088691 | Hammes et al. | May 2004 | A1 |
20040111417 | Goto et al. | Jun 2004 | A1 |
20040176996 | Powers et al. | Sep 2004 | A1 |
20040186927 | Eryurek et al. | Sep 2004 | A1 |
20040268342 | Hyden et al. | Dec 2004 | A1 |
20050007964 | Falco et al. | Jan 2005 | A1 |
20050044215 | Cohen et al. | Feb 2005 | A1 |
20050044546 | Niebling et al. | Feb 2005 | A1 |
20050080801 | Kothandaraman et al. | Apr 2005 | A1 |
20050086195 | Tan et al. | Apr 2005 | A1 |
20050108219 | De La Huerga | May 2005 | A1 |
20050108707 | Taylor et al. | May 2005 | A1 |
20050138558 | Duevel et al. | Jun 2005 | A1 |
20050160419 | Alam et al. | Jul 2005 | A1 |
20050188422 | Jooste | Aug 2005 | A1 |
20050193103 | Drabik | Sep 2005 | A1 |
20050262076 | Voskuil | Nov 2005 | A1 |
20050262499 | Read | Nov 2005 | A1 |
20050268282 | Laird | Dec 2005 | A1 |
20050278202 | Broomhall et al. | Dec 2005 | A1 |
20050278280 | Semerdzhiev et al. | Dec 2005 | A1 |
20060047793 | Agrawal et al. | Mar 2006 | A1 |
20060184917 | Troan et al. | Aug 2006 | A1 |
20060224637 | Wald | Oct 2006 | A1 |
20060234698 | Fok et al. | Oct 2006 | A1 |
20060248450 | Wittenberg et al. | Nov 2006 | A1 |
20060253588 | Gao et al. | Nov 2006 | A1 |
20070006161 | Kuester et al. | Jan 2007 | A1 |
20070025704 | Tsukazaki et al. | Feb 2007 | A1 |
20070074203 | Curtis et al. | Mar 2007 | A1 |
20070093926 | D. Braun et al. | Apr 2007 | A1 |
20070097975 | Rakers et al. | May 2007 | A1 |
20070157185 | Semerdzhiev et al. | Jul 2007 | A1 |
20070157192 | Hoefler et al. | Jul 2007 | A1 |
20070168065 | Nixon et al. | Jul 2007 | A1 |
20070198437 | Eisner et al. | Aug 2007 | A1 |
20070234274 | Ross et al. | Oct 2007 | A1 |
20070257715 | Semerdzhiev et al. | Nov 2007 | A1 |
20080059474 | Lim | Mar 2008 | A1 |
20080059490 | Sattler et al. | Mar 2008 | A1 |
20080059537 | Sattler et al. | Mar 2008 | A1 |
20080059630 | Sattler et al. | Mar 2008 | A1 |
20080071555 | Sattler et al. | Mar 2008 | A1 |
20080071718 | Sattler et al. | Mar 2008 | A1 |
20080071828 | Sattler et al. | Mar 2008 | A1 |
20080071839 | Sattler et al. | Mar 2008 | A1 |
20080082517 | Sattler et al. | Apr 2008 | A1 |
20080126448 | Sattler et al. | May 2008 | A1 |
20080127082 | Birimisa et al. | May 2008 | A1 |
20080127084 | Sattler et al. | May 2008 | A1 |
20080127085 | Sattler et al. | May 2008 | A1 |
20080127086 | Sattler et al. | May 2008 | A1 |
20080127123 | Sattler et al. | May 2008 | A1 |
20080195579 | Kennis et al. | Aug 2008 | A1 |
20090024990 | Singh et al. | Jan 2009 | A1 |
20090157455 | Kuo et al. | Jun 2009 | A1 |
20100082518 | Gaffga et al. | Apr 2010 | A1 |
20100153443 | Gaffga et al. | Jun 2010 | A1 |
20100153468 | Lange et al. | Jun 2010 | A1 |
Number | Date | Country |
---|---|---|
2004287972 | Oct 2004 | JP |
WO-2004114130 | Dec 2004 | WO |
WO-2005045670 | May 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20080126375 A1 | May 2008 | US |