There is significant variation in terms of the particular functions included in enterprise resource planning (ERP) products currently on the market. However, most applications in this category support some degree of integration across different segments of a business organization. For example, a given ERP application may include support for any or all of finance/accounting, manufacturing, sales, service, customer relationship management, and supply chain management operations, and this is even an incomplete list of potentially supported operations. In order to effectively support such broad functionality, a good ERP system will be robust enough to efficiently and effectively account for differences across sources of data associated with the various supported business operations.
Further, while different ERP systems will be implemented differently in terms of the particular hardware and network configuration, most ERP systems will employ a centralized database as a repository for information. Data is commonly retrieved by way of table access based on instructions embedded directly in code. The data retrieval processes often will vary depending at least upon usage and context (e.g., depending upon whether the data is for supporting a user interface, reporting, exposure through a web-service, etc.). Circumstances such as these make it difficult to effectively manage data at least because it is difficult to track and conceptualize where data access occurs, from what data sources and for what purpose.
The discussion above is merely provided for general background information and is not intended to be used as an aid in determining the scope of the claimed subject matter.
Embodiments pertain to a reusable ERP data retrieval object, in particular, a wide application query object providing a systematic and standardized approach to data retrieval. In one embodiment, the wide application query object is an encapsulated query object in that multiple queries are aggregated into one master query object (i.e., the wide application query object) that can, but does not necessarily have to, span multiple disparate data sources. In another embodiment, data retrieved in accordance with the wide application query logic is manipulated by code in any of a variety of different ways using a trigger model and specialized constructs. In still another embodiment, public parameters are utilized to trigger functions that impact the substance and layout of the query output.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The claimed subject matter is not limited to implementations that solve any or all disadvantages noted in the background.
The application server 104 outputs a data request 107 that is illustratively based at least in part on metadata 120 and/or data request information 122. The request 107 is provided to a database server 106 upon which application data 108 is stored. The request is illustratively represents a request for at least a portion of the application data 108. The database server processes the request and returns corresponding data 103 back to the application server 104. The corresponding data is ultimately returned to the client 102 by way of the application server 104 as a response to the query 101. The application server 104 may or may not further process (e.g., add metadata, change format, etc.) the data 103 before it is provided to client 102 as the response to the query 101. In one embodiment, the further processing applied by the application server includes adjustments to the actual data such as but not limited to modifications to column values, adding of a new column, etc. Within
In essence, the wide application query object 210 operates as an abstraction and programming model supporting an encapsulation of data acquisition processes across the data sources 202, 204, 206 and 208. In
As has been alluded to, in one embodiment, the query object 210 supports the ability to selectively incorporate hooks into the flow of execution of the encapsulated data acquisition processes so as to manipulate a resulting data set 212. Also supported is the ability to selectively incorporate specialized constructs (such as but not necessarily limited to yield, skip, and break keyword constructs) in order to create, interrupt, and/or ignore data when producing the resulting data set 212. Thus, a conveniently flexible customization of the output data 212 is supported.
At least some if not all of the programmatic logic that supports the described data retrieval processes is illustratively contained in the wide application query object 210 itself. In one embodiment, though not necessarily by limitation, the data set 212 that is the result of the processing of the query object 210 is a wide flat data set generally regardless of the types of specific encapsulated queries incorporated into the query object 210. The wide application object query 210 and the wide query result set 212 are illustratively formatted so as to be reusable or otherwise utilized by multiple consumers. As is suggested by the inclusion of wide application query object 208 in
It is worth mentioning that the approaches described herein for selectively controlling the nature of output data set 212 during the processing of the encapsulated queries of query object 210 enable creator and consumer perspectives to be considered separately. For example, one option is for a function of the query object 210 to be designated as mutable or immutable. For example, a filtering function may be applied within the programmatic logic of the query object 210 in either a mutable or immutable manner. The filtering function might be set as immutable if, for example, the developer desired the function to be mandatory. In contrast, a filtering function might be set as mutable if there is a desire to allow an end user to choose to mute or not mute the function depending upon user preference. Further, muting or not muting determinations can, in one embodiment, be made dependent upon the outcome of an automated variable determination e.g., dependent upon the value of a designated parameter that may be internal or external relative to the wide application query object 210). In fact, the logic of a wide application query object is illustratively configurable such that any function can be selectively tied to or otherwise made dependent upon an internal or external parameter, flag, event or variable.
In accordance with another embodiment, another option for utilizing the programmatic logic of the wide application query object 210 to manipulate the data output 212 is the configuration of the query object to include a memory-only column. In one example of this, the wide application query object is configured to create a “column” or other unit of data where it did not otherwise already exist in the body of data from which data is being retrieved. For example, a computer-implemented instruction can be included in the query object to add tax to each entry in a listing of prices being retrieved, and then to include price-plus-tax amounts in a particular portion of the resulting data set.
In accordance with still another embodiment, application functionality is triggered based upon a logical programmatic inference of a relationship as reflected in the underlying configuration or constructs of a field identified relative to a wide application query object 210. For example, an inference can be made based upon particular selections made by a user (or possibly even a developer) relative to the configuration of an instance of the wide application query object. Such an inference can be utilized programmatically as a basis for initiating an automatic generation of, for example but not by limitation, a short cut within, or an automatic narrowing down of, a selection process. In one embodiment, such a query definition inference is utilized to programmatically trigger an automatically generated definition of a portion of a “Group by” configuration. In another embodiment, an abstraction from the underlying data model is utilized to programmatically trigger an automatic population of a DataItemLinkType. Still further, in one embodiment, such an inference is utilized to programmatically trigger an automatic expansion or selection within the context of one or more ERP application and/or wide application query object fields. Still other embodiments pertain to a programming model (illustratively in a domain specific language, for example, C/AL) that encapsulates and combines reader, row, and builder functionality into one object construct (i.e., the wide application query object 210) that behaves in a similar manner for further encapsulation and simplicity. These are just examples, not by limitation, of possible embodiments.
One skilled in the an will appreciate that some embodiments therefore pertain to a tabular approach enabling a designer or other user (e.g., a developer) to selectively configure a wide application query object and thereby statically define the definition of a resulting data set. The approach enables the designer to select fields from multiple different data sources, even including data associated with another wide application query object. Further, the approach enables aggregation on data and supports filtering on fields. Still further, the approach supports a trigger model encapsulated within the query definition so as to enable dynamic manipulation of the resulting data set before exposure to the consumer. In accordance with some embodiments, but not by limitation, supported options for the timing of manipulations include:
OnBeforeOpen—Before the underlying data retrieval has been executed
OnAfterOpen—Right after the underlying data retrieval has been executed before rows are read
OnAfterFetchRow—Processing right after reading each row
OnEndOfResultset—After entire dataset has been read
OnClose—Once the data retrieval is complete and nothing more should be done within this encapsulated scope
Thus, with the appropriate hooks into the flow of execution, it is possible to selectively control within the wide application query object the outcome of data retrieval from selected data sources. The addition of support for data retrieval processes relative to functions consistent with Yield, Break, and Skip keywords also enables, for example, insertion of a code-generated row, ignoring of the remaining rows when a condition is met, and/or ignoring of a single row, respectively. As has been described, it is also possible to add columns to the each of the rows of the resulting data set that persist only in memory. Thus, the view provided to the rest of the ERP application can be quite different than what is solely in the SQL database or other data source in which business data is persisted.
While systems (e.g., software applications) that implement encapsulated queries consistent with embodiments described herein can primarily reside on a client device such as those specifically shown herein, such systems could just as easily be embodied elsewhere, such as in a cloud computing environment. Cloud computing provides computation, software, data access, and storage services that generally do not require end-user knowledge of the physical location or configuration of the system that delivers the services. In various embodiments, cloud computing delivers the services over a wide area network, such as the internet, using appropriate protocols. For instance, cloud computing providers deliver applications over a wide area network and they can be accessed through a web browser or any other computing component. Software as well as the corresponding data, can be stored on servers at a remote location. The computing resources in a cloud computing environment can be consolidated at a remote data center location or they can be dispersed. Cloud computing infrastructures can deliver services through shared data centers, even though they appear as a single point of access for the user. Thus, the functions described herein can be provided from a service provider at a remote location using a cloud computing architecture. Alternatively, they can be provided front a conventional server, or they can be installed on a client device directly.
In any case,
Under other embodiments, applications or systems are received on a removable Secure Digital (SD) card that is connected to a SD card interface 15. SD card interface 15 and communication links 13 communicate with a processor 17 along a bus 19 that is also connected to memory 21 and input/output (I/O) components 23, as well as clock 25 and location system 27.
I/O components 23, in one embodiment, are provided to facilitate input and output operations, I/O components 23 for various embodiments of the device can include input components such as buttons, touch sensors, touch screens, proximity sensors, microphones, tilt sensors, and gravity switches and output components such as display device 26, a speaker, and or a printer port. Other I/O components 23 can be used as well.
Clock 25 illustratively comprises a real time clock component that outputs a time and date. It can also, illustratively, provide timing functions for processor 17.
Location system 27 illustratively includes a component that outputs a current geographical location of device 18. This can include, for instance, a global positioning system (GPS) receiver, a LORAN system, a dead reckoning system, a cellular triangulation system, or other positioning system. It can also include, for example, mapping software or navigation software that generates desired maps, navigation routes and other geographic functions.
Memory 21 stores operating system 29, network settings 31, applications 33, application configuration settings 35, registry 37, communication drivers 39, and communication configuration settings 41. Memory 21 can include all types of tangible volatile and non-volatile computer-readable memory devices. Memory 21 stores computer readable instructions that, when executed by processor 17, cause the processor to perform computer-implemented steps or functions according to the instructions. Processor 17 can be activated by other components to facilitate their functionality as well.
Examples of the network settings 31 include things such as proxy information, Internet connection information, and mappings. Application configuration settings 35 include settings that tailor the application for a specific enterprise or user. Communication configuration settings 41 provide parameters for communicating with other computers and include items such as GPRS parameters, SMS parameters, connection user names and passwords.
Applications 33 can be applications that have previously been stored on the device 18 or applications that are installed during use. In one embodiment, applications 33 can be part of operating system 29, or hosted external to device 18, as well.
The mobile device of
Note that other forms of the devices 18 are possible. Examples include tablet or slate computing devices, music or video players, and other handheld computing devices.
Computer 810 typically includes a variety of computer readable media. Computer readable media cart be any available media that can be accessed by computer 810 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes hardware storage media including both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by computer 810. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer readable media.
The system memory 830 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 831 and random access memory (RAM) 832. A basic input/output system 833 (BIOS), containing the basic routines that help to transfer information between elements within computer 810, such as during start-up, is typically stored in ROM 831. RAM 832 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 820. By way of example, and not limitation,
The computer 810 may also include other removable/non-removable volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
A user may enter commands and information into the computer 810 through input devices such as a keyboard 862, a microphone 863, and a pointing device 861, such as a mouse, trackball or touch pad. Other input devices (not shown) may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 820 through a user input interface 860 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A monitor 891 or other type of display device is also connected to the system bus 821 via an interface, such as a video interface 890. In addition to the monitor, computers may also include other peripheral output devices such as speakers 897 and printer 896, which may be connected through an output peripheral interface 895.
The computer 810 is operated in a networked environment using logical connections to one or more remote computers, such as a remote computer 880. The remote computer 880 may be a personal computer, a hand-held device, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 810. The logical connections depicted in
When used in a LAN networking environment, the computer 810 is connected to the LAN 871 through a network interface or adapter 870. When used in a WAN networking environment, the computer 810 typically includes a modem 872 or other means for establishing communications over the WAN 873, such as the Internet. The modem 872, which may be internal or external, may be connected to the system bus 821 via the user input interface 860, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 810, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
This description is intended to include both public cloud computing and private cloud computing. Cloud computing (both public and private) provides substantially seamless pooling of resources, as well as a reduced need to manage and configure underlying hardware infrastructure. A public cloud is managed by a vendor and typically supports multiple consumers using the same infrastructure. Also, a public cloud, as opposed to a private cloud, can free up the end users from managing the hardware. A private cloud may be managed by the organization itself and the infrastructure is typically not shared with other organizations. The organization may still maintain the hardware to some extent, such as installations, repairs, etc.
Accordingly, system 1600 is illustratively also an encapsulated query system that is applied in the context of an ERP data management environment the same or at least similar to that shown and described in relation to
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
Number | Date | Country | |
---|---|---|---|
61543274 | Oct 2011 | US |