APPLICATION QUERY CONTROL WITH COST PREDICTION
First Claim
Patent Images
1. In a computing environment, a method of determining if access should be granted to a data source, the method comprising:
- determining resource usage cost of performing an operation on a data source;
determining if the resource usage cost of performing the operation exceeds a predetermined threshold; and
when the resource usage cost exceeds a predetermined threshold rejecting the operation.
2 Assignments
0 Petitions
Accused Products
Abstract
Determining if access should be granted to a data source. A method includes determining resource usage cost of performing an operation on a data source. The method further includes determining if the resource usage cost exceeds a predetermined threshold. When the resource usage cost exceeds a predetermined threshold, the operation is rejected.
47 Citations
20 Claims
-
1. In a computing environment, a method of determining if access should be granted to a data source, the method comprising:
-
determining resource usage cost of performing an operation on a data source; determining if the resource usage cost of performing the operation exceeds a predetermined threshold; and when the resource usage cost exceeds a predetermined threshold rejecting the operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. In a computing environment, a method of determining if access should be granted to a data source, the method comprising:
-
receiving a request to perform an operation on a data source; using a cost estimator, determining resource usage cost of performing the operation on the data source, without actually performing the operation on the data source; sending the resource usage cost to a cost enforcer; and when the resource usage cost is below a predetermined threshold receiving instructions to perform the operation. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for determining if access should be granted to a data source, the system comprising:
-
a database system configured to receive queries from a client application; a client system configured to send database queries to the database through a middle tier; a cost estimator, wherein the cost estimator is configured to determine the cost of performing an operation on a data source, without actually executing the operation, including cost in terms of estimated disk I/O operations, CPU operations or cycles, number of database rows that would be accessed by the operation, network resource utilization, and memory utilization; and a cost enforcer module at a middle tier system between the database system and the client system, wherein the cost enforcer module is configured to determine, based on a cost provided by the cost estimator and a predetermined threshold, whether an operation should be executed by the database system.
-
Specification