Extract, transform and load using metadata
First Claim
1. A computer program product comprising one or more physical computer storage device having thereon computer-executable instructions that are structured such that, when executed by one or more processors of a computing system, cause the computing system to perform a method for performing an extract and transform of data from a plurality of data sources, the method comprising:
- an act of the computing system repeatedly performing an extraction operation on a plurality of data sources;
an act of the computing system periodically performing a transformation operation on the extracted data, wherein the act of periodically performing a transformation operation for each of at least one iteration of the transformation operation comprises;
for at least some of the extracted data that are valid, an act of performing a transformation operation on the valid data;
for at least some of the extracted data that are dependent on other data that is not yet extracted, and an act of identifying the extracted data element as suspect; and
for at least some extracted data that had been marked as suspect in a prior interaction of the transformation operation, an act of completing transformation of the previously-marked suspect data.
2 Assignments
0 Petitions
Accused Products
Abstract
The extract and transformation operation performed on multiple data sources. In the extract operation, a computing system periodically performs an extraction operation on the data sources, perhaps as defined by metadata. The transformation operation is performed on at least some the extracted data, and is periodically performed, perhaps also in a manner that is defined by metadata. When performing each iteration of the transformation operation, the computing system performs a transformation operation on valid data, marks other data as suspect (due to a dependency on data that is not present), and completes transformation on yet other data that had previously been marked as suspect or perhaps reaffirms its suspect status if the needed data is still not available.
20 Citations
19 Claims
-
1. A computer program product comprising one or more physical computer storage device having thereon computer-executable instructions that are structured such that, when executed by one or more processors of a computing system, cause the computing system to perform a method for performing an extract and transform of data from a plurality of data sources, the method comprising:
-
an act of the computing system repeatedly performing an extraction operation on a plurality of data sources; an act of the computing system periodically performing a transformation operation on the extracted data, wherein the act of periodically performing a transformation operation for each of at least one iteration of the transformation operation comprises; for at least some of the extracted data that are valid, an act of performing a transformation operation on the valid data; for at least some of the extracted data that are dependent on other data that is not yet extracted, and an act of identifying the extracted data element as suspect; and for at least some extracted data that had been marked as suspect in a prior interaction of the transformation operation, an act of completing transformation of the previously-marked suspect data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for a computing system to perform an extract and transform of data from a plurality of data sources, the computing system comprising one or more physical processors, the method comprising:
-
an act of the computing system repeatedly performing an extraction operation on a plurality of data sources, wherein the period for extraction may differ depending on the identity of the data source, wherein the period and manner of extraction are defined by metadata; an act of the computing system periodically performing a transformation operation on the extracted data, wherein the transformation operation is also defined by metadata, and wherein the act of periodically performing a transformation operation for each of at least one iteration of the transformation operation comprises; for at least some of the extracted data that are valid, an act of performing a transformation operation on the valid data; for at least some of the extracted data that are dependent on other data that is not yet extracted, and an act of identifying the extracted data element as suspect; and for at least some extracted data that had been marked as suspect in a prior interaction of the transformation operation, an act of completing transformation of the previously-marked suspect data. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer program product comprising one or more physical computer storage device having thereon computer-executable instructions that are structured such that, when executed by one or more processors of a computing system, cause the computing system to perform a method for performing an extract and transform of data from a plurality of data sources, the method comprising:
-
an act of periodically performing an extraction operation on a plurality of data sources, wherein the period for extraction may differ depending on the identity of the data source and is performed in a manner that is defined by editable data; an act of periodically performing a transformation operation on the extracted data, wherein the act of periodically performing the transformation operation is performed in a manner that is defined by the editable data, wherein the act of periodically performing a transformation operation for one iteration of the transformation operation comprises; for at least some of the extracted data that are valid, an act of performing a transformation operation on the valid data; for at least some of the extracted data that are dependent on other data that is not yet extracted, an act of partially performing a transformation operation on the extracted data, and an act of identifying the extracted data element as suspect and thus subject to further transformation in a subsequent iteration of the transformation operation; and for at least some extracted data that had been subject to partial transformation in a prior interaction of the transformation operation, an act of completing transformation of that partially transformed data.
-
Specification