SURESH SRIKRISHNAN (US)
HAMMERSCHMIDT BEDA CHRISTOPH (US)
POPESCU ADRIAN DANIEL (US)
KAMP JESSE (US)
LIU ZHEN HUA (US)
US20160077853A1 | 2016-03-17 | |||
US20080201234A1 | 2008-08-21 | |||
USPP63413835P |
Docket No.: 50277-6167 (ORC23136555-WO-PCT) CLAIMS What is claimed is: 1. A computer-implemented method comprising: generating, from a relational schema for a database, a data entry schema that is not a relational schema; wherein the data entry schema encodes, in a client-agnostic format, one or more validation rules that apply to data that is to be stored at specific locations in the relational schema; sending the data entry schema to a database client; receiving, from the database client, entered data that the database client has validated, based on the data entry schema, as conforming to the data entry schema; and storing, into the database, the entered data that conforms to the data entry schema. 2. The method of Claim 1 wherein the one or more validation rules include a check constraint that is specified in the relational schema of the database. 3. The method of Claim 2 wherein the check constraint contains at least one selected from the group consisting of: a compound expression, an expression based on a plurality of columns in the database, and an indication of whether the check constraint should be used to generate the data entry schema. 4. The method of Claim 1 wherein the data entry schema contains at least one selected from the group consisting of: a version identifier, a regular expression, a limit on a count of object properties, a limit on a count of array elements, a limit on a count of array elements that match a criterion, an indication that elements of an array should be distinct, an indication that a limit value is inclusive or exclusive, a specification for data entry of a time zone, JavaScript object notation (JSON), and JSON that conforms to the JSON Schema standard by the Internet engineering task force (IETF). Docket No.: 50277-6167 (ORC23136555-WO-PCT) 5. The method of Claim 1 further comprising without requiring restarting a server of the database, adding a new data entry format to the database, wherein said generating the data entry schema is based on the new data entry format. 6. The method of Claim 1 further comprising a server of the database detecting whether the entered data conforms to the data entry schema. 7. The method of Claim 6 wherein: the entered data conforms to the relational schema of the database; said detecting whether the entered data conforms to the data entry schema comprises detecting that the entered data does not conform to the data entry schema. 8. The method of Claim 1 wherein said sending the data entry schema comprises using at least one selected from the group consisting of representational state (REST) and hypertext transfer protocol (HTTP). 9. The method of Claim 1 wherein: said sending the data entry schema comprises sending a semi-structured document from a server of the database; extensible markup language (XML) is not contained in at least one selected from the group consisting of the relational schema of the database and the data entry schema. 10. The method of Claim 1 further comprising generating a definition of a relational table from a data entry schema that is not a relational schema. 11. A computer-implemented method comprising: generating, from a relational schema for a database, a data entry schema that is not a relational schema, wherein: said generating the data entry schema is not performed by a database server, and the data entry schema encodes, in a client-agnostic format, one or more validation rules that apply to data that is to be stored at specific locations in the relational schema; receiving, from a database client, entered data that the database client has validated, based on the data entry schema, as conforming to the data entry schema; and storing, into the database, the entered data that conforms to the data entry schema. 12. The method of Claim 11 wherein said generating the data entry schema comprises inspecting at least one selected from the group consisting of: the relational schema of the database in a database dictionary, and Docket No.: 50277-6167 (ORC23136555-WO-PCT) a set of one or more data definition language (DDL) statements. 13. The method of Claim 11 wherein said database does not exist during said generating the data entry schema. 14. The method of Claim 11 wherein said database client performs said generating the data entry schema. 15. One or more non-transitory computer-readable media storing instructions that, when executed by one or more processors, cause performance of the steps of any one of Claims 1-14. |
Docket No.: 50277-6167 (ORC23136555-WO-PCT) 1.14 DATA TYPE TRANSLATION [0054] The following is an example mapping of SQL column types to JSON field types. This example mapping may be used to generate data entry schema 170 from relational schema 140. Docket No.: 50277-6167 (ORC23136555-WO-PCT) Docket No.: 50277-6167 (ORC23136555-WO-PCT) 1.15 PREDEFINED FORMAT AND FORMAT FUNCTION [0055] Data entry schema 170 is a semi-structured document. However except as shown in the above example mapping, data entry schema 170 does not contain extensible markup language (XML) and relational database 120 does not store XML. [0056] Without JSON Schema, data entry schema 170 may have any predefined validation semantics for which database server 110 can generate representations into data entry schema 170, so long as database client 130 can enforce those semantics by interpreting data entry schema 170. JSON Schema provides predefined and composable validation semantics that may be declaratively arranged and configured in data entry schema 170. Client and server in database system 100 may adopt JSON Schema as discussed herein, or may instead agree on other predefined semantics, which may be more or less arduous for multiple parties to agree on. In either way, data entry schema 170 can be generated and enforced as discussed herein. [0057] The following are example functions that may be invoked in PRECHECK conditions. As explained earlier herein, PRECHECKS are executed by database client 130 and, afterwards, optionally executed by database server 110. Thus, there may be two executions of a same PRECHECK for same field value 195. However, both executions may use different implementations of the same PRECHECK. The following example functions may be implemented as JavaScript for use by database client 130 and instead implemented as built-in functions or as UDFs for use by database server 110. In an embodiment, the built-in function or UDF is a minimal wrapper that delegates to the JavaScript implementation, so long as database server 110 can execute JavaScript.
Docket No.: 50277-6167 (ORC23136555-WO-PCT) [0058] The above example functions may be expressly referenced in format 183, so long as database client 130 can execute JavaScript. However, a preferred embodiment of format 183 does not reference an example function and does not require JavaScript on the client. Instead, format 183 is generated as a JSON property of field 180. For example as shown for the above example functions, the generated property may be named “format” and may have a value that identifies a predefined format. A predefined format is a complex format referenced solely by name and without arguments. In various embodiments, each predefined format is or is not implemented by the corresponding example function as shown above. 2.0 EXAMPLE DATA ENTRY SCHEMA GENERATION PROCESS [0059] FIG.2 is a flow diagram that depicts an example computer process that database system 100 may perform to use relational schema 140 of database 120 to generate data entry schema 170 that is a client-agnostic schema for validating entered data 190 at database client 130 before storing entered data 190 into database 120, in an embodiment. FIG.2 is discussed with reference to FIG.1. The following three example embodiments each use a different respective component of FIG.1 to perform the process of FIG. 2. As follows, the three embodiments each uses a different respective way of obtaining relational schema 140 for generating data entry schema 170. Docket No.: 50277-6167 (ORC23136555-WO-PCT) [0060] In a first embodiment, database server 110 performs steps 201-203 and 205-206 by natively and directly accessing relational schema 140. In a second and a third embodiments, a respective component other than database server 110 generates data entry schema 170, which entails steps 201-202. [0061] In the second embodiment, steps 201-202 are instead performed by database client 130 that accesses relational schema 140 by connecting to database server 110 that performs remaining steps 203-206. [0062] In the so-called offline third embodiment that uses neither relational database 120 nor database server 110, a software tool analyzes DDL statements (e.g. in a database administration script). The third embodiment generates data entry schema 170 by performing steps 201-202, and steps 203-206 are not performed. For example, the third embodiment works even if relational database 120 and database server 110 do not exist. [0063] Step 201 analyzes relational schema 140 to discover tables, columns, and database constraints such as column constraints. Identifiers and configurations of all of those database objects are discovered by inspecting relational schema 140 that may be encoded as DDL statements or stored in a database dictionary. Database dictionaries are discussed later herein. Step 201 may iterate over the discovered tables, columns, and database constraints to disregard (i.e. not process) database objects that expressly should not or implicitly cannot be translated into portions of data entry schema 170. [0064] Step 202 generates data entry schema 170 from relational schema 140. Step 202 may iterate over the discovered tables, columns, and database constraints to generate corresponding portions of data entry schema 170 as discussed earlier herein. [0065] Step 203 sends data entry schema 170 to database client 130. For example, database client 130 may request that database server 110 perform step 203. For example, database client 130 may send a representational state (REST) request or other hypertext transfer protocol (HTTP) request to database server 110 to request a copy of data entry schema 170, so long as database server 110 contains a web server. [0066] In the first embodiment and the second embodiment, database client 130 performs step 204. In step 204, database client 130 verifies that entered data 190 conforms to data entry schema 170 and then sends verified entered data 190 to database server 110. Step 204 may be Docket No.: 50277-6167 (ORC23136555-WO-PCT) caused when entered data 190 is interactively entered as input into database client 130, which may involve a user interface screen, a web page in a web browser, or a command line. [0067] In step 205, database server 110 receives entered data 190 from database client 130. For example, database server 110 receives a DML statement that contains entered data 190. The DML statement may specify writing field value 195 into column 160. Database client 130 may contain a database driver that generates the DML statement that is a plain text statement that can be generated and/or sent by database client 130 with or without a database driver. Of course before sending entered data 190, database client 130 should successfully validate entered data 190 using data entry schema 170. [0068] Step 206 stores entered data 190 into relational database 120. For example while executing the DML statement, database server 110 may store field value 195 into column 160. Before storing entered data 190, step 206 verifies that entered data 190 conforms to relational schema 140. If that validation fails, storing entered data 190 by step 206 does not occur. For example, the DML statement is rejected without executing it. 2.1 FIRST EXAMPLE ACTIVITY [0069] The following example activities A1-A3 demonstrate behaviors that database server 110 may or may not implement and perform. Activity A1 is an optional (e.g. redundant) validation as discussed earlier herein and can be skipped (i.e. not performed). Activity A1 occurs between above steps 205-206 and decides whether or not to terminate the process of FIG. 2 without performing last step 206. [0070] In activity A1, database server 110 detects whether or not entered data 190 conforms to data entry schema 170. If activity A1 detects that entered data 190 is invalid, then last step 206 is skipped and, for example, the DML statement is rejected without executing it. For example, validation of entered data 190 with data entry schema 170 by activity A1 may fail if entered data 190 instead came from a database client that lacks data entry schema 170, and that validation failure by activity A1 may occur even if entered data 190 would seem valid if instead compared to relational schema 140. Entered data 190 is invalid with respect to data entry schema 170 if entered data 190: a) contains an invalid field value, b) is missing a value of a required field, or c) contains a value for an invalid field such as an unrecognized field, a forbidden field, or too many fields in total. Docket No.: 50277-6167 (ORC23136555-WO-PCT) 2.2 SECOND EXAMPLE ACTIVITY [0071] Unlike activity A1, Activities A2-A3 entail behaviors that occur somewhat independent of the process of FIG.2. Activity A2 demonstrates future proofing of database server 110 that the state of the art may unfortunately need to restart after rebuilding its codebase (e.g. to include a new data entry format for use in data entry schema 170). For example, an original equipment manufacturer (OEM) may include some data entry formats and accompanying implementation logic in database server 110 such as a timestamp format for a timestamp JSON field that can specify a date, a time, and a time zone. The implementation logic correctly accommodates leap year, which is infeasible to directly express in a format mask or regular expression. If a user desires a new data entry format that is not a stock data entry format provided by the OEM, then the user should provide a format mask, a regular expression, or accompanying implementation logic for the new data entry format. The new accompanying implementation logic should be added to database server 110’s codebase. In the state of the art, modifying a database server’s codebase requires restarting the database server. [0072] Without requiring restarting database server 110, activity A2 adds a new data entry format to relational database 120. For example, the new data entry format’s accompanying implementation logic may be contained in an Oracle PL/SQL package that database server 110 can dynamically add to relational database 120 without requiring restarting database server 110. 2.3 THIRD EXAMPLE ACTIVITY [0073] Example activity A3 effectively operates in reverse by generating a definition of a new relational table from a data entry schema. For example, the data entry schema may be preexisting and widely used, and a corresponding relational schema for a new database may be desired. Example activity A3 may: a) analyze a data entry schema to discover its elements (e.g. fields and field constraints) and their configuration and b) iterate over those elements to generate corresponding portions of DDL statement(s) that define the corresponding relational schema elements . Example A3 may generate a new relational schema or insert/replace elements in an existing relational schema. Example activity A3 may be: a) performed by database server 110 that may or may not also execute the DDL statements to actually create table(s) and columns, b) performed by a software tool that generates and sends the DDL statements to database server 110 for execution, or c) performed by an offline software tool that generates the DDL statements even if database server 110 does not exist. Docket No.: 50277-6167 (ORC23136555-WO-PCT) 3.0 DATABASE OVERVIEW [0074] Embodiments of the present invention are used in the context of database management systems (DBMSs). Therefore, a description of an example DBMS is provided. [0075] Generally, a server, such as a database server, is a combination of integrated software components and an allocation of computational resources, such as memory, a node, and processes on the node for executing the integrated software components, where the combination of the software and computational resources are dedicated to providing a particular type of function on behalf of clients of the server. A database server governs and facilitates access to a particular database, processing requests by clients to access the database. [0076] Users interact with a database server of a DBMS by submitting to the database server commands that cause the database server to perform operations on data stored in a database. A user may be one or more applications running on a client computer that interact with a database server. Multiple users may also be referred to herein collectively as a user. [0077] A database comprises data and a database dictionary that is stored on a persistent memory mechanism, such as a set of hard disks. A database is defined by its own separate database dictionary. A database dictionary comprises metadata that defines database objects contained in a database. In effect, a database dictionary defines much of a database. Database objects include tables, table columns, and tablespaces. A tablespace is a set of one or more files that are used to store the data for various types of database objects, such as a table. If data for a database object is stored in a tablespace, a database dictionary maps a database object to one or more tablespaces that hold the data for the database object. [0078] A database dictionary is referred to by a DBMS to determine how to execute database commands submitted to a DBMS. Database commands can access the database objects that are defined by the dictionary. [0079] A database command may be in the form of a database statement. For the database server to process the database statements, the database statements must conform to a database language supported by the database server. One non-limiting example of a database language that is supported by many database servers is SQL, including proprietary forms of SQL supported by such database servers as Oracle, (e.g. Oracle Database 11g). SQL data definition language ("DDL") instructions are issued to a database server to create or configure database objects, such as tables, views, or complex types. Data manipulation language (“DML”) Docket No.: 50277-6167 (ORC23136555-WO-PCT) instructions are issued to a DBMS to manage data stored within a database structure. For instance, SELECT, INSERT, UPDATE, and DELETE are common examples of DML instructions found in some SQL implementations. SQL/XML is a common extension of SQL used when manipulating XML data in an object-relational database. [0080] A multi-node database management system is made up of interconnected nodes that share access to the same database. Typically, the nodes are interconnected via a network and share access, in varying degrees, to shared storage, e.g. shared access to a set of disk drives and data blocks stored thereon. The nodes in a multi-node database system may be in the form of a group of computers (e.g. work stations, personal computers) that are interconnected via a network. Alternately, the nodes may be the nodes of a grid, which is composed of nodes in the form of server blades interconnected with other server blades on a rack. [0081] Each node in a multi-node database system hosts a database server. A server, such as a database server, is a combination of integrated software components and an allocation of computational resources, such as memory, a node, and processes on the node for executing the integrated software components on a processor, the combination of the software and computational resources being dedicated to performing a particular function on behalf of one or more clients. [0082] Resources from multiple nodes in a multi-node database system can be allocated to running a particular database server's software. Each combination of the software and allocation of resources from a node is a server that is referred to herein as a "server instance" or "instance". A database server may comprise multiple database instances, some or all of which are running on separate computers, including separate server blades. 3.1 QUERY PROCESSING [0083] A query is an expression, command, or set of commands that, when executed, causes a server to perform one or more operations on a set of data. A query may specify source data object(s), such as table(s), column(s), view(s), or snapshot(s), from which result set(s) are to be determined. For example, the source data object(s) may appear in a FROM clause of a Structured Query Language (“SQL”) query. SQL is a well-known example language for querying database objects. As used herein, the term “query” is used to refer to any form of representing a query, including a query in the form of a database statement and any data structure used for internal query representation. The term “table” refers to any source object that is referenced or defined by Docket No.: 50277-6167 (ORC23136555-WO-PCT) a query and that represents a set of rows, such as a database table, view, or an inline query block, such as an inline view or subquery. [0084] The query may perform operations on data from the source data object(s) on a row by-row basis as the object(s) are loaded or on the entire source data object(s) after the object(s) have been loaded. A result set generated by some operation(s) may be made available to other operation(s), and, in this manner, the result set may be filtered out or narrowed based on some criteria, and/or joined or combined with other result set(s) and/or other source data object(s). [0085] A subquery is a portion or component of a query that is distinct from other portion(s) or component(s) of the query and that may be evaluated separately (i.e., as a separate query) from the other portion(s) or component(s) of the query. The other portion(s) or component(s) of the query may form an outer query, which may or may not include other subqueries. A subquery nested in the outer query may be separately evaluated one or more times while a result is computed for the outer query. [0086] Generally, a query parser receives a query statement and generates an internal query representation of the query statement. Typically, the internal query representation is a set of interlinked data structures that represent various components and structures of a query statement. [0087] The internal query representation may be in the form of a graph of nodes, each interlinked data structure corresponding to a node and to a component of the represented query statement. The internal representation is typically generated in memory for evaluation, manipulation, and transformation. HARDWARE OVERVIEW [0088] According to one embodiment, the techniques described herein are implemented by one or more special-purpose computing devices. The special-purpose computing devices may be hard-wired to perform the techniques, or may include digital electronic devices such as one or more application-specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs) that are persistently programmed to perform the techniques, or may include one or more general purpose hardware processors programmed to perform the techniques pursuant to program instructions in firmware, memory, other storage, or a combination. Such special-purpose computing devices may also combine custom hard-wired logic, ASICs, or FPGAs with custom programming to accomplish the techniques. The special-purpose computing devices may be Docket No.: 50277-6167 (ORC23136555-WO-PCT) desktop computer systems, portable computer systems, handheld devices, networking devices or any other device that incorporates hard-wired and/or program logic to implement the techniques. [0089] For example, FIG. 3 is a block diagram that illustrates a computer system 300 upon which an embodiment of the invention may be implemented. Computer system 300 includes a bus 302 or other communication mechanism for communicating information, and a hardware processor 304 coupled with bus 302 for processing information. Hardware processor 304 may be, for example, a general purpose microprocessor. [0090] Computer system 300 also includes a main memory 306, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 302 for storing information and instructions to be executed by processor 304. Main memory 306 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 304. Such instructions, when stored in non-transitory storage media accessible to processor 304, render computer system 300 into a special-purpose machine that is customized to perform the operations specified in the instructions. [0091] Computer system 300 further includes a read only memory (ROM) 308 or other static storage device coupled to bus 302 for storing static information and instructions for processor 304. A storage device 310, such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to bus 302 for storing information and instructions. [0092] Computer system 300 may be coupled via bus 302 to a display 312, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 314, including alphanumeric and other keys, is coupled to bus 302 for communicating information and command selections to processor 304. Another type of user input device is cursor control 316, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 304 and for controlling cursor movement on display 312. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane. [0093] Computer system 300 may implement the techniques described herein using customized hard-wired logic, one or more ASICs or FPGAs, firmware and/or program logic which in combination with the computer system causes or programs computer system 300 to be a special-purpose machine. According to one embodiment, the techniques herein are performed by computer system 300 in response to processor 304 executing one or more sequences of one or Docket No.: 50277-6167 (ORC23136555-WO-PCT) more instructions contained in main memory 306. Such instructions may be read into main memory 306 from another storage medium, such as storage device 310. Execution of the sequences of instructions contained in main memory 306 causes processor 304 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions. [0094] The term “storage media” as used herein refers to any non-transitory media that store data and/or instructions that cause a machine to operate in a specific fashion. Such storage media may comprise non-volatile media and/or volatile media. Non-volatile media includes, for example, optical disks, magnetic disks, or solid-state drives, such as storage device 310. Volatile media includes dynamic memory, such as main memory 306. Common forms of storage media include, for example, a floppy disk, a flexible disk, hard disk, solid-state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge. [0095] Storage media is distinct from but may be used in conjunction with transmission media. Transmission media participates in transferring information between storage media. For example, transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 302. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. [0096] Various forms of media may be involved in carrying one or more sequences of one or more instructions to processor 304 for execution. For example, the instructions may initially be carried on a magnetic disk or solid-state drive of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 300 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 302. Bus 302 carries the data to main memory 306, from which processor 304 retrieves and executes the instructions. The instructions received by main memory 306 may optionally be stored on storage device 310 either before or after execution by processor 304. [0097] Computer system 300 also includes a communication interface 318 coupled to bus 302. Communication interface 318 provides a two-way data communication coupling to a Docket No.: 50277-6167 (ORC23136555-WO-PCT) network link 320 that is connected to a local network 322. For example, communication interface 318 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 318 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 318 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information. [0098] Network link 320 typically provides data communication through one or more networks to other data devices. For example, network link 320 may provide a connection through local network 322 to a host computer 324 or to data equipment operated by an Internet Service Provider (ISP) 326. ISP 326 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 328. Local network 322 and Internet 328 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 320 and through communication interface 318, which carry the digital data to and from computer system 300, are example forms of transmission media. [0099] Computer system 300 can send messages and receive data, including program code, through the network(s), network link 320 and communication interface 318. In the Internet example, a server 330 might transmit a requested code for an application program through Internet 328, ISP 326, local network 322 and communication interface 318. [0100] The received code may be executed by processor 304 as it is received, and/or stored in storage device 310, or other non-volatile storage for later execution. SOFTWARE OVERVIEW [0101] FIG.4 is a block diagram of a basic software system 400 that may be employed for controlling the operation of computing system 300. Software system 400 and its components, including their connections, relationships, and functions, is meant to be exemplary only, and not meant to limit implementations of the example embodiment(s). Other software systems suitable for implementing the example embodiment(s) may have different components, including components with different connections, relationships, and functions. Docket No.: 50277-6167 (ORC23136555-WO-PCT) [0102] Software system 400 is provided for directing the operation of computing system 300. Software system 400, which may be stored in system memory (RAM) 306 and on fixed storage (e.g., hard disk or flash memory) 310, includes a kernel or operating system (OS) 410. [0103] The OS 410 manages low-level aspects of computer operation, including managing execution of processes, memory allocation, file input and output (I/O), and device I/O. One or more application programs, represented as 402A, 402B, 402C … 402N, may be “loaded” (e.g., transferred from fixed storage 310 into memory 306) for execution by the system 400. The applications or other software intended for use on computer system 300 may also be stored as a set of downloadable computer-executable instructions, for example, for downloading and installation from an Internet location (e.g., a Web server, an app store, or other online service). [0104] Software system 400 includes a graphical user interface (GUI) 415, for receiving user commands and data in a graphical (e.g., “point-and-click” or “touch gesture”) fashion. These inputs, in turn, may be acted upon by the system 400 in accordance with instructions from operating system 410 and/or application(s) 402. The GUI 415 also serves to display the results of operation from the OS 410 and application(s) 402, whereupon the user may supply additional inputs or terminate the session (e.g., log off). [0105] OS 410 can execute directly on the bare hardware 420 (e.g., processor(s) 304) of computer system 300. Alternatively, a hypervisor or virtual machine monitor (VMM) 430 may be interposed between the bare hardware 420 and the OS 410. In this configuration, VMM 430 acts as a software “cushion” or virtualization layer between the OS 410 and the bare hardware 420 of the computer system 300. [0106] VMM 430 instantiates and runs one or more virtual machine instances (“guest machines”). Each guest machine comprises a “guest” operating system, such as OS 410, and one or more applications, such as application(s) 402, designed to execute on the guest operating system. The VMM 430 presents the guest operating systems with a virtual operating platform and manages the execution of the guest operating systems. [0107] In some instances, the VMM 430 may allow a guest operating system to run as if it is running on the bare hardware 420 of computer system 400 directly. In these instances, the same version of the guest operating system configured to execute on the bare hardware 420 directly may also execute on VMM 430 without modification or reconfiguration. In other words, VMM Docket No.: 50277-6167 (ORC23136555-WO-PCT) 430 may provide full hardware and CPU virtualization to a guest operating system in some instances. [0108] In other instances, a guest operating system may be specially designed or configured to execute on VMM 430 for efficiency. In these instances, the guest operating system is “aware” that it executes on a virtual machine monitor. In other words, VMM 430 may provide para- virtualization to a guest operating system in some instances. [0109] A computer system process comprises an allotment of hardware processor time, and an allotment of memory (physical and/or virtual), the allotment of memory being for storing instructions executed by the hardware processor, for storing data generated by the hardware processor executing the instructions, and/or for storing the hardware processor state (e.g. content of registers) between allotments of the hardware processor time when the computer system process is not running. Computer system processes run under the control of an operating system, and may run under the control of other programs being executed on the computer system. CLOUD COMPUTING [0110] The term "cloud computing" is generally used herein to describe a computing model which enables on-demand access to a shared pool of computing resources, such as computer networks, servers, software applications, and services, and which allows for rapid provisioning and release of resources with minimal management effort or service provider interaction. [0111] A cloud computing environment (sometimes referred to as a cloud environment, or a cloud) can be implemented in a variety of different ways to best suit different requirements. For example, in a public cloud environment, the underlying computing infrastructure is owned by an organization that makes its cloud services available to other organizations or to the general public. In contrast, a private cloud environment is generally intended solely for use by, or within, a single organization. A community cloud is intended to be shared by several organizations within a community; while a hybrid cloud comprise two or more types of cloud (e.g., private, community, or public) that are bound together by data and application portability. [0112] Generally, a cloud computing model enables some of those responsibilities which previously may have been provided by an organization's own information technology department, to instead be delivered as service layers within a cloud environment, for use by consumers (either within or external to the organization, according to the cloud's public/private nature). Depending on the particular implementation, the precise definition of components or Docket No.: 50277-6167 (ORC23136555-WO-PCT) features provided by or within each cloud service layer can vary, but common examples include: Software as a Service (SaaS), in which consumers use software applications that are running upon a cloud infrastructure, while a SaaS provider manages or controls the underlying cloud infrastructure and applications. Platform as a Service (PaaS), in which consumers can use software programming languages and development tools supported by a PaaS provider to develop, deploy, and otherwise control their own applications, while the PaaS provider manages or controls other aspects of the cloud environment (i.e., everything below the run-time execution environment). Infrastructure as a Service (IaaS), in which consumers can deploy and run arbitrary software applications, and/or provision processing, storage, networks, and other fundamental computing resources, while an IaaS provider manages or controls the underlying physical cloud infrastructure (i.e., everything below the operating system layer). Database as a Service (DBaaS) in which consumers use a database server or Database Management System that is running upon a cloud infrastructure, while a DbaaS provider manages or controls the underlying cloud infrastructure and applications. [0113] The above-described basic computer hardware and software and cloud computing environment presented for purpose of illustrating the basic underlying computer components that may be employed for implementing the example embodiment(s). The example embodiment(s), however, are not necessarily limited to any particular computing environment or computing device configuration. Instead, the example embodiment(s) may be implemented in any type of system architecture or processing environment that one skilled in the art, in light of this disclosure, would understand as capable of supporting the features and functions of the example embodiment(s) presented herein. [0114] In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. The sole and exclusive indicator of the scope of the invention, and what is intended by the applicants to be the scope of the invention, is the literal and equivalent scope of the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction.