Method and apparatus for binary-oriented set sequencing

ABSTRACT

A computer-implemented method and apparatus for information organization, wherein atomic information can be both static and dynamic, but the compound information (e.g., associations, groupings, sets, etc.) of such atoms always remain dynamic. Unless otherwise directed, a compound information entity is always dynamically determined and generated. This determination is based on the processing of a defined condition, wherein all atoms qualifying the condition are included in the compound. This dynamic determination eliminates the need to “update” the compound, when atoms and/or compounds common to two or more compounds are changed. Further, each information compound can be dynamically generated based on an existing definition for that compound.  
                   TABLE I                 NUMBER             OF   TOTAL REAL   INCREASE IN     MODULES   POSSIBILITIES   POSSIBILITIES                               1   0.25         2   0.50   0.25     5   30   30     10   907, 200   907, 170     100   2e + 157   2e + 157

BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention

[0002] The present invention discloses a method and apparatus for dataorganization, storage, retrieval and processing, that eliminateslocational, structural or associative limitations.

[0003] 2. Description of Related Art

[0004] Currently, information organization is implemented using manymethodologies, which often serve different and distinct purposes fordifferent general kinds of information. If the information is composedof specific facts, figures, names, and relationships;, then the currentapproach forces each specific application to provide its own way ofdefining and using records. The only process who can possibly know whatthe information is, is the one application which creates/maintains thatkind of information. At the lower OS level, data can be any type as faras a database or any other application is concerned. So files anddirectories are used to organize information, where physical and logicalorganizations of information are one and the same.

[0005] To find qualified and desired information, a process must firstdeal with files and directories. The process must incorporate andreflect the physical directory and file hierarchy into its logicalinformation organization. Many current containment shells such asWINDOWS and DESQVIEW, attempt to provide a seamless gap between the OSand applications, so that a process does not have to deal with OSdetails. Aside from being unstable, such shells are still constricted bycontainment. That is, the logical and physical organizations ofinformation become the same at some level. That is the level at whichlogical expansions, reorganizations, and further associations becomeimpossible for containment.

SUMMARY OF THE INVENTION

[0006] To overcome the limitations in the prior art described above, andto overcome other limitations that will become apparent upon reading andunderstanding the present specification, the present invention disclosesa computer-implemented method and apparatus for informationorganization, wherein atomic information can be both static and dynamic,but the compound information (e.g., associations, groupings, sets, etc.)of such atoms always remain dynamic. Unless otherwise directed, acompound information entity is always dynamically determined andgenerated. This determination is based on the processing of a definedcondition, wherein all atoms qualifying the condition are included inthe compound. This dynamic determination eliminates the need to “update”the compound, when atoms and/or compounds common to two or morecompounds are changed. Further, each information compound can bedynamically generated based on an existing definition for that compound.

BRIEF DESCRIPTION OF THE DRAWINGS

[0007] Referring now to the drawings in which like reference numbersrepresent corresponding parts throughout:

[0008]FIG. 1 is a block diagram that illustrates one possible hardwareenvironment for the present invention;

[0009]FIG. 2 is a block diagram that illustrates the structure of anInfoFrame according to the present invention;

[0010]FIG. 3 is a block diagram that illustrates the associationspresent in a containment organization;

[0011]FIG. 4 is a block diagram that illustrates the binary associationsaccording to the present invention;

[0012]FIG. 5 is a block diagram that illustrates grouping in acontainment organization to achieve a combined topic;

[0013]FIG. 6 is a block diagram that illustrates grouping according tothe present invention to achieve a combined topic;

[0014] FIGS. 7A-7E are a block diagram that illustrates a current methodof organization implemented according to the present invention;

[0015] FIGS. 8A-8B are a block diagram that illustrates a compoundlogical structure according to the present invention;

[0016]FIG. 9 is a block diagram that illustrates associative processingaccording to the present invention;

[0017]FIG. 10 is a block diagram illustrating the structure of theUniversal Entity Identifier (UEI) according to the present invention;

[0018]FIG. 11 is a block diagram illustrating the structure of theEndo-Dynamic Information Node (EDIN) according to the present invention;

[0019]FIG. 12 is a block diagram that illustrates the valid combinationsof the EDIN fields in terms of value according to the present invention;

[0020]FIG. 13 is a block diagram illustrating the structure of the BondInformation Record (BIR) according to the present invention;

[0021]FIG. 14 is a block diagram that illustrates the structure of anInfoFrame according to the present invention;

[0022]FIG. 15 is a block diagram illustrating the structure of the BondFlags portion of the BIR according to the present invention;

[0023]FIG. 16 is a block diagram illustrating the structure of the BondOrganization Record (BOR) according to the present invention;

[0024]FIG. 17 is a block diagram that illustrates logical bondorganizations according to the present invention;

[0025]FIG. 18 is a block diagram that illustrates the structure of acommand line according to the present invention;

[0026]FIG. 19 is a block diagram that illustrates the structure of anEndo-Dynamic Information Statement according to the present invention;

[0027]FIG. 20 is a block diagram that illustrates the structure of anExpandable Table Set according to the present invention;

[0028]FIG. 21 is a block diagram illustrating the structure of theExpandable Table Record (ETR) according to the present invention;

[0029]FIG. 22 is a block diagram illustrating the structure of theExpandable Table Array Header (ETAH) according to the present invention;

[0030]FIG. 23 is a block diagram illustrating the structure of theInfoFrame Control Record (IFCR) according to the present invention;

[0031]FIG. 24 is a block diagram that illustrates the structure of anActivation List Example according to the present invention;

[0032]FIG. 25 is a block diagram illustrating the structure of theInfobase Definition Record (IBDR) according to the present invention;

[0033]FIG. 26 is a block diagram illustrating the structure of the SetDefinition Record (SDR) according to the present invention;

[0034]FIG. 27 is a block diagram illustrating the structure of theModule Definition Record (MDR) according to the present invention;

[0035]FIG. 28 is a block diagram that illustrates the structure of a SetDefinition Equation according to the present invention;

[0036]FIG. 29 is a block diagram that illustrates the structure of anEndo-Dynamic Set comprised of Set Definition Equations according to thepresent invention;

[0037]FIG. 30 is a block diagram illustrating the structure of theOperator Information Record (OIR) according to the present invention;

[0038]FIG. 31 is a block diagram illustrating the structure of theParameter Definition Record (PDR) according to the present invention;

[0039]FIG. 32 is a block diagram that illustrates flat storageorganization according to the present invention;

[0040]FIG. 33 is a block diagram that illustrates the structure of anEndo-Dynamic Set hierarchical data tree according to the presentinvention;

[0041]FIG. 34 is a block diagram that illustrates the structure of anEndo-Dynamic Set structure definition according to the presentinvention;

[0042]FIG. 35 is a block diagram that illustrates the structure of aprogram example according to the present invention;

[0043]FIG. 36 is a block diagram that illustrates the structure of anEndo-Dynamic Set comprising an interpreted program according to thepresent invention;

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

[0044] In the following description of the preferred embodiment,reference is made to the accompanying drawings which form a part hereof,and in which is shown by way of illustration a specific embodiment inwhich the invention may be practiced. It is to be understood that otherembodiments may be utilized and structural changes may be made withoutdeparting from the scope of the present invention.

OVERVIEW

[0045] Information can be generally described as either being atomic orcompound, where atomic information is an elementary unit and compoundinformation encompasses any combination of atoms and other compounds toserve a given purpose. The present invention, termed Binary Oriented SetSequencing (BOSS), is based on the concept that the minimal commoninformation structure for any body of data is binary. This binary viewof data organization achieves an information management environment inwhich any information of any complexity and type can be represented,viewed, stored, and processed.

[0046] The present invention further adopts a view of informationorganization where atomic information can be both static and dynamic,but the compound information (e.g., associations, groupings, sets, etc.)of such atoms always remain dynamic. Unless otherwise directed, acompound information entity is always dynamically determined andgenerated. This determination is based on the processing of a definedcondition, wherein all atoms qualifying the condition are included inthe compound. This dynamic determination eliminates the need to “update”the compound, when atoms and/or compounds common to two or morecompounds are changed. Further, each information compound can bedynamically generated based on an existing definition for that compound.

[0047] The present invention differs in several ways from conventionalinformation storage and processing environments. These are listed below,and described in ensuing subsections:

[0048] The InfoFrame

[0049] Binary Association

[0050] Universal Entity Identification

[0051] Dimensia

[0052] Associative Processing

[0053] As a result of these elements, an environment becomes feasible,where the elements of logical organizations of all data are stored asnodes. Further, processes are able to view the same nodes in differentways. To be more precise, BOSS can achieve any logical structure giventhe same basic set of information atoms. This means data is maintainedthe same way, regardless of the process manipulating it, and regardlessof the process's view of the involved data. Instead of having toimplement and store static single-purpose control structures andrecords, a process need only store a set definition equation whichresults in a particular view of the data. This promotes an environmentin which a general pool of nodes for all kinds of different data can beused as the basis for dynamically generating different views for all thedifferent processes which use pieces of the collective data pool indifferent ways.

HARDWARE ENVIRONMENT

[0054]FIG. 1 depicts the hardware architecture of the preferredembodiment in accordance with the principles of the present invention.Generally, the present invention operates in a network environment 100having a decentralized hardware architecture, including one or moreservers 102, and a plurality of user workstations 104, all coupledtogether through the network 106. In the preferred embodiment, thenetwork 106 is depicted as having a ring topology. Those skilled in theart will be able to bring to mind other known network topologies suchas, but not limited to, a star or a bus configuration. Typically, theserver 102 will include a database 108, although the workstations 104themselves could store all or a part of a database 108.

THE INFOFRAME

[0055] The present invention provides for the existence of a global(universal) Information Frame (InfoFrame), where all types of systems(InfoBases) which include various programs and databases (modules) , andvarious data structures and data values (views and nodes) can co-existin the InfoFrame, and data can be created, modified, organized, sharedand exchanged on a dynamic basis. Data exchange across the InfoFrame istrivial, no matter what the system type. This makes all the processingof data import/export and usage across the InfoFrame invisible to allclient processes.

[0056]FIG. 2 is a block diagram that illustrates the structure of anInfoFrame 200 according to the present invention. The present inventionorders all information in the following manner:

[0057] Information Frame (InfoFrame) 200, which is the overall groupingof all information.

[0058] Information Base (InfoBase) 202, which is a set of informationmodules and other control information that provides a self-contained setof consistent modules which provide for needs of a BOSS client.

[0059] Endo-Dynamic Information Node (EDIN) 204, which is a binaryassociation of two information atoms, Subject and Attribute, as well asa Bond that binds them.

[0060] Endo-Dynamic Set (EDS) 206, which is a dynamically generated,possibly ordered, list of EDINs 204 that describes, depicts, or embodiesa subject, attribute, or bond.

[0061] Information Module (IM) 208, which is a set of EDS's 206 andother control information that provides a self-contained set ofconsistent EDS 206 which provide for needs of a BOSS client.

[0062] An EDS 206 may contain any number of EDINs 204 or be empty. Thecontents of an EDS 206 are dictated by a condition for that EDS 206,wherein the condition is provided by a Set Definition Equation (SDE).The more complex the SDE, the more particular data and/or datarelationships are required to satisfy membership in the resultant EDS206. However, SDE complexity does not directly effect the size of aresultant EDS 206. The size of a resultant EDS 206 simply depends on thenumber of EDINs 204 which satisfy the associated SDE. This size dependson the kinds of data being organized, and how frequently instances ofthat kind of data occur.

[0063] All EDS's 206 are dynamically generated using one or more modulesas the source of generation. A module 208 is primarily a set of EDINs204 with no particular order. Modules 208 can then be included in one ormore InfoBases. Each InfoBase 202 provides evolved information access,searching, and processing, by including as many modules as required toaccount for all data and processes. The InfoFrame 200 is the totality ofall InfoBases 202 and is the largest possible data space. Everyindividual computer or network has its own InfoFrame 200. When two ormore computers or networks are connected such that data exchange ispossible, the InfoFrame 200 has simply become larger. In this sense,there is only one InfoFrame 200 on a global basis, and it is just amatter of what portion of the InfoFrame 200 a user is connected to orhas access to.

[0064] An EDS 206 differs from a set, as that term is understood in theart, in several important ways. First, an EDS 206 can have aheterogeneous meaning. That is, an EDS 206 can contain any number ofdifferent meanings, data or representations.

[0065] Second, an EDS 206 does not have to conform to the concept ofcontainment. Containment is where an element “X” physically exists or is“contained” within set “Y”. In a non-containment environment, there isno predefined meaning between “X” and “Y”, just because one contains theother. In set methodology, the only meaning that can be derived is that“X” is contained by “Y”. In the present invention, “X” and “Y” can haveany number of relationships defined directly in EDINs 204 or streams ofrelated EDINs 204.

[0066] Third, it is possible to execute expressions to modify an EDS 206or create a new EDS 206 in terms of a meaningful formula. This formulais based on operators which can affect EDINs 204 or EDS's 206 in anumber of different ways. In contrast, set-based mechanisms are based onadding or extracting the meaning of the set by adding or extractingelements from zero or more sets.

[0067] Since, by default, all modules are accessible across theInfoFrame 200, each added module increases the possibilities fordifferent and new InfoBases 202 by a substantially large number.Clearly, this increase is non-linearly proportional to the number ofmodules 208. Formula A below gives the number of unique possibilities,where “n” is the number of modules 208. Formula B gives the absoluteincrease in unique possible combinations of modules 208, when one module208 is added. Formula C gives the real number of increasedpossibilities, by assuming that ¾ of all such unique possibilities haveno meaning and serve no purpose in reality. Table I shows the calculatednumbers based on different module 208 numbers.

[0068] A=n!

[0069] B=(n+1)!−n!

[0070] C=((n+1)!−n!)/4

[0071] wherein the “!” operator indicates a factorial operation. As canbe seen, this is slightly less than “n×n”.

[0072] The ease of integration and data sharing, combined with the rapidincrease in potential new InfoBases, provides an environment where, asmore data is added and as more processing takes place, the environmentas whole becomes more stable and capable. Further, using automation andchaining for all levels of the InfoFrame 200 (including the InfoFrame200), clients can tie together InfoBases 202 in particular ways, suchthat automatic activities take place, these activities including themonitoring, retrieval, storage; and determination of:

[0073] Entity value;

[0074] Entity organization;

[0075] InfoBase 202 chaining and the determination of chains;

[0076] Module 208 chaining and the determination of chains; and

[0077] InfoFrame 200 native processes and settings.

[0078] Given a defined InfoFrame 200, client processes can use BOSSoperators as to manipulate part or all of the InfoFrame 200 in varietyof ways to display, modify, process, search, etc., the information. ABOSS client always calls the Endo-Dynamic Processor (EDP), passing it alist of operators (and their parameters). The EDP is a software CommandProcessor (CP), which accepts an operations list as input and executeseach line in the order specified by the operations list. Note that theoperations list is an EDS itself, providing for variable number ofparameters for the operators. In a pure BOSS environment, a top-leveloperation list (program) would be executed at power-on. This program isan infinite loop where exit is possible by satisfying monitor processes,and where each required InfoBase is located, verified, and initiated. Ina multi-tasking environment (e.g., Windows), linear module chaining andInfoBase chaining is possible. In a multi-processing environment (e.g.,Windows-NT), real-time (and therefore non-linear) InfoBase chaining andmodule chaining is possible.

[0079] In a multi-site (computer) environment, each site executesoperations lists via its own EDP and accepts remote operations lists aswell. Since a Universal Entity Identifier (UEI) identifies the site fromwhich data originates (i.e., is located on), remotely located data ispotentially slower, but is handled via EDP-to-EDP communication and datatransfer that is invisible to the client. Therefore, it is possible forone site to initiate a process that will execute via the EDP of anothersite, thereby leaving the original site free to perform furtherimmediate processing.

BINARY ASSOCIATION

[0080] In a logical information organization, an atom of information canbe a logical representation for a topic, event, process, or entity whichcan exist, be identified, and requires processing. A logicalorganization exists when the information atoms are associated indifferent ways to produce a structure. In current informationorganization methodologies, the only kind of association between twoatoms of information is containment. This is true no matter how evolvedthe containment method may be. For example, in object-orientedprogramming methods, objects can have associated predefined processes,where this is accomplished by the object containing the processes orreferences to those processes.

[0081] Current methods maintain child-lists for each parent to recordlogical organization. A child is only recognized as having anassociation if it is a parent itself.

[0082]FIG. 3 is a block diagram that illustrates the associationspresent in a containment organization. In FIG. 3, the atoms shown on theright, identified as B 304, C 306, D 308, and E 310, are the children ofA 302. The containment approach is to store the atoms (or identifiers toatoms) B 304, C 306, D 308, and E 310 in the logical control record forA 302. For example, a directory in DOS or UNIX is simply a filecontaining a list of that directory's contents.

[0083] Unlike a conventional set-element, the EDIN provides two atoms(or identifiers of atoms): a Subject and an Attribute. Each of the atomsgiven by an EDIN is an information atom in the sense described above.The Attribute provides additional association, enhancement orqualification to a given Subject atom. As a result, an EDIN contains abinary-association within itself. The EDIN is an independent entity,capable of existing in any EDS whose condition (SDE) can be met. TheSubject and Attribute atoms can be used in various ways to express anynumber of different associations. As a result, an EDS (a set of EDINs)can contain any number of singular relationships to describe a moregeneral association.

[0084]FIG. 4 is a block diagram that illustrates the binary associationsaccording to the present invention. FIG. 4 shows four EDINs with aSubject of A 402 and Attributes B 404, C 406, D 408, and E 410. Thecondition for this EDS is simply that the Subject of each EDIN must be A402. Each EDIN provides a relation, but all EDINs together describe thesame tree as shown in FIG. 3. In this way, a collection of EDINs providebinary-associations between Subject atom A 402 and the variousAttributes 404-410.

[0085] Note that it is equally possible to dynamically generate anotherEDS where the condition (SDE) is that the Attribute must be B 404. ThisEDS would describe all atoms which have the Subject in a relation with B404. Yet another SDE could produce an EDS where all Subjects are A 402and all Attributes are B 404. This EDS would describe all the possibleassociations of A 402 and B 404.

[0086] Containment methods also experience problems when two existinginformation organizations need to be combined. FIG. 5 is a block diagramthat illustrates grouping in a containment organization to achieve acombined topic. The two existing organizations under A 502 and B 504 arecombined to produce a combined organization 506. No new associations areproduced, the associations of A 502 and B 504 remain unchanged.Containment methods have no way of actually integrating the twoorganizations because identification of atoms is based on location.Consider the atom D 506 under topic A 502. This atom also occurs undertopic B 504. In the resultant combined organization, atom D 506 isduplicated, since the location of the two were different prior tocombining the organizations. This is actually not good as the duplicateatom in the new organization will confuse existing processes whichaccess atom D 506. As a result, combing two logical containmentorganizations is often manual and always time consuming. Using BOSS, thesame two organizations can be combined without the problems common amongcontainment approaches.

[0087]FIG. 6 is a block diagram that illustrates grouping according tothe present invention to achieve a combined topic. FIG. 6 shows an EDSformat of the same topics A 602 and B 604 as in FIG. 5. Again, atom Doccurs both under topics A 602 and B 604 prior to the merge. Thecombined topic 606 simply contains all EDINs of both topics, where thecondition for the EDS is that the EDIN Subject must be either A 602 or B604. The atom D occurs as the Attribute of two EDINS, but is notduplicated. That is, both EDIN Attributes identify the same exactinformation atom.

[0088] In this way, BOSS is independent of the location of informationatoms in an organization. In other words, BOSS achieves a completeseparation of physical and logical locations of data. Note that this isonly possible because of the endo-binary nature of the EDIN, the derivedbinary association in an EDS, and universally unique data identificationand location.

UNIVERSAL ENTITY IDENTIFICATION

[0089] The next cornerstone of BOSS is the universally uniqueidentification and location of items. In BOSS, each set and each elementis uniquely identifiable via a Universal Entity Identifier (UEI). Thismeans that any topic/object can be uniquely identified, under allconditions. If this were not true and a containment-based approach wereused, BOSS could be inadvertently rendered impotent because the Subjectand Attributes of an EDIN could be ambiguous. The ambiguity isintroduced because if an item (Subject or Attribute of an EDIN) cannotbe uniquely identified, it cannot be uniquely or correctly associatedwith other items.

DIMENSIA

[0090] The next element of BOSS is called “Dimensia”. Dimensia looselyrefers to contexts or levels of abstraction that a method forinformation organization is able to achieve at both atomic andnon-atomic levels. Most current systems use flat or static multi-levelmethods for information organization. A flat method or structure employsone level of abstraction. A static multi-level method provides a maximumof N predefined levels of abstraction.

[0091] In all current methods, an information atom qualifies and/ordescribes itself. For example, an object in an object-orientedprogramming system may contain the atomic element's 32 bit number,string, and date. While describing itself, the singular atom does notimmediately provide a relationship to any other entities. For example,an atomic date object element simply tells you that fact; it does notprovide you with any relationships it may have to any other entities. Itis the object containing the elements which is known to haverelationships with each atom. By further including object derivingprocedures in an object, one or more atoms may be related to otherentities, but only the object driver knows this fact, and the identityof the associated entities. So even in evolved containment methods, onlya limited set of the data relationships are given by the data itself;the rest is process dependant.

[0092]FIGS. 7A, 7B, 7C, 7D, and 7E are block diagrams that illustrate acurrent method of organization, e.g., a binary tree 702. To have thislogical structure, the organization can be of two general types. It canbe an array 704 where tree-traversal is performed via mathematicallycalculated indexes, based on current index. Or it can be a set ofrecords 706 with left and right pointers. In either case, an inflexiblecontrol structure is used to achieve logical organization. Thesestructures are inflexible because they are static in nature. Forexample, should the order of the elements in the array 704 change, adifferent tree (if one is decipherable at all) is now represented. Therecord example 706 is free of this problem, but the control record isparticular and can only be used for binary trees and linked lists.

[0093] In BOSS, each EDIN contains a Bond between a Subject and anAttribute. As described above and shown by FIG. 3 and FIG. 4, an EDS 708can represent a tree by collecting all EDINs with the same Subject.However, to implement all levels in a tree, Attribute atoms in EDINsoccur as Subject atoms in other EDINs. In FIGS. 7A-7E, to record theexample binary tree 702, an EDS 708 records enough EDINs to relate allrequired associations. Note that to discern left and right children, theBond specified in the EDIN can be used. Note that since an EDS isdynamically generated, insertions and deletions to/from a weighted tree710 are trivial as shown in FIG. 7E, and do not involve complex left orright sub tree rotation.

[0094] In general, by duplicating the EDIN (i.e., twice the controldata) with same Subject and different Attributes, two or morerelationships of the same Subject atom and various Attribute entitiescan be established. In each case, the particular relationship isidentified. In this way, all the different relationships an atom has toone other entity, as well as expressing all the different entities withwhich that atom has a relationship, can be expressed. Therefore, usingBOSS methodology, the maximum number of possible individually definedrelationships of one entity with others is infinite and is onlyconstrained by the amount of available storage space. This is a majoraspect of Dimensia.

[0095] When complex and/or compound logical organizations of data areused, current methodologies are also forced to employ (and implement)complex and/or compound processes to traverse the organization. Considerthe case shown in FIGS. 8A and 8B, which are block diagrams thatillustrate a compound logical structure according to the presentinvention. In FIGS. 8A-8B, each atom of the example binary tree 702 ofFIGS. 7A-7E is also an element in a distinct and separatetwo-dimensional array 802. Using current methodologies, new structuresmust be introduced, i.e., eight two-dimensional arrays of DATAIDENTIFIER. The DATA IDENTIFIER values of atoms “A” to “H” would then bestored in appropriate locations in one of arrays, A1 to A8. Now theprogram dealing with the data must not only include processes for theold binary-tree record 706, but also include processes to manipulate thearrays.

[0096] To implement the example compound organization 802 using BOSS,new EDINs are introduced, not new structures or processes. FIGS. 8A and8B illustrate a simple (and inefficient) two-dimensional arrayimplementation, where the EDINs are sequenced based on a valuecalculated from two-dimensional values. The EDS 804 actually encompassesall the arrays, where sequenced subsets of EDINs representtwo-dimensional arrays. In each EDIN subset, the atom which coexists inthe binary tree 802 is shown; this atom would occur in the sequenceresulted from its array coordinates. Each such EDIN set is not a twodimensional array in the actual sense, and is very sparse. Again, thedynamic nature of an EDS, means that the EDS is sequenced upongeneration.

[0097] Note that the additional EDINs 804 to represent the arrays couldbe stored together with the EDINs for the binary tree 708 of FIGS. 7A-7Ein a module. Upon loading the module, and depending on the SetDefinition Equation (SDE) used, one or the other of the EDS's can beproduced. In this way, Dimensia is made possible for information, whereno new processes or control structures are required, and only new SDEsand EDINs are introduced and processed (as per before) to producedifferent and currently incompatible views of the same atoms of data.

ASSOCIATIVE PROCESSING

[0098] The next cornerstone of BOSS is associative processing. Asmentioned above, a Bond in a given EDIN identifies a native BOSS processassociated with the Attribute of that EDIN, and possibly involving theSubject of that EDIN. In a BOSS environment, it is possible toautomatically establish and execute new associated processes, based on agiven information set. As a simple example, consider the two EDINs givenas 902 in FIG. 9, which is a block diagram that illustrates associativeprocessing according to the present invention. Based on these EDINs, theBOSS process is able to automatically derive and store the third EDIN904. From then on, the item “X” has direct relationships with both “Y”and “Z”. Note that the derived EDIN 904 can only be assumed to becorrect when the relation is transitive in nature (i.e., X BOND Y=Y BONDX). For example, the “brother of” relationship is transitive, while“father of” is not. Aside from simple association, BOSS can deriveassociations whose correctness is not absolute. Consider the EDINs givenas 906 in FIG. 9. Possible automatic derivations are shown as the EDINs908. Such proposed EDINs can then be automatically checked forcorrectness by gathering all data about “A” and “C” and then performingan exhaustive cross check to establish one of the following generalresults:

[0099] Not enough data

[0100] The correct and incorrect EDIN(s)

[0101] Since EDINs with any contents and purpose can coexist in a givenmodule, it is possible to automatically derive new relationships andassociated processing and store such new information in the same module,thereby expanding the InfoFrame of BOSS on an automatic and dynamicbasis.

HARDWARE EVOLUTION

[0102] The principles of BOSS outlined thus far are hardware compatibleconcepts. It is possible to reduce the vast majority of BOSS operatorsdirectly into hardware. Indeed, most of the BOSS operators and theEndo-Dynamic Processor have been designed such that they can beconverted (or evolved into) hardware.

[0103] This simple fact renders BOSS one of the most powerful dataorganization approaches in existence. Besides being able to operate twoto three orders of magnitude faster than conventional data organizationapproaches when implemented in hardware, BOSS is infinitely moreflexible.

[0104] Based on the evolution of hardware devices, the demand for orderof magnitude solutions is greater than ever. Further, the existingapproaches to solving the increasingly complex data organization,migration and integration issues are being limited by the engines used.

[0105] The BOSS methodology also promises interesting advances in CPUdesign. Consider that a UEI can also be a machine code mnemonic. Anatural result of this fact is that the data of an EDIN can also be aprogram, under the correct circumstances. Further, it is possible toalso create processing actions based on the binary relation found in anEDIN.

COMPONENTS

[0106] Unless specified otherwise, when any component or list is storedto file, a number of operations occur. First, a checksum of thecomponent is calculated. Next, the checksum, followed by a size (ornumber of records) is stored at top of file. Finally, the component issaved. Loading performs the reverse actions.

UNIVERSAL ENTITY IDENTIFIER (UEI)

[0107]FIG. 10 is a block diagram that illustrates the structure of aUniversal Entity Identifier (UEI), which is the heart of informationlocation and identification in BOSS methodology. A UEI contains twofields to provide a universally unique location for a physical body ofdata. These are the Site Owner Identifier (SOI) and the Site EntityIdentifier (SEI). The SOI is the serial number of the EDP operating at agiven site or some other unique identifier for an EDP. The SEI is aunique incremental number per site, where the SEI is assigned andincremented each time a new data entity is created. An SOI and SEItogether are called a Combined Data Identifier (CDI). A CDI combines theduties of identification and physical location into a single entity.This is contrary to many current methods, where location is derived oris cross-referenced based on a given identifier.

ENDO-DYNAMIC INFORMATION NODE (EDIN)

[0108]FIG. 11 is a block diagram that illustrates the structure of anEndo-Dynamic Information Node (EDIN), which comprises the elements in anEDS. The EDIN is the most atomic form of stored BOSS information. AnEDIN is composed of four fields, i.e., a Subject UEI, an Attribute UEI,a Bond UEI, and a Sequence field. The Subject, Attribute, and Bond UEIscan occur in other EDINs and in other fields. For example, an AttributeUEI can be a Subject or Bond UEI in another EDIN. The Sequence field isused to enforce a predefined order for the EDINs in an EDS.

EDIN COMBINATIONAL BEHAVIOR

[0109]FIG. 12 is a block diagram that illustrates the valid combinations1202 of the EDIN fields in terms of value, i.e., non-null, null, and“any” (i.e., could be either null or a valid value) according to thepresent invention. Since any field in an EDIN can contain a null value,it is prudent to specify the exact set of possible combinations andtheir meanings.

[0110] The first and most common combination is for all valid EDINswhich are simply elements in a set.

[0111] The second combination is used when an item of information is“nullified” (see below). This has the effect of making the Attributeitem inaccessible in all non-edit BOSS processes.

[0112] The last two combinations are shown for completeness. Thesecombinations, and all others not shown by FIG. 12, are illegal andinvalid occurrences of EDINS.

NULLIFIED EDINS

[0113] As shown in FIG. 12, if the Attribute of an EDIN has a nullvalue, it is called a Nullified Subject Node (NSN), where the Subject ofa NSN is the item being nullified. When a NSN is created, all EDINs withthe same Subject and all the EDINs with the same Attribute UEI, as theNSN subject, are now prohibited from being including on all subsequentEDS generations. This has the effect of hiding information, or hiding aparticular section in an organization. To remove a nullification(un-nullify), the NSN is simply removed from a module. Now, allpreviously invisible items or hierarchy branches are made visible again.

[0114] The NSN is strictly optional and it's presence or absence doesnot invalidate or limit the working of BOSS methodology. If used, NSNscan augment BOSS with an information hiding capability.

BOND

[0115] The third EDIN field is a Bond UEI value. This ensures that Bondsare universally unique. A Bond value identifies a process whereprocessing occurs based on an interpretation of the EDIN Attributefield; these include a noun, verb, adjective, adverb, action,action-sequence, etc. In all cases, the Bond is known to be between theSubject and the Attribute.

[0116]FIG. 13 is a block diagram that illustrates the structure of aBond Information Record (BIR), which records Bond information. A BIR hasthree fields. The first is a Bond to provide a key in the BondInformation Table (BIT). The BIT is a list of BIRs sorted by the Bondfield. As shown in FIG. 14, the BIT is stored at the InfoFrame level.The second field of the BIR is a flag to describe the basic propertiesof the Bond. The last field of the BIR is UEI which identifies theassociated process to be executed (by the EDP). This is most often anEDO, but can also be a major subsystem of the EDP which handles this andother similar bonds or a BOSS program. The images and any default valuesfor bonds are stored in the IMAGE-ETS and DATA-ETS at the InfoFramelevel.

[0117] As shown in FIG. 15, the Bond Flags field in the BIR gives theproperties of the Bond, as follows: Active/Passive Active Bondsinstitute immediate processing and interrupt the active process flowuntil they are terminated. Passive Bonds are relations which make astatement of fact or existence; they do not instigate immediateprocessing, but are used in the various BOSS processes to generate andprocess EDS's. Operator This flag indicates that the Bond is an EDO.Although redundant, EDOs are also Bonds recorded twice. The UEI for theEDO Bond is identical to the EDO UEI given for that EDO in the OperatorIT (forces active as flag enable). Call This flag indicates that theBond is a BOSS process including a SDE, BOSS program, EDP command list(forces active as flag enable). When this flag is off, the associatedprocess is assumed to be an OS binary program. Spawn This flag indicatesthat a non-BOSS process is to spawn concurrently or multitask (forcesactive as flag enable and call flag disable). User/Native This flagindicates whether the Bond is a native Bond as supplied by the EDP, or aBond created by other person or process. Whenever a Bond is created,this flag is set to User, since any native Bonds would be supplied bythe EDP or shipped as upgrades.

[0118] In order for Bonds to make sense to a user, not only do they haveto have names, but also some form of organization. The names/images forall Bonds are stored in the IMAGE-ETS, using the Bonds as the searchkey.

[0119] In order to provide organization, the Bond Organizational Record(BOR) is used. A minimal form of the BOR is shown in FIG. 16. This BORcontains only two fields, a SELF and a RELATED Bond. Using this simplerecord, almost any logical organization of Bonds can be achieved.

[0120] As shown in FIG. 17, anything from a multi-level tree 1702 to asimple list 1704 is possible. Depending on the running process,different logical structures can be adopted.

[0121] A Bond value should always occur in the Bond EDIN field. Considera bond UEI which is recorded as a subject or attribute of an EDIN, withsome other Bond value in the EDIN bond field. When this EDIN isprocessed, the bond recorded as subject or attribute will behave as asubject or an attribute, and not as bond. This can cause errors in EDPprocesses and clients which require and recognize thesubjected/attributed bond for their critical processing.

ENDO-DYNAMIC SET (EDS)

[0122] Any dynamically generated or simply loaded list of EDINs is anEndo-Dynamic Set (EDS). An EDS always has a particular purpose andmeaning, as known only to the process using the data. For example, anEDS generated from a program module could be a program data structure, aprogram data occurrence, or a procedure occurrence. The EDINs in the EDSalso may be or may not be ordered, depending on the requirements of thedata being represented by the EDS as a whole.

[0123] EDS's are identified by UEIs, but for the most part, this is doneindirectly and not in the same manner as other entities. The UEIassociated with most EDS's is actually the identifier for a SetDefinition Equation (SDE). Given any module, the SDE can be used to(re)produce an EDS with the same exact membership conditions andpotentially different elements. Instead of storing the distinct EDS'spresent in a module, only the equations (SDEs) need be stored. This isrequired to ensure EDS's generated via SDEs remain dynamic at all times,and is somewhat smaller since set elements need not be duplicated. Sincean SDE is itself implemented as an EDS, it is necessary to store theSDE-EDS in the same module.

BASIC EDIN SEQUENCES

[0124] Information can be generally categorized as being active orpassive. In this view, EDIN sequencing in an EDS takes one of two basicforms: active sequence and passive sequence. An active sequence isalways an executable process of some form; a passive sequence alwaysexpresses the structure, existence, qualities, properties, values, etc.,of some information. Put differently, an active sequence performs someactivity, while a passive sequence provides data about some information.Further, BOSS methodology allows for any combination and number ofoccurrences of both kinds of EDIN sequencing in the same EDS. However,this would involve overhead processing, and the availability of a clientprogram to process the passive sequences. Some passive sequences haveassociated native processes which handle or drive those particular kindsof passive information required for BOSS operations. In both cases, theEDIN sequence field is used to establish the EDIN order. For activesequences, the EDIN sequence value starts from zero and goes up to thenumber of required EDINs, where an EDIN sequence value is neverduplicated in an active sequence. For passive processes, the EDINsequence may or may not be required, depending on the information beingrepresented by the passive sequence. For example, if the passiveinformation comprises files maintained hierarchically in directories,which exist in volumes, the sequence field is not required. However, ifthe passive information is a data structure definition, with elements insome depth, the sequence fields are used to order the elements of thestructure. The only EDIN sequence value which can be duplicated in apassive sequence is a “null” value.

[0125] To express an active sequence, one or more Endo-Dynamic CommandLines (EDCL) are used, where the order of the EDCLs, as established bythe EDIN sequence fields, embodies the required active sequence. Toexpress a passive sequence, one or more Endo-Dynamic InformationStatements (EDIS) are used, where the EDINs may or may not be ordered bythe EDIN sequence field.

ENDO-DYNAMIC COMMAND LINE (EDCL)

[0126] The BOSS central process, the EDP, takes command lines as input.An Endo-Dynamic Command Line (EDCL) is dynamic in nature, and variablelength. The basic EDCL 1802 is shown in FIG. 18. First, any number ofEDINs bond any number of parameters to a subject identification, thesubject being an EDCL 1802. Then, an EDIN bonds the EDCL 1802 (samesubject) to an executable entity, shown as “XXX”. The EDINs are orderedby the sequence field to place parameters before the executionoccurrence. The executable entity XXX could be an endo-dynamic operator,a BOSS process (including SDE, BOSS program, activation list, etc.), oran OS executable program.

[0127] EDOs form the “instruction” set available from the EDCL 1802. EDOEDCLs 1802 are the fastest to execute, and require the least amount ofoverhead processing. A BOSS process is any ordered list of EDCLs. Thiscould be an SDE, a BOSS interpreted program, an activation list for anInfoBase or InfoFrame, etc. An OS executable program is externallyexecuted and requires the most amount of overhead processing.

[0128] The EDCL 1802 differs from conventional command lines in severalways. Clearly, the EDCL 1802 is variable length in that any number ofparameters are possible. The EDCL 1802 is also dynamic, in thatparameter and execute EDINs (all EDINs for an EDCL 1802) can be changeddynamically, and the EDCL re-executed. Note that the EDCL 1802 triggerfor the EDP is the Bond field of the EDINs, not the subject or attributefields. This is an important aspect of BOSS methodology. Using the Bondas a trigger means that, in EDCL 1802 processing, information subjectsand attributes can occur freely and without affecting the process flow.

[0129] The EDCL 1802 forms the basis of BOSS processing. Usingcombinations of EDCLs 1802, any process what so ever, using any kind andnumber of parameters, can be accurately recorded and executed. Using thegeneric EDCL 1802 enables all BOSS clients to dynamically create andmodify any kind of EDCL group, and then have it executed and re-executedby the EDP. As should be obvious, the EDCL 1802 provides a simple andpowerful way of implementing, maintaining and executing geneticalgorithms. Many of the EDP initialization, and default informationprocesses, are expressed and stored as an ordered list of EDCLs 1802.Any ordered list of EDCLs 1802 is referred to as an Endo-Dynamic CommandSet (EDCS) 1804.

ENDO-DYNAMIC INFORMATION STATEMENT (EDIS)

[0130] An Endo-Dynamic Information Statement (EDIS) is two or more EDINswhich make a statement of fact about some subject. The basic EDIS 1902is shown in FIG. 19. In this figure, several attributes are bonded(possibly via different bonds) to the same subject “A”. When order andhierarchy are required for the information, an EDIN attribute UEI (shownas “B”) occurs as the subject of other EDINs, whose attributes furtherdescribe the UEI (i.e., “B”) originally occurring as an attribute of asubject.

[0131] This is an important aspect of BOSS methodology. Theinterchangability of the subject and attribute UEIs means that any depthand breadth of information hierarchy can be achieved. Further, upward orbackward links can be introduced into the information hierarchy, suchthat a workable information network/graph is achieved.

[0132] The EDIS 1902 is dynamic in nature, so that the expressed passivesequence is a dynamically established one. Since EDINs can be freelyinserted into an EDS, and the EDS reordered, any information representedas a passive sequence remains dynamic. In the example shown in FIG. 19,the EDIN sequence fields are not used. However, many passive sequencesrequire this field to establish order among the EDINS. Any passivesequence of EDINs is called an Endo-Dynamic Statement Set (EDSS) 1904.

DATA AND IMAGES

[0133] So far, all information has been referred to in terms of UEIs.While the UEI does provide all required information about an entity to aprocess, it means little to an end-user. For example, while a programcan process and maintain an EDS identified by the UEI value “112:10”, itwould be pointless for that program to display those numbers to anend-user. Clearly, names and/or images must be associated with eachunique entity, so that a program can use them in its display interface.Hereafter, “image” refers to both a binary image and a name-string.

[0134] Aside from an image, an entity (as represented by an EDIN), mayalso have associated physical data. For example, a BOSS-applied databaseprogram would use EDINs to record logical relationships and groupings,but it could not directly use EDINs to store the different data valuesbeing maintained by the database.

[0135] Both images and physical data are examples of Variable LengthData (VLD). To maintain and store VLD in general, a format called“Expandable Table Set” is used.

[0136] As shown in FIG. 20, an Expandable Table Set (ETS) 2002 is a fileor memory pair, consisting of an Expandable Table Array (ETA) 2004 andan Expandable Table Composite (ETC) 2006. The ETA 2004 and ETC 2006 mustexist together or not at all. The ETA 2004 is a sorted list, where eachelement is an Expandable Table Record (ETR) 2008. Each ETR 2008identifies information about (and the location of) an Expandable TableBlock (ETB) 2010 within an ETC 2006. As shown in FIG. 21, the ETR 2008is a record containing a UEI key, a flags field, an ETB size, an ETBchecksum and an ETB file address. The ETRs 2008 in the ETA 2004 aresorted based on the UEI key. The ETC 2006 is simply a binary datasetcomposed of a number of variable-length ETBs 2010, in any order.

[0137] To find an associated piece of VLD, a binary search is performedof the ETA 2004 for the input UEI. The UEI comparison is binary, so ifany field of a subsequent input UEI is different, a different associatedVLD occurrence exists. Since the ETA 2004 is ordered by UEI value, oneETS 2002 can be used to store all VLDs of all data. Where two or moreVLDs are required for a single UEI, separate ETS's 2002 must be used.

[0138] As shown in FIG. 20, each ETA 2004 contains an Expandable TableArray Header (ETAH) 2012 at the top, followed by the actual ETA 2004(list of ETRs 2008). As shown in FIG. 22, an ETAH 2012 contains: a flagsfield, a self-ETS UEI, an ETA size (number of ETR's) an ETA CHECKSUMfield to enable verification of the ETA file upon loading an ETC size,an ETC CHECKSUM field to enable verification of the ETC file uponloading, an ETA memory address, an ETC memory address, an ETC buffersize, a current starting ETR identifier, and a current last ETRidentifier.

[0139] Through usage, VLDs will come and go in a system. That is, whenentities are deleted, their associated VLDs are also deleted. This wouldleave holes of unused space between the used ETBs 2010 of an ETC 2006.Fortunately, the process to optimize an ETS 2002 is trivial. First, atemporary ETC 2006 buffer is allocated. Then, starting from the firstETR 2008, and by keeping a current pointer, all valid ETBs 2018 arecopied, back-to-back, into the temporary ETC 2006. To finish, the ETC2010 is overwritten with the temporary ETC 2006 buffer and the temporaryETC 2010 buffer is de-allocated.

[0140] If memory is scarce, the optimization can be performed using abuffer as large as the largest ETB 2010. In such cases, ETBs 2010 wouldbe swapped (using unused holes) until they are in a back-to-back order.Unlike the first scheme, using a single ETB 2010 buffer, the ETBs 2010in the resultant ETC 2006 may not be ordered in the same order as theETRs 2008.

[0141] Since a BOSS element can have an image and have associatedphysical data, two ETS's 2002 are used for each element. FIG. 20 alsoshows the minimum set 2014 of ETS's 2002 required at any level to enableBOSS VLD maintenance.

INFOFRAME

[0142]FIG. 14 illustrates the components 1402 of the Information Frame(InfoFrame), which represents the highest level of logical and physicaldata organization in BOSS. The InfoFrame is a definition of thecollection and usage of all InfoBases found at a site, and other sitesthat may be connected to the home site.

[0143]FIG. 23 illustrates the components of an InfoFrame Control Record(IFCR), which is contained in the InfoFrame to describe the defaultInfoBase processing, if any, for a site. The IFCR contains a Local NameUEI field to provide a local name for the InfoFrame known to the currentsite that is used as key into the IMAGE-ETS for the InfoFrame (at thissite). A Flags field is used to record InfoFrame processingconfigurations. An SOI field recorded from the serial number of theinstalled EDP is used to create all UEIs generated at the current site.A Next SEI field is used to provide the next available SEI value acrossthe current site, and this value is incremented, once read, by the EDPprocesses which create UEIs. A Modifiers field is used to provideoperational thresholds and guidelines for the InfoFrame, wherein thesemodifiers are: OLDEST VALID EDS, START TIME, EDS MODIFY OCCURRENCES,STOP TIME, and EDS MODIFY FREQUENCY.

[0144] To absolutely determine when EDS's require regeneration, it wouldbe required to examine each EDIN in each EDS, to determine all possibleEDS's which that EDS is dependant upon (in some way). Clearly, this is atime consuming and an infeasible methodology to adopt. Instead, theOLDEST VALID EDS is used. This is a time scalar, indicating how old avalid EDS can be. If this is a low number, EDS's are quickly deemedinvalid and in need of regeneration. If a high number, generated EDS'sare deemed valid for long periods of time.

[0145] While the EDP can record occurrences when distinct changes aremade to individual EDS's or SDEs, this fact is not enough to estimatewhen an EDS requires regeneration. For this reason, the OLDEST VALID EDSvalue is used.

[0146] While this number can be assigned, an End-Dynamic Operator,“DETERMINE-OLDEST-VALID”, can be used at any time to automaticallydetermine a value for this number. The START TIME, and the threemodifiers EDS MODIFY OCCURRENCES, STOP TIME, and EDS MODIFY FREQUENCY,are used by the DETERMINE-OLDEST-VALID operator. When first initiated,this EDO records the START TIME, sets the EDS MODIFY OCCURRENCES tozero, and enables the RECORD MODIFY flag in the IFCR flags. This flagindicates that each subsequent EDS modification requires an increment ofthe EDS MODIFY OCCURRENCES modifier. Finally, this EDO prompts for atime duration, and records a STOP TIME. At the appointed stop time, theEDS MODIFY FREQUENCY is calculated based on the otherassigned/accumulated modifiers. This frequency is then used to determinean estimated OLDEST VALID EDS value.

[0147] The InfoFrame also contains a Default InfoBase List (DIL), whoseelements are EDINs and which comprises an EDCS. FIG. 24 shows an exampleDIL 2402 with three EDCLs. First, for each parameter required for anInfoBase activation, an EDIN occurs. No parameter EDINs are present ifthe InfoBase requires no parameters. After the parameter EDINs, the lastEDIN associated with the InfoBase occurs, where the “activate InfoBase”EDO performs all tasks associated with locating and activating aparticular InfoBase.

[0148] A Default Module List (DML) is used in the InfoFrame, whoseelements are EDINs. The DML is an EDCS, exactly as the DIL 2402, exceptthat the EDIN subjects are all a UEI generated for the InfoFrame DML.The InfoFrame-DML is used and loaded before the DIL 2402, and InfoBaseDMLs. This enables the EDP to load native modules which may have a handin loading and activating InfoBases.

[0149] The InfoFrame also contains an InfoBase definition List (IBDL),where each element is an IBDR. The IBDL is frequently updated to ensureany newly added InfoBases are included. The InfoFrame contains Data andImage ETS's to record such data associated directly with the InfoFrame.The InfoFrame contains an Operator Information Table (OIT), to identifyand describe all Endo-Dynamic Operators. The InfoFrame contains one ormore EDO program files, each containing the executable code for one ormore operators. The InfoFrame contains a Parameter ETS, to describe allparameters for all EDOs. The InfoFrame contains a Bond Information Tableto describe all bonds. The InfoFrame contains a Default Command List(DCL), to provide a “default dynamic program” which EDP always (andpossibly continuously) executes.

INFOBASE

[0150]FIG. 14 illustrates the structure of an Information Base(InfoBase), which is a conglomeration of one or more informationmodules. An InfoBase Definition Record (IBDR) is used to provide imageand processing options for the InfoBase. An IBDR file exists for eachInfoBase for import/export purposes. All regularly used IBDRs are storedon an InfoFrame basis.

[0151] As shown in FIG. 25, the IBDR is composed of: a FLAGS field toprovide processing switches, a self-UEI field to uniquely identify theInfoBase, and an image-UEI field to provide a key into the InfoBaseassigning an image for the InfoBase. The Flags field is identical to theone in the IPCR.

[0152] A Module Definition List (MDL) is used to provide a list ofincluded modules in the InfoBase. Each element of the MDL is an MDR asdescribed under module section.

[0153] A Default Module List (DML) is used for the InfoBase structuredexactly as the DML stored at the InfoFrame level.

[0154] The following modules identified by the InfoBase DML are loadedand activated upon InfoBase activation. The Data and Image ETS's areused to record such data associated directly with the InfoBase.

[0155] Modules can be included in an InfoBases in two ways: shared, andexclusive. A shared module physically occurs once across all InfoBasesin the current InfoFrame, but may be included in all InfoBases. In aBOSS-applied environment where concurrent processing is possible, theusual precautions and preprocessing must be applied before access isgranted. An exclusive module is what all modules are by default, onethat is exclusive to a particular InfoBase. An exclusive module onlyappears in the InfoBase it is exclusive to. While other InfoBases canaccess an exclusive module, any such access is regulated by the ownerInfoBase.

[0156] An InfoBase can store a large amount of data and processing. Ingeneral, an InfoBase will have one or more modules containing data inone or more data organizations, and one or more modules containingprograms which process that data. The modules containing programs whichprocess that data are optional, in that the programs that process theBOSS data need not be written as BOSS programs; they could be any binaryprogram.

MODULES

[0157]FIG. 14 illustrates the structure of an Information Module (IM),which is a collection of EDINs and ETS's to record the associated imagesand physical data. The minimum set of required ETS's is used asdescribed in the previous section. These ETS's store all images and datafor the module as well as for all EDINs in the CNL. When saved EDS's arepresent, images associated with saved EDS's are also stored in theseETS's.

[0158] A Collective Node List (CNL) stores all EDINs, in arbitraryorder, which together make up all the EDS's which can be generated fromthat module. The CNL is always loaded upon module activation. Most EDSgeneration operators require the specification of one or more modules touse as a source of generation; in such cases, all associated CNLs mustbe loaded (in turn) and used as a source for generation.

[0159] A Set Definition List (SDL) maintains a list of “saved EDS's”.Each element in the SDL is a Set Definition Record (SDR). As shown inFIG. 26, each SDR contains a self-identifier UEI field identifying theEDS, a GENERATION-PROCESS UEI field, a Flags field, a LAST-GENERATIONfield, an EDS size field, and a memory address. The LAST-GENERATION andmemory address fields are only used at runtime, after the EDP has loadeda particular module, and provide the current location and size of an EDSin memory. The GENERATION-PROCESS UEI identifies a process which willgenerate the EDS; this can be either an SDE, or another process. TheLAST-GENERATION field is also only used at runtime; it is a date andtime stamp of the last generation. This field provides a measure of howvalid or up to date the EDINs pointed to by EDS address fields are. Thisfield is compared to (current time—oldest valid eds), and if older, theassociated EDS is deemed to be invalid and in need of regeneration. TheSDR flags field is used to record which EDS's are temporary and whichare not. Further, it identifies whether the EDS generation process is anSDE, or other process. All newly generated EDS's are by defaulttemporary. Using EDOs, a newly generated EDS can be made permanent, or ageneration process can be made to result in a permanent EDS.

[0160] When an EDS is saved to a module, only unique EDINs are added, orold EDINs updated in the CNL; EDINs are never duplicated in the CNL.Next, the EDINs which make up the equation (SDE), used to generate theEDS, are also added to/updated in the CNL. Finally, the UEI for the SDEis added to/updated in the SDL. Now, upon subsequent module loading, aclient can first re-generate the SDE, then execute the SDE to regeneratea (new version of a) previously saved EDS.

[0161] When a new EDS is dynamically generated, a new unique UEI isassigned to it, and a new SDR created in the SDL. The self-identifierfield of the new SDR is assigned from the newly created UEI value. AllSDR flags are cleared, the last generation date is set, and the EDS sizeand address fields assigned from the newly generated EDS buffer. The SDEis set from the LAST-SDE global variable; this variable is cleared ineach EDP cycle, and is set by the last line of any SDE. As a result, itcan be used by the EDP processes to determine the associated SDE (orNULL for none).

[0162] As shown in FIG. 27, the Module Definition Record (MDR) providesa UEI for the module image (stored in the module ETS's), as well asdefault processing flags for a module. These are the same flags as forthe IFCR and IBDR. The MDR for a module is always stored in a separatefile; this file is only used when importing or exporting modules. TheMDR in this file (along with all other modules used by an InfoBase) areduplicated in the Module Definition List as defined for an InfoBase. So,in reality, the MDL contains the latest version of all MDRs, and whenimport/export is required, the MDR file is generated and used. This isdone to avoid potentially long update periods every time a module ismodified in some way, and poses no problems because the MDR file is notused in regular processing; only for import/export.

[0163] A Default EDS List (DEL) is used, where each element is a UEIidentifying an EDS to generate (i.e., identifying an SDE/process toexecute). All default EDS's are generated upon module loading.

[0164] The IM is a self-contained package of information, providingvalues, images, data organization(s), data association(s), and dataprocessing. The IM is always constructed to serve the needs of a clientBOSS process. Since an EDS can always be dynamically generated from aCNL, it is possible to place incongruent or inconsistent information inthe same module; although this is not recommended, it poses no problemsto the BOSS environment, and values, organizations, and associationsremain unaffected. Some module examples follow:

[0165] A BOSS program, where procedures, data-structure definitions, anddata occurrences are recorded, and later generated as, EDS's, which areprocessed by either the EDP or a client BOSS program interpreter to runa program.

[0166] A BOSS menu system, where menus are recorded, and later generatedas, EDS's, which are processed by the BOSS menuing client.

[0167] In general it is best to group information common to the samecompound information entity in the same module. While out of contextEDINs in a module do not create problems by themselves, out of contextSDEs and EDINs would create potentially fatal processing problems. Forexample, consider an out-of-context SDE which generates an EDS for adata structure definition by default, for a module whose purpose ismenuing. This would more than likely hang the menuing client. For thesereasons, a BOSS client can construct SDEs which “filter” all input EDINsfor consistency. Such SDEs can check for particular types and allows anddisallow the input. So if the module is a menuing system, data typeslike “procedure” could be optionally disallowed.

SET DEFINITION EQUATION (SDE)

[0168] As mentioned above, EDS's are based on Set Definition Equations(SDEs). An SDE is an expression composed of Endo-Dynamic Operators(EDOs) and operands. An Endo-Dynamic Operator (EDO) can be almost anykind of operator. FIG. 28 shows an example SDE 2802 with a C-likeformat. A new EDS called MY-EDS will be the result of resolving theright hand side of the equation. The atomic binary SDE units are shownand numbered 1, 2, and 3 from the deepest to the outermost SDE unit. TheSUB, SEQ, and ATT mnemonics are EDOs that perform filtering based ondifferent fields of the EDIN. The INTERSECT mnemonic is a logical EDOand signifies that the resultant sets of both operand expressions mustbe intersected. The expression shown in FIG. 28 dictates that all EDIN'sin the “MY-EDS” EDS will have a Subject equal to “W:X:” and an Attributeequal to “A:B:”. The “MODULE-N” module is the module used here for alloperators, except INTERSECT.

[0169] The SDEs are always binary in nature. No matter how complex theequation, it can always be broken down into binary (and unary)SDE-units. As a result, an SDE is easily implemented as an EDS.

[0170]FIG. 29 shows an EDS 2902 for the SDE depicted in FIG. 28. Thisshows the Subject and Attribute fields of the EDIN as UEIs. This EDS2902 also shows the Bond and sequence field values. As can be seen inFIG. 29, the SDE is simply an EDCS. In this case, these EDCLs are shown,i.e., one for each EDO showing in FIG. 28.

[0171] In this way, an EDS 2902 can be used to store equations (SDEs)which define how other EDS's are dynamically generated. The subjectfields of all EDINs will always contain a unique SDE-UEI associatedsolely with MY EDS. The SDE by itself does not result in anything. Butwhen the SDE is applied to an existing EDS or module, a new EDS can begenerated. As a result, a single module, with multiple SDEs, can providedifferent dynamically generated EDS's.

ENDO-DYNAMIC OPERATOR (EDO)

[0172] As mentioned above, Endo-Dynamic Operators (EDOs) are to theEndo-Dynamic Processor (EDP) as instructions are to a processor. An EDOis any executable body of code requiring any number and type ofparameters. While the code for most EDOs is in the form of a binaryexecutable OS program (or procedure), EDOs expressed as EDCS's can alsobe created and used. As should be obvious, an EDO occurrence with allits required parameters forms a complete EDCL. So it is possible toconstruct an EDO and EDCL, such that the EDCL activates the EDO (via theEDP), wherein the EDO is itself an EDCS processed by the EDP. Thisforces the EDP to be re-entrant, where the EDP must be capable ofcorrectly processing any number of EDCS's in as many streams ofprocessing as initiated by various processes.

[0173] Unlike conventional “instructions”, the EDO is not limited insize or complexity. The EDO can be anything from a one line procedure toa whole system (program). Further, EDOs can freely call each otherwithout interfering with EDP process leveling or the EDP stack.

[0174] Incorrect process streams which are potentially fatal areterminated, mostly before and sometimes after a fatal process error hasoccurred. All stack data regarding the process(es) which were involvedin a process stream resulting in the fatal error(s), can be safely andaccurately removed from the EDP stack, such that pursuant EDPprocessing, and other existing processes can continue.

[0175] For each EDO available for use, there exists an OperatorInformation Record (OIR). As shown in FIG. 30, each OIR contains: anOPERATOR UEI field to provide a key in the OIT, a NUMBER OF PARAMETERSfield to give the total number of input and output parameters requiredby the operator (the number of PDRs in the associated list), anEndo-Dynamic-Library UEI to identify the library that contains theexecutable code of the EDO, and a CALLING ADDRESS field to provide amemory address for the operator that is only valid at runtime after theoperator's executable code has been loaded into memory. The OIRs areused at run time to verify calls to, and execute operators. As shown inFIG. 14, all OIRs are permanently maintained in the Operator InformationTable (OIT), maintained at the InfoFrame level. The OIT is a sortedlist, wherein a binary search locates a given OIR. The OIT is updatedwhen EDOs are imported or modified.

[0176] To record parameter data requirements for EDOs, the PARAMETER-ETSis used. As shown in FIG. 14, this ETS is stored at the InfoFrame level.The ETRs in this ETS have EDO UEIs as the keys. The ETBs store orderedlists of records, where each record is a Parameter Definition Record(PDR). As shown in FIG. 31, a PDR contains: a Flags field to identifygeneral I/O type of the parameter, a Data Type field to identify therequired data type to internal BOSS processes, a Data Size field to givethe size of the identified data type, a Type Image UEI field thatidentifies an image for the data type stored in the InfoFrame IMAGE-ETSand a Default Value UEI field that points to a default value occurrencefor the parameter in the InfoFrame DATA-ETS (if no default value issupplied, this field contains a null UEI). Both the OIT and theParameter ETS are used at run by the EDP to perform verified dynamicentry and execution of EDCLs.

EDO-INFOBASE

[0177] An Endo-Dynamic Library (EDL) is an Information Module whichprovides a means for transporting and storing all information regardinga given set of EDOs. All EDOs in an EDL should be related in somegeneral way; this is often (part of) the name for the library. Note thathereafter and throughout the document and figures, “Library” is usedinterchangeably with “EDL”.

[0178] A strictly logical entity called Endo-Dynamic Group (EDG) is usedto organize all EDLs in various ways. Note that hereafter and throughoutthe document and figures, “Group” is used interchangeably with “EDG”.

[0179] All EDLs are collected by the Endo-Dynamic Operator InfoBase(EDO-InfoBase). The EDO-InfoBase is an InfoBase like any other, but alsoencompassing any additional program files required by the EDLs. TheEDO-InfoBase provides a way of accessing all available libraries andlibrary information. Further, using the InfoBase DML, a certain base setof libraries are always activated (i.e., loaded and ready to beprocessed via EDP). The EDO-InfoBase is supplied with each EDPprogram/package, and is necessary for the operation of the EDP.

[0180] While the OIT and the parameter ETS provide for quick EDPprocessing at the top level, the bulk of the required data for the EDOprocessing is provided by the EDO-InfoBase. The module components asshown in FIG. 14 are used as follows for a library. A library module isno different than any other module, except that in some cases additionalprogram files are also associated with the module.

[0181] The Module Definition Records (MDR) comprises normal moduleinformation, wherein the System flag is enabled.

[0182] The Collective Node List (CNL) stores EDINs in no particularorder. As well as normal SDE recording and processing, these EDINs areused in two ways.

[0183] First, these EDINs are used to organize and specify EDOs in thelibrary, the fields need to be set a certain way. The Subject fieldshould contain a UEI for an EDL, or a UEI for an EDLG. The Attributefield should contain a UEI for an EDO. The Bond field should contain an“EDO Occurrence,” which indicates that there is an occurrence of the EDOgiven by the attribute in the library given by the subject. Finally, theSequence field is not used.

[0184] In addition, these EDINs are used to record EDOs programmed asEDCLs, all fields are set as per an EDCL. All EDINs in this CNL can besorted by the two keys, i.e., subject and attribute, to provide anoverall hierarchy of the operator groups and libraries. In addition, theCNL can be filtered for a particular subject (library or group) togenerate EDS's which can be used as menus, which are then traversed,generated a new menu EDS at each traversal step. When an EDIN in librarymenu EDS is selected, any number of further information is available forthe EDO identified by the EDIN's attribute (e.g., PDRs, image, code,etc.). The client process can then perform further processing using theEDO information.

[0185] The Image-ETS stores all images associated with all EDOs (andtheir parameters) in the library, as well as the image(s) for thelibrary itself.

[0186] The Data-ETS uses a UEI key. Associated with the library (i.e.,using the module UEI), is an ETB containing a list of OIRs. Thisprovides a list of all EDOs in the library. Associated with each EDO(i.e., using the EDO UEI), is an ETB containing a list of PDRs,describing the parameters of the EDO.

[0187] The SDL identifies SDEs (stored in the CNL) to generate an EDS.For SDE-1, EDINs are sorted by the two keys: by subject and attribute toprovide an overall hierarchy of operator groups and libraries.

[0188] For SDE-2, EDINs are filtered for a particular subject (libraryor group) to generate EDS's which can be used as menus, which are thentraversed, generating a new menu EDS at each traversal step. When anEDIN in library menu EDS is selected, any number of further informationis available for the EDO identified by the EDIN's attribute (e.g. PDRs,image, code, etc). The client process can then perform furtherprocessing using the EDO information.

[0189] For SDE-3, EDINs are filtered for a particular EDO subject, andsorted by the sequence. This SDE generates an EDCS executable by theEDP.

[0190] For DEL, this has one default EDS: EDS for the top-level group.This is the same as SDE-2 above, where the source subject is predefined.

[0191] If the code associated with an EDO is an EDCS, all EDINs requiredto make up the EDO's code body are also stored in the CNL. If the codeassociated with an EDO is not an EDCS (i.e., if the EDO code is someform of OS executable code body), in addition to all normal modulefiles, an OS program file is also stored. This program file has afilename derived from the associated EDO UEI values, plus the normal OSexecutable extension. All such executable EDO program files are storedat the InfoFrame level.

[0192] When any library information is loaded, imported, or modified,appropriate updates are made at the InfoFrame level. After any suchevents, the OIT, parameter ETS, and any EDO program files are updated asrequired, using the just saved library data. While updating the systemEDO information is a simple procedure of replacing records and files,the effects of such updates on user data containing references to theupdated operators could potentially be a difficult to determine anddiagnose.

LIBRARIES AND OPERATORS

[0193] The EDP requires a minimum basic set of libraries to operate.These are:

[0194] Set Filtration Library

[0195] Control Flow Library

[0196] Physical Manipulation Library

[0197] The general membership requirement(s) and a minimum set of EDOsare described for each library by the following sections. In addition toany listed EDOs, any other qualifying EDO can be added to a library.However, all such dynamically created EDOs are always tagged as “user”in the associated OIR.

[0198] When EDOs are also made into bonds (a matter of creating bondcontrol records, since the process already exists as the EDO), a viablebut limited language is realized for defining and executing BOSSprograms embodied by information modules, complete with data definitionsas realized by EDS's (each is an EDS in the module) and executable codeas realized by EDCS's (each is an EDS in the module). The more evolvedand/or complex EDOs that are introduced, the more robust such a languagewill become, but it will do so non-linearly. This is because anyintroduced EDO can call others in any (meaningful) combination that itsees fit. Each added EDO increases the number of new possibilitiescombinatorially.

[0199] Further, given sufficient numbers of added EDOs, any number ofsuch dynamic programming languages are simultaneously possible, wherelanguages can interface invisibly to any of the involved specificlanguage processes. Any and all such languages are simply animplementation of several BOSS concepts and the specific usage ofseveral BOSS entities disclosed in this patent.

SET FILTRATION LIBRARY

[0200] An EDO in this library must process EDIN list(s), based on anykind of input, to produce subsets of that EDIN list, or new EDIN list(s). The minimum required set of filter EDOs are described below. TheEDOs listed below constitute the minimum required set of EDOs in thefiltration library:

[0201] Union

[0202] This EDO combines two or more input EDS's into a third outputEDS.

[0203] Intersection

[0204] This EDO examines two or more input EDS's for common EDINs andoutputs a third EDS containing only the common EDINs.

[0205] Subject-Match

[0206] This EDO searches the input EDS for EDINs having a match in theirsubject field with an input subject and returns those EDINs in a newEDS.

[0207] Attribute-Match

[0208] This EDO searches the input EDS for EDINs having a match in theirattribute field with an input attribute and returns those EDINs in a newEDS.

[0209] Bond-Match

[0210] This EDO searches the input EDS for EDINs having a match in theirbond field with an input bond and returns those EDINs in a new EDS.

[0211] Sequence-Match

[0212] This EDO searches the input EDS for EDINs having a match in theirsequence field with an input sequence and returns those EDINs in a newEDS.

[0213] Generate-Subject-Sequence

[0214] This EDO sorts the EDINs in the input EDS by their subject fieldand then assigns sequence numbers to those EDINs based on their sortedorder.

[0215] Remove-Nodes

[0216] This EDO searches for and then deletes the input EDIN from theinput EDS.

[0217] Descendants

[0218] This EDO searches for any EDINs in the input EDS that are thedescendant of the input EDIN.

[0219] Ancestors

[0220] This EDO searches for any EDINs in the input EDS that are theancestor of the input EDIN.

[0221] Siblings

[0222] This EDO searches for any EDINs in the input EDS that are thesiblings of the input EDIN.

[0223] All of the above EDOs provide the basis for constructing SDEs toformulate and process anything from a simple database query, to datastructure collection and processing, to evolved, multi-level querieswhere specific information is qualified to any degree and extent. Eachspecific application requiring filtration would introduce SDEs which usethe above listed system-EDOs in various combinations with other EDOs toaccomplish further specific filtrations. Any one such client procedureor program (in a client program module) can be made into a user-EDO, andincorporated into the currently known InfoFrame. Clients would createall EDOs associated with a general purpose in the same EDO-library, andadd the library to the EDO-InfoBase. This makes the client supplied EDOaccessible by all BOSS clients in the InfoFrame.

[0224] In this way, flexible, dynamic, and custom-made informationsearch engines can be built and supplied as EDOs. Such EDOs would bethen used by even bigger BOSS clients such as an expert system, tounify, simplify and speed up minor information gathering and simplecorrelation tasks.

CONTROL FLOW LIBRARY

[0225] An EDO in this library must be associated with process flow ofthe EDP, or that of a BOSS client. The following lists and describes theminimum required EDOs for this library. Although more complex controlflow EDOs are possible, such EDOs would simply be “implementations” ofthe technology disclosed by this patent.

[0226] Push

[0227] This EDO pushes the parameters onto the EDP stack.

[0228] Pop

[0229] This EDO pops a value from the stack into the parameters.

[0230] Peek

[0231] This EDO uses a stack index number to determine a stack entryfrom the top, and return the value stored therein into the givenparameters.

[0232] Poke

[0233] This EDO uses a stack index number to determine a stack entryfrom the top. Then the parameters are stored into the stack entry.

[0234] Stack-Not-Empty

[0235] This EDO returns a true or false value dependent on the conditionof the stack.

[0236] Stack-Full

[0237] This EDO compares total stack space against currently used spaceand returns true or false value dependent on the condition of the stack.

[0238] Execute (prog-UEI)

[0239] This EDO locates, loads, and executes the binary OS programidentified by the input UEI. This EDO waits for the program to terminatebefore returning.

[0240] Spawn (prog-UEI)

[0241] This EDO locates, loads, and spawns the binary OS programidentified by the input UEI, as a concurrent process. This EDO does notwait for the program to terminate before returning.

[0242] Call (prog-UEI)

[0243] This EDO locates, loads, and executes/spawns the BOSS programidentified by the input UEI. This EDO may or may not wait for theprogram to terminate before returning, depending on availability ofconcurrent processing in the environment.

[0244] Jump (CES, NP)

[0245] This EDO sets the global variables associated with input to theinput values, thereby performing an unconditional jump to another EDCL.

[0246] Jcond (cond-UEI, CES, NP)

[0247] This EDO performs a jump as per the jump EDO, but based on acondition. The condition is a BOSS process (sets of ordered EDCLs),which returns true or false. In most cases, the condition can beautomatically generated as a SDE.

PHYSICAL MANIPULATION LIBRARY

[0248] An EDO in this library must manipulate EDS's and EDINs at aphysical Level, where a possible input parameter for a physical EDO is aphysical memory address. Some of these physical EDOs are:

[0249] Sort

[0250] This EDO sorts the EDINs in the input EDS.

[0251] Remove-Duplicates

[0252] This EDO removes duplicate EDINs in the input EDS.

[0253] Length

[0254] This EDO determines the length of the input EDS.

[0255] Generate-Eds

[0256] This EDO generates an EDS for the input EDINs.

[0257] Activate-Module

[0258] This EDO activates the module created by the EDINs in the inputEDS.

[0259] Activate-InfoBase

[0260] This EDO activates the InfoBase created by the EDINs in the inputEDS.

[0261] The other physical EDOs are listed and described below. Mostlythese EDOs are combinations of calls to other EDOs already described.

[0262] Load (WHAT)

[0263] This EDO loads the input file into an allocated memory buffer,performing checksums, and returning the address of the allocated buffer.

[0264] Purge-Data (WHERE, DAYS)

[0265] This EDO will irretrievably purge previously deleted BOSS data bydeleting entries in trash files. The input parameter WHERE is a UEI. Ifthe value is null, the purge will occur for all deleted data in theInfoFrame. If a non-null value, the UEI either identifies an InfoBase(find an IBDR matching the UEI) or a module (find an MDR matching theUEI). In these cases, all deleted data in the located InfoBase or modulewill be purged. The DAYS parameter is optional and specifies the numberof days to keep deleted information.

[0266] Restore-data (WHERE, DATA-UEI, DATE, DATE-DIRECTION, AUTO)

[0267] This EDO will retrieve previously deleted, but not purged,information. The input parameter WHERE is a UEI. If the value is null,the restore will consider all deleted data in the InfoFrame. If anon-null value, the UEI either identifies an InfoBase (find an IBDRmatching the UEI) or a module (find an MDR matching the UEI). TheDATA-UEI identifies the deleted data to be restored. If this value isnull, all deleted data in the identified location is considered forrestoration. If the DATE parameter is non-null, it is used together withthe DIRECTION parameter to restore occurrences of qualifying informationdeleted on, before, or after a specific date. If the AUTO parameter isnon-null, this EDO will make a best guess for all informationrestorations when duplicate deleted data is encountered. Otherwise, thisEDO will prompt an operator with a choice of duplicate deletedinformation with different dates. The best guess is arrived at bygrouping deleted data by date stamp, then restoring the set of data withthe most recent date.

[0268] Get-Image (UEI)

[0269] This EDO retrieves and returns the image (or name) associatedwith input UEI, from an IMAGE-ETS. The search starts from current moduleIMAGE-ETS and expands to parent InfoBase and InfoFrame if not found atthe module level.

[0270] Set-Image (UEI, IMAGE)

[0271] This EDO retrieves and returns the image (or name) associatedwith input UEI, from an IMAGE-ETS. The IMAGE-ETS is located in the samemanner as get-image EDO. When located, the associated ETB image contentsare replaced with the input IMAGE.

[0272] Create-node (MOD-UEI, SUBJ, ATTR, BOND, SEQ)

[0273] This EDO creates a new node in the input module's CNL, using thegiven input parameters to set the node's fields. The sequence field canbe supplied as “null” when not required. This is how information isadded to BOSS at it's most primitive level. This process can betriggered from any environment, so long as the UEIs provided are valid,or will have meaning.

[0274] Delete-Node (MOD-UEI, NODE)

[0275] This EDO moves all EDINs in the CNL associated with input module,which are binary-equal to the input EDIN, NODE, to an associated trashCNL.

[0276] Create-Eds (MOD-UEI, POINTER, COUNT)

[0277] This EDO receives a memory address, POINTER, to start of a listof EDINs in (some) memory. This is NOT an active EDS at this time. Alsoreceives a COUNT to indicate the number of EDINs in the list. Thisoperator creates a new active EDS (not stored) containing the list ofEDINS, and returns a newly assigned UEI value. This operator is usefulfor processes that either automatically or via user input, create EDINsfrom scratch. The new EDS is always added to the CNL associated with anexisting module identified by input MOD-UEI.

[0278] Add-Eds (MOD-UEI, POINTER, COUNT)

[0279] This EDO receives a MOD-UEI to identify a CNL to add nodes to, aswell as a memory address, POINTER, to start of a list of EDINs, and aCOUNT of those EDINS. The given EDINs are then added to the identifiedCNL. This operator will not add binary equal EDINs which already existin the CNL.

[0280] Copy-Eds (MOD-UEI, EDS-UEI)

[0281] This EDO makes a new EDS with the same contents as the EDS givenby input EDS-UEI and returns a unique UEI to the new EDS. The new EDS iscreated in the module identified by the input MOD-UEI (this must exist)The EDS image remains the same.

[0282] Delete-Eds (MOD-UEI, EDS-UEI)

[0283] This EDO first generates the input EDS-UEI via generate-eds EDO,if required. Next, it calls the intersect EDO and the assigns the CNL ofthe input module to be the resultant “xor-eds” (i.e., the EDS containingEDINs in the CNL but not in the generated EDS). The generated EDS isthen added to the associated trash CNL. Finally, the associated SDL andDEL entries matching EDS-UEI are moved to the associated trash files, ifthey exist.

[0284] Save-Eds (MOD-UEI, EDS-UEI)

[0285] This EDO is probably the most time and space consumptive EDO. Itassumes that an EDS (EDS-UEI) was previously generated using thegenerate-eds EDO and then the EDINs in the memory image were modified bysome client process. At this point, the memory image of the EDS needs tobe updated in the module CNL to reflect any changes made by the clientprocess. For example, consider a module containing several procedures ofa program. Each EDS can then be generated from the program module on adynamic basis. Once generated, the procedure can be dynamically modifiedby a programmer. Finally, the procedure is saved again in the program.

[0286] Unlike specifically deleted EDINs and data, replaced EDINs andtheir associated data cannot be recovered, unless steps are taken by anEndo-Dynamic Editor.

[0287] In concurrent environments, where multiple processes can accessthe same the module, it is best to let the currently used Endo-DynamicEditor handle all such issues. Being dynamic, the EDE can be called by aBOSS client process to safely load, edit, and/or save EDS's in modules.

[0288] Create-module (InfoBase-UEI, NAME, FLAGS)

[0289] This EDO creates a new module called NAME in the InfoBase givenby InfoBase-UEI. This EDO first generates a new unique UEI for the newmodule. Then it creates an associated MDR in the InfoBase's MDL, withthe newly generated module UEI. Next, all required module files (asshown in FIG. 14) are created (empty except for control). Now the inputmodule name is inserted in the new module image ETS, by creating anothernew UEI for the image. The image UEI is also stored in the new MDR.Finally, the inputs FLAGS are assigned to the new MDR. The module cannow be used as a source of any physical manipulation to add data, andlater as a source of filtration to generate new EDS's.

[0290] Copy-Module (MOD-UEI, InfoBase-UEI, NAME)

[0291] This EDO first generates a new unique UEI for the new module.Next, all module files for module MOD-UEI are copied to files with thesame extensions and the new UEI for filename. Then, a the MDR forMOD-UEI is copied into the MDL for the input InfoBase (InfoBase-UEI),and its self identifier set to the newly generated module UEI. The newmodule name remains unchanged if the NAME parameter is-null. If NAME isa valid image, it will be copied to the newly copied IMAG-ETC, replacingthe existing value. The image UEI value need not change.

[0292] Delete-Module (InfoBase-UEI, MOD-UEI)

[0293] This EDO first appends the contents of all module files to theirappropriate trash files, and then deletes all module files, as well asassociated control records.

[0294] Create-InfoBase (NAME, FLAGS)

[0295] This EDO creates a new InfoBase called NAME in the currentlyknown InfoFrame. This EDO first generates a new unique UEI for the newInfoBase. Then it creates a new IBDR in the IBDL, with the newlygenerated InfoBase UEI. Next, all required InfoBase files (as shown inFIG. 11) are created (empty except for control). Now the input InfoBasename is inserted in the new InfoBase image ETS, by creating another newUEI for the image. The image UEI is also stored in the new IBDR.Finally, the inputs FLAGS are assigned to the new IBDR. The InfoBase cannow be used as a source of any physical manipulation to add data, andlater as a source of filtration to generate new EDS's.

[0296] Copy-InfoBase (InfoBase-UEI, NAME)

[0297] This EDO first generates a new unique UEI for the new InfoBase.Next, all InfoBase files for InfoBase InfoBase-UEI are copied to fileswith the same extensions and the new UEI for filename; this DOES NOTinclude module files for all modules encompassed by the InfoBase. Then,a the IBDR for InfoBase-UEI is copied in the IBDL, where the selfidentifier is changed to the newly generated InfoBase UEI. Finally thenew InfoBase UEI is returned. If NAME is a valid image, it will becopied to the newly copied InfoBase IMAGE-ETC, replacing the existingvalue. The modules are shared by InfoBases. An InfoBase encompassesmodules by including MDRs for modules in its MDL.

[0298] Delete-InfoBase (InfoBase-UEI, CONTENTS)

[0299] This EDO first appends the contents of all InfoBase files totheir appropriate trash files, and then deletes all InfoBase files.Finally all associated control records at the InfoFrame level aretrashed. If the CONTENTS parameter is non-null, all modules encompassedby the InfoBase are trashed via calls to the delete-module EDO, prior toall above steps.

PHYSICAL STORAGE OF BOSS ENTITIES

[0300] Each of the BOSS entities described above, as well as all thoseshown in FIG. 14, is identified and located by a unique UEI. Theidentification methods have been described in the sections above. The-location method is irrelevant to the BOSS technology, and any methodwill do, which given a UEI, can locate the physical data associated withthat UEI. The following describes one such method of physical datastorage and location.

[0301] Using a conventional containment storage system (e.g. UNIX, DOS,Windows), create an InfoFrame directory in a storage media attached tothe computer. The location of this directory, in the existing directoryhierarchy, is recorded in the EDP program, such that when EDP is runfrom anywhere, it will be able to locate the directory. Further, allfiles shown in FIG. 14 (at all levels) are stored directly in theInfoFrame directory. This flat and simple model is depicted in FIG. 32.Two distinct file-sets are distinguishable at InfoFrame level: systemand information files. System files contain those BOSS data entitieswhich are critical to the correct operation of BOSS processes.Information files are generated as a result of information stored inBOSS format. At the InfoFrame level, there is exactly one of each file3202 shown in FIG. 32. At the InfoBase and module levels, there are manyfiles. In FIG. 32, the number N represents the total number of InfoBasesknown to the InfoFrame, the number M represents the total number ofmodules in all InfoBases, and the number E represents the total numberof available EDO program files. Each InfoBase, module, or EDO filenameis a string derived from the UEI value identifying that InfoBase,module, or EDO; this derived string is shown as “<InfoBase>”,“<module>”, or “<EDO>” in FIG. 32. Since UEIs are guaranteed to beunique, there is no possibility of conflicting filenames in theInfoFrame directory. Now given a UEI for an entity, all filenames forall files associated with that entity can be constructed and immediatelylocated in the InfoFrame directory.

[0302] Looking at FIG. 32, it should be clear that the connecting linkbetween an IBDR and the InfoBase files, and the connecting link betweenan MDR and the module files, is a UEI. For example, the InfoBase UEIidentifier in an IBDR is used to generate the filename string associatedwith all files for that InfoBase.

BOSS INFORMATION DELETION

[0303] When information is deleted in a BOSS environment, it is alwaysvia a physical EDO involved in data deletion/restoration. These EDOsdefine the methods of information deletion in BOSS. The delete-node, anddelete-eds EDOs do remove information such that subsequent generationswill not find the “deleted” information. However, until “deleted” datais automatically or manually purged, it can be restored. Data is purgedvia the purge-data EDO, or as part of automatic BOSS processing (againvia purge-data), where a concurrent process is initially started uponEDP startup. This process would regularly schedule purges, based oninitial user input or default values for to-purge durations. To enablethis, all associated BOSS files (shown in FIG. 14) will have anassociated “trash” file, where a trash file is structured as its realcounterpart, where in addition to a record, a date/time stamp ofdeletion is also stored. For example, while the entries in a real CNLare just EDINs, a trash CNL contains records of the following structure:

[0304] EDIN

[0305] TIME STAMP

[0306] Entries are duplicated in a trash file until purged. To restoreinformation, the restore-data EDO is used. The nature of this EDOenables manual as well as automatic data restoration, where allinformation links and data are also restored as before.

DEFAULT COMMAND LIST

[0307] As shown in FIG. 14, the Default Command List (DCL) is an EDCS.The DCL is executed by the EDP after InfoFrame initialization iscomplete. If no DCL is defined, the EDP goes into an idle state, whereit waits for input EDCLs. The best usage of the DCL is to implement aprocedure containing an infinite loop, where the loop bodyactivates/reactivates any systems, InfoBases, modules, and/or EDS'srequired to realize a continues and changing overall process. The DCL isdynamic, in that any process activated as a result of an EDCL, in theDCL can alter the contents of the DCL and return. This has the effect ofaltering the continuous EDP process in arbitrary ways. The DCL enablesthe EDP to institute dynamic perpetual processing.

[0308] The InfoBase and module activation processes will insert EDCLs inthe DCL, as and when required. As a result, the DCL is automaticallycreated/modified after InfoFrame initialization is complete.

ENDO-DYNAMIC EDITOR (EDE)

[0309] The BOSS environment requires at Endo-Dynamic Editor of sometype. An EDE can use combinations of EDOs to perform the real Boss dataedit. An EDE can also use any kind of graphical user interface (GUI) orother input/output interface. An EDE includes means to dynamicallyinteract with the EDP. An EDE includes means for dealing with editingEDS's, modules, and InfoBases in a an environment where concurrent ormulti- processing is possible. An EDE includes means to maintainprevious versions of modified data, so that data recovery is possiblevia the EDE. An EDE includes means to interact with the restore-data andpurge-data EDOs, such that a seamless “UNDO” can be implemented as acombination of these EDOs and the data recovery means of the EDE itself.An EDE includes means for displaying in “bare mode”, where all EDINs areshown and regular EDS processing is not performed, optionally includingmeans to show regularly generated EDS's in separate windows as required.An EDE includes means for human as well as process interface, so thatboth a human and a process can operate the EDE.

BASIC BOSS CLIENTS

[0310] These are some basic general usages of BOSS that cover severalimportant corner stones of computing. Each model embodies a differentprocess-view of an EDS. In each case, the storage formats and somerequired Bond values are assumed and given. Also in each case, an SDE issupplied if applicable.

[0311] Each general model presented may be used by any number ofdifferent real application programs. The basic boss client-models are:

[0312] Data-Traversal comprises data entry, storage, retrieval, withlogical hierarchy/organization;

[0313] Structure-Definition comprises data structure definition andusage;

[0314] Program-Execution comprises program, procedure, parameter,variable, code, lines, etc., storage and usage (i.e., execution);

[0315] Analyze-Data comprises the function of deriving meaning andoutput any required actions given assumption data, and new input.

[0316] Note that a DB interface is different from a program executioninterface only in how it processes the data. It's just a matter ofperspective, on the same BOSS data (namely EDINs in various lists andorders). Even the analyze-data client can express all of its requiredrules and data as EDINs (and ETS data) . There is a difference betweenthe first three above listed clients, and the last. The- first three arealmost entirely composed of calls to EDOs to accomplish their realprocessing. The only processing in such clients requiring additionalcode (to EDO-calls), is the code required for a particular interfacerequired by the client. All real processing can be accomplished usingEDOs. This means given an operating EDP and its required initial data,these client models can be constructed almost immediately, especially ina GUI environment wherein interface construction is vastly simplified.The last client listed above requires further code (preferably BOSSexecutable procedures) to perform deductive, and possibly heuristicprocessing. Each are of these clients are described in ensuingsubsections.

DATA ENTRY, STORAGE and RETRIEVAL

[0317] Many kinds of applications fall under this client-model. In fact,this encompasses any process which requires data storage, retrieval, andmaintenance, where data exists in some hierarchy/organization, and wheresuch data is then presented to a user in some depiction of the dataorganization. Examples of a Data-Traversal client are:

[0318] a system which maintains hierarchical data in a directory-likeorganization,

[0319] a system which defines and processes data structure definitions,and

[0320] a dynamic menu (or window) definition, traversal, processing andmaintenance system.

[0321] Further, many BOSS clients will need to incorporate aData-Traversal client (as well as other code) to automate the tasks ofdata storage, location, retrieval, and maintenance. Examples of thisare: a system which dynamically processes (interprets) program code, andany kind of database

[0322] The tree 3302 of FIG. 33A is some hierarchy of data, where, A, B,C, and E are logical entities, providing hierarchy for data entitiesidentified by F, G, H, I, and K. This tree 3302 could be a directorytree, or a menu-tree, or any other kind of tree (a tree is hierarchicalby nature). Although not shown, the data organization is not limited totrees, and any kind of graph, or other more compound data organizationscheme can be used. In FIG. 33B, the leaf nodes G, H, I, K of the tree3302 do not appear as Subjects in the EDS 3304. If a process were tofilter for EDINs with Subject fields matching these IDs, the processwould get an empty EDS for all of them. In fact, just such a process canbe used to determine all leaf nodes in a tree-hierarchy.

[0323] Bond can be used to establish EDIN-typing, and subject-attributerelations. For example in a database, the statement: “Car55 is Crimson”can be expressed as a single EDIN, as follows: Source Target BondSequence Car55 Crimson is-the-colour-of N/A

[0324] By using SDEs, which call EDOs, simple and complex data queriescan be constructed that apply to all kinds of data for any kind of BOSSclient. For example, a system which maintains a directory-like dataorganization, would construct SDEs which will locate files anddirectories, while a database constructs SDEs to locate data withdefined criterions and constraints.

DATA STRUCTURE DEFINITION AND USAGE

[0325] When adopting a method for defining data structures, usuallythere are two basic types: primitive (e.g. string, signed 32-bit number,etc), and compound, where a structure's elements are composed ofprimitives and other compounds. As described above, a BOSS definedrecord structure can have any kinds of elements whatsoever. This ismainly because a UEI uniquely identifies an entity anywhere. The othermajor factor is the already discussed interchangeability of the sourceand target fields in the EDIN.

[0326]FIG. 34 shows an example minimal rendition of BOSS oriented datastructure definition. At the top of FIG. 34, two compound records, “A”3402 and “Z” 3404, are shown. Record “A” 3402 contains an element withdata type “Z”. Both compounds contain elements with primitive datatypes. At the bottom half of FIG. 34, the corresponding EDS's 3406 and3408 for each record is shown. The Bond field is used to define a binaryrelation as in any BOSS application. The key is what those Bonds are. Inthis case, Bonds describe elements of data definitions,primitive/compound data types, and size.

[0327] The EDS shown for record “A” 3406 (and record “Z” 3408) wouldonly contain all shown EDINs, if complete structure traversal isperformed. That is, all Attributes of a Subject match are themselvesSubject-matched, until empty sets are reached. At each step, EDINs areaccumulated. Such a traversal process could be set to terminate at anylevel in the data hierarchy. If set to “maximum” or “all levels”, theEDS 3408 shown for record “Z” would be part of the resultant EDS 3406for record “A”.

[0328] In the EDS 3406 shown for record “A”, the Attributes of fourEDINs with a Subject of “A” represent the four elements of record “A”3402. The element-sequence field in these EDINs establishes the order ofelements in the data structure. The rest of the EDINs describe thecharacteristics of each of the elements of record “A” 3402.

[0329] Now consider element “B” in record “A” 3402. This elementgenerates a total of three EDINs: one with a Subject of “A” andAttribute of “B”, and two with a Subject of “B”. The first signifies “B”as an element of “A”; the next two give the data type and size ofelement “B”. The Attribute value shown as “STRING” would be a UEI valuein reality. Aside from the shown Bonds, any number of other Bond valuescould be implemented to provide more detailed descriptions of an element(e.g. associated process, input-coordinates, display-attributes, etc).

[0330] Aside from employing a data-traversal BOSS client, theStructure-Def BOSS client uses SDEs to dynamically construct andgenerate data structure definitions. When an element in a structure iscreated where the type is the bond “call” or “execute”, it is a simplematter to construct an EDCL from all element EDINs of equal subject. TheEDCL can then be executed in the normal manner. Since the EDP is capableof executing EDCLs from anywhere and at any level (limited by stacksize), this enables :BOSS defined data structures to contain processeswhich are executed when the data definition is accessed, regardless ofthe calling process, or any other active process.

PROGRAM STORAGE AND EXECUTION

[0331] Using EDINs, the EDP, and EDOs, it is possible to store,maintain, and execute any kind of program. As described above, under theEDO section, a given set of EDOs can form the instruction set for aprogramming language, when all such EDOs are also made available asbonds. A BOSS interpreted program can use the following EDINimplementations:

[0332] store an EDCS for each procedure,

[0333] use a Structure-Def client model to store and process programdata structures, or

[0334] use a Data-traversal client model to save, locate and retrieveprogram code and data.

[0335] Since a client can also create construct and supply its own bondsand EDOs (tagged as “user”), any missing bonds/EDOs can be implementedby the client and seamlessly integrated into the BOSS environment. Thenew EDOs will be processed as per all EDOs, by the EDP. Further, theassociated bonds can now be used to insert new code lines (EDCLs) intothe interpreted program.

[0336] BOSS is ideally suited to interpreted programs, although it doessupport compiled programs as well. At a minimum, a BOSS oriented programmust contain definitions of: data-types, variables, parameters,procedures, and lines of code. If imperative programs are required, theassociated module must be tagged as “static”. This indicates to the EDPthat no EDS generation should take place and that the CNL should beloaded and taken for the EDS(s) in question, in some order. Whileinterpretive programs can be directly executed by the EDP, imperativeprograms require a “program execution” system, program or shell whichfacilitates the execution of the imperative BOSS program. Such a shellwould construct/establish EDCL groups for the EDP, where the last EDCLin each group returns control back to the shell, until all programprocessing is complete. Even using a static module, the normal controlflow EDOs may not operate correctly in an imperative program. Thisdepends on whether the operator performs a change of context or not. Forexample, the “edp-pop” EDO changes the next EDCL to be executed by theEDP, thereby changing the context of current processing. Such EDOsalmost always cause a regeneration upon successful termination, toensure updated data. By introducing a lot of controls in such EDOs (andcomplicating them), it is possible to detect an imperative process, andreturn the parameters of would-be context change, and it's associatedaction(s) to the calling process. This enables the calling process toalways be in control of process flow (except for fatal errors and thelike).

[0337] The program called CCOPY, shown in FIG. 35 as 3502, performs aConditional Copy. It has two parameters, and two variables. It also hasone procedure which is not shown; only called. The parameters of CCOPYare two UEIs to two distinct files: Source File (SFILE) and Target File(TFILE). First, the program 3502 gets the current date of each inputfile and stores the dates in SDATE and TDATE. This is accomplished bycalls to the GET-DATE program procedure. This procedure is not shown,but it should be easy enough to picture it as an OS call. Finally, theprogram 3502 compares the two dates and if the source file date isgreater than that of the target file, it copies the source file,overwriting the target file. Both the “if” and “copy” are accomplishedby OS or shell calls (i.e., native to BOSS interface).

[0338] The EDS 3602 shown on FIG. 36 depicts the required EDINs 3604 todefine and be able to execute, the CCOPY program. The sequence fieldestablishes an order, where a set of EDCLs are realized. To furtherdefine a parameter or variable, the same methodology as for aStructure-Def client is used. For example, to define the SFILEparameter, the following two EDINs 3604 could be added to the programmodule CNL: Subject Attribute Bond Sequence SFILE STRING DATA TYPE NULLSFILE “256” SIZE NULL

[0339] The SDEs can be used to dynamically generate components of theprogram, from the CNL. As a result, all program components remaindynamic. So if a data structure changes, the processes using thatstructure, or data in that structure, will immediately experience theeffects of the change. As with any dynamic interpreted program,sufficient safeguards must be taken to enure only changes withoutdestructive effects take place.

CONCLUSION

[0340] This concludes the description of the preferred embodiment of theinvention. In summary,

[0341] The foregoing description of the preferred embodiment of theinvention has been presented for the purposes of illustration anddescription. It is not intended to be exhaustive or to limit theinvention to the precise form disclosed. Many modifications andvariations are possible in light of the above teaching. It is intendedthat the scope of the invention be limited not by this detaileddescription, but rather by the claims appended hereto.

What is claimed is:
 1. A method for dynamically organizing andprocessing data in a computer having a memory and a data storage devicecoupled thereto, the method comprising the steps of: (a) generating aninformation structure and relationship in the memory of the computer asone or more Endo-Dynamic Sets (EDS), the EDS comprising a list of one ormore Endo-Dynamic Information Nodes (EDINs), the EDINs each representingan atomic component of data, and the EDINs each comprising a subjectidentifier, an attribute identifier, and a bond identifier, wherein thebond identifier defines a relationship between the subject and attributeidentifiers; (b) associating each bond identifier of an EDIN with a bodyof executable code stored in the memory of the computer; and (c)performing the executable code using the computer as a required actionfor the bond identifier.
 2. The method of claim 1, wherein one or moreof the Endo-Dynamic Information Nodes (EDINs) comprise an Endo-DynamicCommand Line (EDCL).
 3. The method of claim 2, wherein the Endo-DynamicCommand Lines (EDCLs) comprise a program.
 4. The method of claim 2,wherein one or more Endo-Dynamic Command Lines (EDCLs) are referenced byan Endo-Dynamic Operator (EDO).
 5. The method of claim 4, furthercomprising the steps of generating a unique Universal Entity Identifier(UEI), assigning the unique UEI to the Endo-Dynamic Operator (EDO), andreferencing the unique UEI to invoke the EDO.
 6. The method of claim 5,further comprising the step of distinguishing between native andnon-native Endo-Dynamic Operators (EDOs), wherein native EDOs referenceexecutable code and non-native EDOs reference one or more Endo-DynamicCommand Lines (EDCLs).
 7. The method of claim 1, wherein the bondidentifier comprises an Endo-Dynamic Operator (EDO).
 8. The method ofclaim 4, wherein the Endo-Dynamic Operator (EDO) comprises aninstruction.
 9. The method of claim 1, wherein Universal EntityIdentifiers (UEIs) stored in the memory of the computer uniquelyidentify each Endo-Dynamic Set (EDS).
 10. The method of claim 9, whereineach Universal Entity Identifier (UEI) comprises: a Site OwnerIdentifier (SOI) field, as assigned from a unique Endo DynamicProcessor, to uniquely identify the originating site for the data; and aSite Entity Identifier (SEI) field to uniquely identify each entity at agiven site, the SEI being incrementally generated and dynamicallyassigned to the entity, such that the SEI is never used by more than oneentity.
 11. The method of claim 9, wherein each Universal EntityIdentifier (UEI) is a unique identifier for data in one or moredifferent logical data organizations.
 12. The method of claim 9, whereinall data is stored and accessed via a uniquely assigned Universal EntityIdentifier (UEI).
 13. The method of claim 1, wherein the Endo-DynamicInformation Node (EDIN) further contains a sequence identifier toprovide for ordering among two or more EDINs existing in the sameEndo-Dynamic Set (EDS).
 14. The method of claim 1, further comprisingthe step of dynamically generating the Endo-Dynamic Information Node(EDIN) in the computer.
 15. The method of claim 1, wherein a SetDefinition Equation (SDE) defines one or more conditions that qualify anEndo-Dynamic Information Node (EDIN) to be a member of an Endo-DynamicInformation Set (EDIS).
 16. The method of claim 15, further comprisingthe step of processing the Set Definition Equation (SDE) in the computerto produce an Endo-Dynamic Information Set (EDIS) that containsqualifying Endo-Dynamic Information Nodes (EDINs).
 17. The method ofclaim 1, wherein a Set Definition Equation (SDE) defines one or moreconditions that qualify an Endo-Dynamic Information Node (EDIN) to be amember of an Endo-Dynamic Command Set (EDCS).
 18. The method of claim17, further comprising the step of processing the Set DefinitionEquation (SDE) in the computer to produce an Endo-Dynamic Command Set(EDCS) that contains qualifying Endo-Dynamic Information Nodes (EDINs).19. The method of claim 1, further comprising an Endo-dynamic Editor(EDE) performed by the computer, and the method further comprises thesteps of accepting data from a user into the computer and converting thedata into Endo-Dynamic Information Nodes (EDINs) using the EDE.
 20. Themethod of claim 1, further comprising the steps of automaticallygenerating new Endo-Dynamic Information Nodes (EDINs) in the computerand storing the EDINs in the Endo-Dynamic Set (EDS).
 21. The method ofclaim 20, further comprising the steps of generating the newEndo-Dynamic Information Nodes (EDINs) by first generating a new SetDefinition Equation (SDE) and then processing the new SDE to produce aresultant Endo-Dynamic Set (EDS).
 22. The method of claim 1, furthercomprising an Endo-Dynamic Processor (EDP) executed by the computer, themethod further comprising the steps of retrieving, interpreting andexecuting Endo-Dynamic Command Lines (EDCL), wherein the order of theEDCLs embodies a required active sequence.
 23. The method of claim 22,wherein the Endo-Dynamic Information Nodes (EDINs) are used to organizeall data stored on storage media maintained by the EDP.
 24. The methodof claim 23, wherein the InfoBase is a database system, and theExpandable Table Sets (ETS's) are used to store physical data values.25. The method of claim 1, further comprising the steps of combining twoor more Endo-Dynamic Sets (EDS's) in the memory of the computer to forma Module.
 26. The method of claim 25, wherein Universal EntityIdentifiers (UEIs) stored in the memory of the computer uniquelyidentify each Module.
 27. The method of claim 25, further comprising thestep of combining two or more Modules in the memory of the computer toform an Information Base (InfoBase)
 28. The method of claim 27, whereinUniversal Entity Identifiers (UEIs) stored in the memory of the computeruniquely identify each InfoBase.
 29. The method of claim 27, furthercomprising the step of combining InfoBases to create new data.
 30. Themethod of claim 27, wherein the InfoBases further comprise one or moreInfoFrames.
 31. The method of claim 25, further comprising the steps ofdefining and using Set Definition Equations (SDEs) to produce databasequeries of any complexity and involving any kind of data, the SDEs beingconstructed and processed to produce a set of qualifying members. 32.The method of claim 1, further comprising an Endo-Dynamic Processor(EDP) performed by the computer, wherein Endo-Dynamic Information Nodes(EDINs) comprise executable commands of a program to be performed by theEDP.
 33. The method of claim 32, further comprising the step ofdynamically modifying the Endo-Dynamic Information Nodes (EDINs) duringprocessing.
 34. The method of claim 1, wherein Endo-Dynamic InformationNodes (EDINs) define data structures of any complexity.
 35. The methodof claim 34, further comprising the steps of creating, deleting andmodifying Endo-Dynamic Information Nodes (EDINs).
 36. The method ofclaim 1, wherein the subject identifier is a topic and the attributeidentifier is information pertaining to that topic.
 37. The method ofclaim 1, wherein the Endo-Dynamic Information Nodes (EDINs) areorganized into a hierarchy of EDINs, and further wherein descendantinformation for the hierarchy of EDINs is located in an Endo-Dynamic Set(EDS).
 38. The method of claim 1, wherein the Endo-Dynamic InformationNodes (EDINs) are organized into a hierarchy of EDINs, and furtherwherein ancestor information for the hierarchy of EDINs is located in anEndo-Dynamic Set (EDS).
 39. The method of claim 1, wherein theEndo-Dynamic Information Nodes (EDINs) are organized into a hierarchy ofEDINs, and further wherein sibling information for the hierarchy ofEDINs is located in an Endo-Dynamic Set (EDS).
 40. A method fordynamically organizing and processing data in a computer having a memoryand a data storage device coupled thereto, the method comprising thesteps of: (a) generating an information structure and relationship inthe memory of the computer as one or more Endo-Dynamic Sets (EDS), theEDS comprising a list of one or more Endo-Dynamic Information Nodes(EDINs), the EDINs each representing an atomic component of data, andthe EDINs each comprising a subject identifier, an attribute identifier,and a bond identifier, wherein the bond identifier defines arelationship between the subject and attribute identifiers; (b)associating each bond identifier of an EDIN with an organizationalstructure of data stored in the memory of the computer; and (c)traversing the organizational structure of data in the memory of thecomputer through the EDINs.
 41. The method of claim 40, wherein each ofthe Endo-Dynamic Information Nodes (EDINs) comprise an Endo-DynamicInformation Statement (EDIS).