Interactive filtering model to enhance a software component meta management system

ABSTRACT

Provided is a method for generating an on-demand, custom runtime solution to a user or business&#39;s computing needs. A library of software components corresponding to different computing tasks of a business situation is created. Each software component is associated with one or more meta descriptors. The software components and related meta descriptors are managed by means of a software component meta management system (SCMMS). Based upon customer, input, various components are selected, or filtered, for incorporation into a business runtime solution. In addition to the user input, user queries are feedback into the SCMMS so that the SCMMS accumulates knowledge about the customer&#39;s usage. The knowledge is then employed to facilitate and improve the generation of future runtime solutions for both the customer and other customers.

TECHNICAL FIELD

The present invention relates generally to computer applicationdevelopment and, more specifically, to a system and method for creatinga custom software solution for a business problem.

BACKGROUND OF THE INVENTION

International Business Machines Corp. (IBM) of Armonk, N.Y. has been atthe forefront of new paradigms in business computing. For decades, thetypical paradigm for business computing is that custom businessapplications were specifically designed and built for every businessneed. Of course, most custom business applications benefited fromcommonly-available, standardized applications. For example, a businessthat requires a database management system (DBMS) has several vendorsfrom which to choose and each choice typically provides many of the samenecessary features and interfaces to an application developer. However,a DBMS is only one of a multitude of possible components that may berequired to implement a business solution.

With the advent of the Internet, sometimes referred to as the “web,”business communication has also evolved. Businesses and consumers havemultiple means of communication not previously available, including, butnot limited to, business-to-business (B2B) and business-to-consumer(B2C) links. As businesses seek to take advantage of the web, somecompanies have provided specific applications, called “e-business”applications, that work in that particular environment. In addition,companies, such as International Business Machines Corporation (IBM) ofArmonk, N.Y., have developed products that facilitate the deployment,integration, execution and management of e-business applications. Onesuch IBM product is “WebSphere,” which encompasses tools for developinge-business applications and middleware for running web-basedapplications. One part of WebSphere is a WebSphere Application Server(WAS), which is a run-time component of the WebSphere family ofproducts. Basically, WAS is a Java process with a Java Virtual Machine(JVM).

There are several approaches to the development of a business softwaresolution for a particular business. One approach involves an independentsoftware vendor (ISV) who integrates software components into an“application package.” Another approach involves a system integrator(SI) who integrates software and hardware components and applicationpackages. The SI determines required functionality, selects commerciallyavailable hardware and software components that implement portions ofthe required functionality and generate a final “solution package.” Inaddition to any tasks performed by a SI, a solution provider (SP) mayproduce custom software to integrate and enhance the commerciallyavailable hardware and software components and infrastructure software.The terms SI and SP are often used interchangeably. The softwarecomponents that an ISV or SP integrate with software components iscalled custom code (sometimes also called “application” or “glue” code).Examples of typical software components include, but are not limited to,an IBM HTTP Server and associated plug-ins, a WebServer ApplicationServer-Express runtime application and an IBM DB2 Universal Database(UDB) component. The claimed subject matter may be employed by an SI, SPor ISV so throughout the Specification, SIs, SPs and ISVs will all bereferred to as “developers” or “users” (as in users of the toolsprovided with respect to the claimed subject matter).

Two terms that may be useful to clarify are the terms “application” and“solution.” In some cases, an application solves several problems and asa result may be considered a solution. However, usually the term“solution” refers to an application because a solution solves a targetset of problems, although some developers call their applications asolution. A solution is usually broader than an application because itresolves or addresses horizontal as well as vertical business problems.Solutions are typically delivered for the purpose of running a businessend-to-end and not just focused on a portion (or application of thebusiness). An application is applied to solve a set of problems for abusiness and might be applied to solve another set of problems of thesame kind for another customer.

What is needed is a method and system, or a software component metamanagement system (SCMMS), for enabling a developer, e.g. ISV, SP or SI,to view and select available components for a particular application orsolution based upon an objective scoring system. Ideally, the objectivescoring system may be adjusted to reflect knowledge about the customer'sspecific needs and sophistication and includes feedback so that thegeneration of a particular application or solution provides moreaccurate scoring, and thus better results, with respect to thegeneration of subsequent applications or solutions.

SUMMARY OF THE INVENTION

Provided is a method for generating an on-demand, custom runtimesolution to a user or business's computing needs. A library of softwarecomponents corresponding to different computing tasks of a businesssituation is created. Each software component is associated with one ormore meta descriptors. The software components and related metadescriptors are managed by means of a software component meta managementsystem (SCMMS).

Based upon customer, input, various components are selected, orfiltered, for incorporation into a business runtime solution. Inaddition to the user input, user queries are feed back into the SCMMS sothat the SCMMS accumulates knowledge about the customer's usage. Theknowledge is then employed to facilitate and improve the generation offuture runtime solutions for both the customer and other customers.

To employ the SCMMS to develop a system, a user inputs requirements thatare represented as requirement descriptors and mapped to externalconditions, classifications and keywords. The external conditions arechecked against the stored components external dependencies to filterout those components that include dependencies that can not besatisfied. The external classifications are also employed to filter thecomponents by rejecting components that do not match theclassifications. The external keywords are employed to search keywordsassociated with the available components' meta descriptors. A keywordscore is generated based upon the degree of matching between the user'skeywords and the meta descriptor keywords.

The particular number of filtered components that the user is thenpresented for selection is based upon a predefined limit. If the numberof filtered components exceeds the predefined limit, the user is askedto provide more information, e.g. external conditions, classificationsand keywords and the filtering process is repeated. Once components areselected, an applications score is calculated for each component basedupon the match of user provided requirement descriptors and applicationattributes associated with the meta descriptors. The applications scoresof all selected components are employed to generate an association scorecorresponding to each component.

A final score for the selected components is then generated based uponthe keyword, application and association scores in conjunction withconstants associated with the SCMMS. The constants are selected by anadministrator of the SCMMS based upon knowledge of the user with theobjective of optimizing results for the user.

Results are presented to the user in the order of the final score. Theuser then browses the result set and selects desired components. Ascomponents are selected, new associations are generated based upon theselected component and previously selected components and associationinformation is added to the meta descriptor of corresponding components.In this manner, the SCMMS “learns” from the user's selections and canapply this learning to future executions of the SCMMS.

BRIEF DESCRIPTION OF THE FIGURES

A better understanding of the present invention can be obtained when thefollowing detailed description of the disclosed embodiments isconsidered in conjunction with the following figures, in which:

FIG. 1 is a block diagram of an exemplary computing system thatincorporates the claimed subject matter.

FIG. 2 is a block diagram of an exemplary application developmentarchitecture, including distribution elements, that employs the claimedsubject matter.

FIG. 3 is block diagram of hierarchical tree that exemplifies thehierarchical structure employed with the claimed subject matter.

FIG. 4 is an exemplary MetaDataDescriptorObject (MDDO) memory objectemployed in one implementation of the claimed subject matter.

FIG. 5 is a flow chart of a Select Components process that executes inconjunction with the claimed subject matter.

FIG. 6 is a flowchart that illustrates a Score Components aspect of theSelect Components process of FIG. 5.

FIG. 7 is a flowchart that illustrates an Integrate Component aspect ofthe Select Components process of FIG. 5.

FIG. 8 is a flowchart that illustrates a Calculate Keyword Score (S_k)aspect of the Select Components process of FIG. 5.

FIG. 9 is a flowchart that illustrates a Calculate Application Score(S_app) aspect of the Select Components process of FIG. 5.

FIG. 10 is a flowchart that illustrates a Calculate Associations Score(S_ass) aspect of the Select Components process of FIG. 5.

DETAILED DESCRIPTION OF THE FIGURES

Although described with particular reference to a WebSphere basedsystem, the claimed subject matter can be implemented in any informationtechnology (IT) system in which component reuse is desirable. Thedisclosed subject matter is also applicable to non-homogeneous systems.Those with skill in the computing arts will recognize that the disclosedembodiments have relevance to a wide variety of computing environmentsin addition to those described below. In addition, the methods of thedisclosed invention can be implemented in software, hardware, or acombination of software and hardware. The hardware portion can beimplemented using specialized logic; the software portion can be storedin a memory and executed by a suitable instruction execution system suchas a microprocessor, personal computer (PC) or mainframe.

In the context of this document, a “memory” or “recording medium” can beany means that contains, stores, communicates, propagates, or transportsthe program and/or data for use by or in conjunction with an instructionexecution system, apparatus or device. Memory and recording medium canbe, but are not limited to, an electronic, magnetic, optical,electromagnetic, infrared or semiconductor system, apparatus or device.Memory an recording medium also includes, but is not limited to, forexample the following: a portable computer diskette, a random accessmemory (RAM), a read-only memory (ROM), an erasable programmableread-only memory (EPROM or flash memory), and a portable compact diskread-only memory or another suitable medium upon which a program and/ordata may be stored.

One embodiment, in accordance with the claimed subject, is directed to aprogrammed method for generating an on-demand, custom runtime solutionto a user or business's computing needs. The term “programmed method”,as used herein, is defined to mean one or more process steps that arepresently performed; or, alternatively, one or more process steps thatare enabled to be performed at a future point in time. The termprogrammed method anticipates three alternative forms. First, aprogrammed method comprises presently performed process steps. Second, aprogrammed method comprises a computer-readable medium embodyingcomputer instructions, which when executed by a computer performs one ormore process steps. Finally, a programmed method comprises a computersystem that has been programmed by software, hardware, firmware, or anycombination thereof, to perform one or more process steps. It is to beunderstood that the term “programmed method” is not to be construed assimultaneously having more than one alternative form, but rather is tobe construed in the truest sense of an alternative form wherein, at anygiven point in time, only one of the plurality of alternative forms ispresent.

Turning now to the figures, FIG. 1 is a block diagram of an exemplarycomputing system architecture 100 that incorporates the claimed subjectmatter. A central processing unit (CPU) 102 is coupled to a monitor 104,a keyboard 106 and a mouse 108, which together facilitate humaninteraction with computing system 100. Attached to CPU 102 is a datastorage component 110, which may either be incorporated into CPU 102i.e. an internal device, or attached externally to CPU 102 by means ofvarious, commonly available connection devices such as but not limitedto, a universal serial bus (USB) port (not shown). Data storage 110 isillustrated storing several exemplary computer programming modules, i.e.a “Module_1,” 112, a “Module_2,” 114 and a “Module_3,” 116. It should benoted that a typical application or system would include many more thanthree (3) modules, but for the sake of simplicity only three are shown.Module_1 112, module_2 114 and module_3 116 represent components of alibrary of software components from which a developer selects specificcomponents corresponding to different computing tasks of a businesssituation.

Also stored on data storage 110 is a software component meta managementsystem (SCMMS) 118. SCMMS 118 is a system for generating an on-demand,custom runtime solution to a user or business's computing needs. Eachsoftware component 112, 114 and 116 is associated with one or more metadescriptors (not shown), which are stored in a SCMMS data area 120.Software components 112, 114 and 116 and related meta descriptors storedin data area 120 are managed by means of SCMMS 118.

CPU 102 is connected to the Internet 122, which is also connected to aserver computer 124. Although in this example, CPU 102 and server 124are communicatively coupled via the Internet 122, they could also becoupled through any number of communication mediums such as, but notlimited to, a local area network (LAN) (not shown). Further, it shouldbe noted there are many possible computing system configurations, ofwhich computing system 100 is only one simple example.

FIG. 2 is a block diagram of a solution, or application, developmentsystem 130 that employs the claimed subject matter. In particularsoftware markets in which a developer delivers custom businesssolutions, the process can be broken into at least three (3) distinctphases: solution browsing 132, solution development, or solutioncomposing, 134; and solution packaging 136. Solution testing (not shown)is a subset of solution development 134. A solution deployment phase 138might be considered a fourth phase.

Although described primarily with respect to solution browsing phase132, the claimed subject matter, as exemplified by SCMMS 118 (FIG. 1),can be applied to solution development 134, solution packaging 136 andsolution deployment 138 as well.

During solution browsing 102, a developer accesses SCMMS 118 to selectcomponents, such as module_1 112 (FIG. 1), module_2 114 (FIG. 1) andmodule_3 116 (FIG. 1), which the developer determines necessary forinclusion in a proposed business solution, in this example anapplication 142. It should be noted that there may be any number ofcomponents selected, each of which may be created by technical expertsor an off-the-self product. The process for selecting components forinclusion into application 142 is described in more detail below inconjunction with FIGS. 5-10.

In this example, the developer selects, during solution browsing 142,custom software and other components for providing functionality that isspecific to the particular business problem. SCMMS 118 assists thisprocess by providing the capability to view the name, associatedcharacteristics and rankings of available components.

During solution development 134, core components such as, but notlimited to, a HTTP server and associated plug-ins 144, a Websphereapplication server express runtime module 146 and a DB2 universaldatabase (UDB) express runtime module 148. Components 144, 146 and 148provide necessary functionality to application 142. As explained above,SCMMS 118 is employed to enable the developer to select among variouschoices for each of the components 144, 146 and 148. As in solutionbrowsing 132, the various components added during solution development134 may be custom-designed or “off-the-shelf” modules, applicationsand/or devices.

During solution packaging 136, the developer, with the assistance ofSCMMS 118, typically provides addition components as needed to produce adeployment package 152. For example, in addition to application 112 andcomponents 144, 146 and 148, the developer may need to provide acomponent such as an installation module 150 that, in this example,decompresses computer memory files and installs solution packaging 136on a target system, such as a customer system 156. SSMMS 118 may beemployed by the developer make an informed decision among a number ofavailable installation modules. In solution packaging 136, deploymentpackage 152 is produced for delivery via, in this example, either a CD154 and/or a staging server, such as server 124 (FIG. 1).

Solution deployment 138 illustrates some methods of distributingsolution package 152 to an eventual client or customer. Examples of suchdistribution techniques include, but are not limited to, compact disk(CD) 154, which is mailed or otherwise delivered to the customer forinstallation on customer system 156; and server 124 (FIG. 1), from whichcustomer system 156 can download a product or solution, such asdeployment package 152. Those with skill in the computing arts shouldrecognize that there are many possible delivery options in addition toCD 154 and server 124.

FIG. 3 is block diagram of exemplary hierarchical tree 160 thatillustrates a hierarchical structure employed in this description of theclaimed subject matter. Tree 160 starts at a top level of vendorsoftware 161, which represents a business solution for a particularclient. Of course, tree 160 is only one example of a hierarchicalstructure and vendor software 161 is only one example of an entry intree 160. Under vendor software 161 are two exemplary applications, i.e.an IBM software component 162 and a vendor application 163. In otherwords, in this example, the client's software solution 161 is comprisedof both IBM software 162 and software or applications 163 developed bythe vendor themselves.

IBM software 162 is comprised of two components, i.e. WebSpherecomponents 165 and DB2 components 166. In addition, in this example,vendor application 163 is illustrated as being comprised of componentsof WebSphere 165. Included one level below WebSphere 165 in tree 160 aretwo components, i.e. a WebSphere Portal Server 168 and a WebSphereApplication Server (WAS) 170. A second vendor application 164 is alsocomprised of components associated with WebSphere portal server 168.

WAS 170 includes a graphical user interface (GUI) 176 and a securitycomponent 178. GUI 176 includes a WAS admin console 184. Securitycomponent 178 includes a security server 186, a security collaborator188 and a security plug-in module 190.

DB2 component 166 includes a lower level DB2 Universal Database (DB2UDB) component 172 and a DB2 Information Integrator (II) component 174.DB2 UDB 172 includes an Extensible Markup Language (XML) enablercomponent 180, which includes a XML extender component 192. DB2 IIcomponent 174 includes an adaptor component 182, which includes anOracles adaptor component 194.

In this example, vendor software 161 is at the top level and every othercomponent in tree 160 is at a lower level than vendor software 161. In asimilar fashion, Websphere 165 is a higher level than both Websphereportal server 168 and WAS 170, which are at a lower level. Thesignificance of a particular component's position in tree 160 determineshow a specific rule applied to one component affects other components.Examples of types of rules that apply to tree 160 include, but are notlimited to, lifecycle rules, versioning rules, interrelationship rulesand access control rules.

Some exemplary rules are as follows:

Lifecycle Rules

-   -   Register/Create: Registration happens at multiple levels. When        registration happens at a higher level, lower levels'        components' meta descriptors 200 (see FIG. 4) are automatically        populated with information in the higher level's meta descriptor        200.    -   Modify/Update: Lower level nodes can override inherited meta        descriptors 200 to better describe themselves. Updates of higher        level nodes populate children nodes if so configured. In other        words, there is optional propagating.    -   Delete: A delete operation propagates to lower level nodes.

Versioning

-   -   Multiple versions of the same software or component can be        maintained by SCMMS 118 (FIG. 1) and retrieved upon request.    -   Query: Current versions are retrieved when a query does not        include versioning specific information.    -   Create/Register New Version: Versioning happens at different        levels. A current version tag is moved from previous version        components to a newer version component.    -   Version Tags: Version tags are employed to group components        across versions into virtual groups for easy retrieval. For        example, a “Stable Version” may include a version 1.0 of        Websphere portal server 168 and a version 1.2 of WAS 170, and so        on. In this example, the Stable Version group denotes a grouping        of components that have been tested or proven to work together.

Interrelationships

-   -   Three basic interrelationships are defined: inclusion;        dependency and mutual exclusiveness, with inclusion and        dependency having a direction.    -   If an inclusion relationship is create from a component A, such        as DB2 166, to a component B, such as DB2 UDB 172, the same        relationship is created from all component A's ancestor        components, such as vendor software 161 and IBM software 162,        and all of component B's descendent components, such as XML        enabler 180 and XML extender 192.    -   If a dependence relationship is created from a component A, such        as DB2 166, to a component B, such as DB2 UDB 172, the same        relationship is created from all component A's ancestor        components, such as IBM software 162 and vendor software 161.    -   If a mutual exclusiveness relationship is created between a        component A, such as XML extender 192, to a component B, such as        Oracle adaptor 194, the same relationship is created between all        of component A's ancestors, such as XML enabler 180 and DB2 UDB        172, and all of component B's ancestors, such as adaptor 182 and        DB2 II 174.

Access Control

-   -   A grant of access to a higher level component propagates to        descendent lower level components.    -   A denial of access to a lower level component propagates to        ancestor higher level components.        It should be noted that the rules and specific components listed        above are only for the purposes of illustration. A set of rules        in any particular implementation of the claimed subject matter        may include additional, less or modified version of these        examples. In addition, the specific examples on the        compatibility of components do not necessarily reflect the        actual compatibilities of the exemplary components.

FIG. 4 is an exemplary MetaDataDescriptorObject (MDDO) memory object 200employed in an implementation the claimed subject matter. MDDO memoryobject 200 includes a title section 202, which merely states the name ofobject 200, i.e. “MetaDataDescriptorObject,” an attribute section 204,which contains memory elements, or attributes, associated with MDDOmemory object 200, and a method section 206, which includes functions,or methods, that may be executed in conjunction with MDDO memory object200. It should be noted that the attributes and methods described areused for the purpose of illustration only. Additional and/or differentattributes and methods may be employed to implement the claimed subjectmatter.

Attribute section 202 includes an “mddID” attribute 208, a “componentID”attribute 210, an “interDependencies” attribute 212, an“externalDependencies” attribute 214, a “version” attribute 216, a“dates” attribute 218, a “relationships” attribute 220, a“classifications” attribute 222, an “lcStatus” attribute 224, a“pricing” attribute 226, a “keywords” attribute 228, an “applications”attribute 230 and an “associations” attribute 232. Instantiations ofobject 200 are stored in SCMMS data 120 (FIG. 1) of data store 110 (FIG.1).

MddID attribute 208 is a variable of type MDDObjectID that contains areference to the particular instance of object 200. Each instance ofobject 200 has a unique value for attribute 208 that allows eachinstance to be uniquely identified. ComponentID attribute 210 is avariable of type ComponentID that stores a reference to a particularcomponent associated with a particular instantiation of object 200. BothmddID attribute 208 and componentID attribute 210 are employed by aSelect Components process 300 (see FIGS. 5-10) to locate informationconcerning a particular component prior to the selection of thatresource.

InterDependencies attribute 212 is a variable of type Vector that storesa record of components that the component referenced by thisinstantiation of object 200 depends upon and those components thatdepend upon this particular instantiation. In other words, attribute 212is a list of variables of type componentID 210 that reference componentsrelated to the particular instantiation of object 200.

ExternalDependencies attribute 214 is a variable of type Vector thatstores a record of the external software or system that the componentreferenced by this instantiation of object 200 depends upon. Someexamples include, but are not limited to, specific operating systems,middleware platform, adaptors and so on.

Version attribute 216 is a variable of type VersionInfo that identifiesa particular data structure (not shown) that stores information such as,but not limited to, a version number for the component referenced byobject 200, a number of the latest version and tagging information, e.g.“Beta,” “GA,” “test,” etc.

Dates attribute 218 is a variable of type DateInfo that identifies aparticular data structure (not shown) that stores information including,but not limited to, a date the particular instantiation of object 200was created, a date object 200 the instantiation was modified and a datethe instantiation expires or is no longer valid for selection.

Relationships attribute 220 is a viable of type Vector that stores arecord of other components to which the particular instantiation ofobject 200 shares a relationship. For example, some components may be asub-component, super-component, “parent,” “child” or “sibling” of othercomponents.

Classifications attribute 222 is a variable of type Vector that stores arecord of predefined vendor-dependent classifications. LcStatusattribute 224 is a variable of type Integer that stores informationconcerning the life cycle status of the corresponding object 200. Forexample, a particular object 200 may be “Obsolete,” “Deprecated,”“Released,” “Withdrawn,” and so on.

Pricing attribute 226 is a variable of type PriceID that identifies aparticular data structure (not shown) that stores pricing informationcorresponding to the corresponding component. For example, the pricingdata structure may include information on wholesale and retail pricesfor the particular component or a formula for determining a price basedupon the manner in which the component is used in conjunction with othercomponents.

Keywords attribute 228 is a variable of type Vector that storeskeywords, typically related to the corresponding component's corefunctions. Attribute 228 is searched during a “Search Keywords” block310, which is explained below in conjunction with FIG. 5.

Applications attribute 230 is a variable of type Vector that storesrecords relating to how the corresponding component has been used beforeby other users or developers. Attribute 230 changes over time todynamically feedback user's requirements to the corresponding component,thus supplementing SCMMS 118 (FIG. 1) by providing experience basedintelligence. Some examples of user feedback stored in attribute 230 areclassifications and keywords used by previous developers when thecorresponding component was selected.

Associations attribute 232 is a variable of type Vector that storesrecords relating to other components that have been employed inconjunction with the corresponding component. For example, module_1 112(FIG. 1) and module_2 114 (FIG. 1) may typically be used in conjunctionwith each other and, therefore, attribute 232 corresponding to module_1112 lists module_2 114 and the number of times the two modules 112 and114 have been used in conjunction with each other. Of course, attribute232 corresponding to module_2 114 would, in this example, also storecorresponding information relating to module_1 112.

Method section 206 of object 200 includes two exemplary functions, ormethods. Only two methods are illustrated for the sake of simplicity.Those with skill in the programming arts should appreciate that anobject such as object 200 would typically include many additionalmethods including, but not limited to, constructors, destructors, andmethods to set and get values for various attributes.

An “updateApplications” method 234 is called during an IntegrateComponents block 316 explained in more detail below in conjunction withFIGS. 5 and 7. Method 234 is called to update attribute 230 of thecorresponding component so that, as explained above, SCMMS 118 is ableto learn form past experience. In this example, method 234 is calledwith two parameters: “classifications,” a variable of type Vector thatstores the various classifications employed during a “CheckClassifications” 308 (see FIG. 5) and “keywords,” a variable of typeVector that stores the various keywords employed during Search Keywordsblock 310.

An “updateAssociations” method 236 is called during Integrate Componentsblock 316 explained in more detail below in conjunction with FIGS. 5 and7. Method 236 is called to update attribute 232 of the correspondingcomponent so that, as explained above, SCMMS 118 is able to learn frompast experience. In this example, method 236 is called with oneparameter: “associations,” a variable of type Vector that storescomponentIDs of components found during a “Determine Associations” block358 (see FIG. 7) that are associated with the corresponding component.

It should be understood that MDDO object 200 is only one example of amemory object that may be used to implement the claimed subject matter.Other memory objects with fewer, more and/or different attributes andmethods may be employed. In addition, there are many ways other thanemploying object 200 to implement the functionality and data storage ofthe claimed subject matter. For example, the claimed subject matter maybe implemented by means of a computer program in conjunction with arelational database.

FIG. 5 is a flow chart of a Select Components process 300 executed bySCMMS 118 of FIG. 1. Portions of process 300 are described in moredetail below in conjunction with FIGS. 6-10. In this example, process300 executes on CPU 102 (FIG. 1) and is generally controlled by adeveloper or user by virtue of the interaction of keyboard 106 (FIG. 1),mouse 108 (FIG. 1) and a graphical user interface (GUI) (not shown),displayed on monitor 104.

Process 300 starts in a “Begin Select Components” block 302 and controlproceeds immediately to an “Input Requirements” block 304. During block304, an operator, e.g. a user or developer, enters, either via the GUIor in a text format, requirements, typically in the form of keywords,corresponding to a desired component. For example, if some type ofdatabase component is necessary for an implementation of the applicationor business solution, then a database descriptor is entered. Otherdescriptors may be included to further restrict such factors as thetype, cost and so on of the database. The various descriptors that maybe entered are mapped external conditions, classifications and keywords.

During a “Check Dependencies” block 306, process 300 checks externaldependencies mapped to the descriptors input during block 304 againstpotential components, such as in this example module_1 (FIG. 1),module_2 (FIG. 1) and module_3 (FIG. 1). If a particular component hasexternal dependencies that can not be satisfied, the component isremoved, or “filtered,” from the list of potential components. During a“Check Classification” block 308, process 300 employs classifications,defined by the operator, to further filter the list of possiblecomponents. During a “Search Keywords” block 310, process 300 matcheskeywords entered by the operator during block 304 with keywords includedin meta descriptors associated with each component on the list ofpotential components. Components that do not contain keywords arefiltered from the list of potential components.

During a “Count>N?” block 312, process 300 determines whether or not thenumber of components remaining on the list of potential components afterthe filtering of blocks 306, 308 and 310 is greater or smaller than auser-predefined number N. The number N represents the maximum number ofcomponents the operator is willing to browse to manually select aparticular component. If the count exceeds the number N, process 300returns to Input Requirements block 304 during which the operator entersadditional requirements to further filter the list of potentialcomponents. Processing then continues as described above.

If during block 312 the number of components in the list does not exceedthe number N, then process 300 proceeds to a “Score Components” block314. During block 314, process 300 calculates a keyword score, anapplication score, an association score and a final score for eachcomponent remaining on the list. Score Components block is explained inmore detail below in conjunction with FIGS. 6-10. The mechanics ofcalculating the keyword, application and association scores areexplained in more detail below in conjunction with FIGS. 8-10,respectively.

During an “Integrate Component” block 316, process 300 enables theoperator to select a particular component from the remaining componentson the list of potential components and the selected component isintegrated into the application of business solution that is beinggenerated. Block 316 is explained in more detail below in conjunctionwith FIG. 7.

During a “More Components?” block 318, the operator is given the optionof selecting more components or proceeding with the components that havealready been selected. If the operator decides to select morecomponents, process 300 proceeds to a “Reset List” block 320 duringwhich process 300 restores the list of potential components to theoriginal unfiltered state. Then, process 300 returns to InputRequirements block 304 and processing continues as described above toselect an additional component. If during block 318 the operator decidesto proceed with the components that have already selected, process 300continues to an “End Select Components” block 329 in which process 300is complete.

FIG. 6 is a flowchart that illustrates Score Components block 314 ofSelect Components process 300 of FIG. 5 in more detail. The processingassociated with block 314 starts in a “Begin Score Components” block 332and proceeds immediately to a “Retrieve Component” block 334. Duringblock 334, process 300 scans a list (not shown) of components, stored inSCMMS data 120 (FIG. 1), that were selected during other blocks ofSelect Components process 300, such as module_1 112, module_2 114 andmodule_3 116, retrieves information concerning the first component, ortarget component, from the list and retrieves the MDDO memory object 200corresponding to the particular component.

Process 300 then proceeds to a “Calculate Keyword Score (S_k)” block 336during which process 300 calculates a keyword score based upon thedegree of matching between keywords entered during Input Requirementsblock 304 (FIG. 5) and keywords associated with components and stored asmeta descriptors in conjunction with SCMMS data 120. The process ofcalculating an S_k score for each component is explained in more detailbelow in conjunction with FIG. 8.

During a “Calculate Application Score (S_app)” block 338, process 300compares the input requirements entered during Input Requirements block304 with application dynamic attributes, which is stored as metadescriptors in conjunction with SCMMS data 120. An S_app score iscalculated for each component remaining in the list of potentialcomponents. The process of calculating an S_app score for each componentis explained in more detail below in conjunction with FIG. 9.

During a “Calculate Association Score (S_ass)” block 340, process 300compares association attributes, stored as meta descriptors inconjunction with SCMMS data 120, with components that have previouslybeen selected for inclusion in the desired application or businesssolution during process 300. An S_ass score is calculated for eachcomponent remaining in the list of potential components. The process ofcalculating an S_ass score for each component is explained in moredetail below in conjunction with FIG. 10.

During a “Calculate S_final” block 342, the scores generated duringblocks 336, 338 and 340 are employed to generate an S_final score forthe target component from the list of potential components. One exampleof a formula for generating the S_final score is in the following form:“S_final=A*S _(—) k+B*S_app+C*S_ass,where A, B and C are constants for SCMMS 118 (FIG. 1) defined by asystem administrator with knowledge of the context of the desiredapplications and/or business solutions. In other words, constants A, Band C are selected in order to maximize the results of SCMMS 118. Someexemplary general rules for the selection of constants A, B and C are asfollows:

-   -   In a new system without a good knowledge base, e.g. components        are not well-known applications, S_final relies more heavily on        keyword matching, i.e. A>>B and C;    -   In a system that has been existence a relatively long time and        has a well-established knowledge base, e.g. applications for        components, scoring is based primarily on which components have        been used previously and which requirements are common for the        components, i.e. B>>A and C; and    -   In a system in which there is a high correlation of selected        components, i.e. same or similar set of components are        frequently selected together, or in which compatibility is a        concern constants A, B and C are defined so that C>>A and B.

During a “More Components?” block 344, process 300 determined whether ornot there are any components in the list of components accessed duringblock 334 that need to be scored. If so, control returns to block 334during which MDDO memory object 200 corresponding to the next componentin the list is retrieved and processing continues as described above.If, during block 344, process 300 determines there are no morecomponents to score, process 300 proceeds to a “Rank Results” block 346during which all the scores of all the components retrieve during block334 are ranked according to the corresponding S_final scores. During a“Display Results” block 348, process 300 displays the remainingcomponents in the list of potential components, listed according to thecorresponding S_final scores in the GUI on, in this example, monitor 104(FIG. 1). Finally, the processing associated with Score Components block314 of process 300 is complete in an “End Score Components” block 349.

FIG. 7 is a flowchart that illustrates Integrate Component block 316 ofSelect Components process 300 of FIG. 5 in more detail. The processingassociated with block 316 starts in a “Begin Integrate Component” block352 and proceeds immediately to a “Select Component” block 354. Duringblock 354, an operator browses the components in the ranked listgenerated and displayed on monitor 104 (FIG. 1) during Score Componentsblock 314 (FIGS. 5 and 6) and related blocks 332, 334, 336, 338, 340,342, 344 and 349 (FIG. 6). Further, the operator selects a componentfrom the list for inclusion in the proposed application or businesssolution. Those with skill in the computing arts should appreciate theuse and function of the GUI with respect to the browsing and selectionsof particular components.

During an “Import Applications” block 356, process 300 retrieves thecomponent selected during block 354 for inclusion in the proposedapplication of business solution. It should be noted that a componentcan itself be an application. During a “Determine Associations” block358 determines any new associations created as the result of theinclusion of the component selected during block 354 with any previouslyselected components.

During an “Update SCMMS Data” block 360, process 300 updates SCMMS data120 (FIG. 1) with the new associations detected during block 358. Inthis manner, SCMMS 118 is able to make future iterations of process 300more accurate and easier or, in other words, SCMMS 118 learns by storingassociation information for future reference. Finally, control proceedsto an “End Integrate Component” block 369 in which the processingassociated with Integrate Component block 316 is complete.

FIG. 8 is a flowchart that illustrates in more detail Calculate S_kblock 336 (FIG. 5), associated with Score Components block 314 of SelectComponents process 300 of FIG. 5. The processing associated with block336 starts in a “Begin Calculate S_k” block 372 and proceeds immediatelyto a “Calculate Requirement Keyword Component Match (RKCM)” block 374.During block 374, process 300 determines a degree of correlation betweenkeywords entered during Input Requirements block 304 (FIG. 4) andkeywords stored in keywords attribute 228 of the MDDO memory object 200retrieved during Retrieve Component block 334 (FIG. 6).

During a “Compute S_k” block 376, process 300 calculates a numericalscore based upon the degree of matching between the keywords enteredduring Input Requirements block 304 (FIG. 5) and keywords stored inkeywords attribute 228. This score is employed during Calculate S_finalblock 342 (FIG. 6) to determine a composite score, or S_final, used inRank Results block 346 (FIG. 6) of process 300.

The score calculated during block 376 is stored in conjunction with areference to the corresponding component during a “Store S_k” block 378.Finally, process 300 proceeds to an “End Calculate S_k” block 379 inwhich block 336 of process 300 is complete.

FIG. 9 is a flowchart that illustrates in more detail Calculate S_appblock 338 (FIG. 6), associated with Score Components block 314 of SelectComponents process 300 of FIG. 5. The processing associated with block336 starts in a “Begin Calculate S_app” block 382 and proceedsimmediately to a “Retrieve Component Applications MetaDescriptor (CAMD)”block 384. During block 394, process 300 retrieves applicationsattribute 230 (FIG. 4) associated with the memory object (FIG. 4)retrieved during Retrieve Component block 334 (FIG. 6).

During a “Calculate Match Between CAMD and Descriptor Requirements(RQD)” block 386, process 300 determines a degree of correlation betweenkeywords entered during Input Requirements block 304 (FIG. 5) andassociations stored in associations attribute 230 of the MDDO memoryobject 200 retrieved during Retrieve Component block 334.

During a “Compute S_app” block 388, process 300 calculates a numericalscore based upon the degree of matching between the keywords enteredduring Input Requirements block 304 (FIG. 5) and associations stored inassociations attribute 230 of the MDDO memory object 200 retrievedduring Retrieve Component block 334. This score is employed duringCalculate S_final block 342 (FIG. 6) to determine a composite score, orS_final, used in Rank Results block 346 (FIG. 6) of process 300.

The score calculated during block 388 is stored in conjunction with areference to the corresponding component during a “Store S_app” block390. Finally, process 300 proceeds to an “End Calculate S_app” block 399in which block 338 of process 300 is complete.

FIG. 10 is a flowchart that illustrates in more detail Calculate S_assblock 340 (FIG. 6), associated with Score Components block 314 of SelectComponents process 300 of FIG. 5. The processing associated with block340 starts in a “Begin Calculate S_ass” block 402 and proceedsimmediately to an “Initialize S_ass” block 404. During block 404,process 300 initializes a value of S_ass that is employed during theremainder of block 340 to calculate an S_ass score for the particularcomponent being scored. The particular component is from the list ofcomponents filtered during blocks 304, 306, 308, 310 and 312 of process300, described above in conjunction with FIG. 5.

During a “Retrieve Association” block 406, process 300 retrieves thefirst association listed in associations attribute 232 (FIG. 4). Duringa “Compute Score” block 410, process 300 calculates a score based uponthe number of similar associations that the association retrieved duringblock 406 has with components that have already been selected duringIntegrate Component block 316 (FIG. 4). In an “Update S_ass” block 410process 300 updates the corresponding value of S_ass, which was firstinitialized during block 404, based upon the score calculated duringblock 408.

During a “More Associations?” block 412, process 300 determines whetheror not there are more associations stored in attribute 232 that need tobe calculated into the S_ass score. If so, process 300 returns to block408 during which the next association in attribute 232 is selected andprocessing continues as described above. If during block 412 process 300determines that all the associations stored in attribute 232 have beenemployed in the calculation of S_ass, process 300 continues to a “StoreS_ass” block 414 during which process 300 stores the calcualted S_assscore in conjunction with the targeted component. Finally, during an“End Calculate S_ass” block 419, block 340 of process 300 is complete.

While the invention has been shown and described with reference toparticular embodiments thereof, it will be understood by those skilledin the art that the foregoing and other changes in form and detail maybe made therein without departing from the spirit and scope of theinvention, including but not limited to additional, less or modifiedelements and/or additional, less or modified blocks performed in thesame or a different order.

1. A method for selecting software components from a hierarchicaldirectory, comprising: applying keyword matching rules to hierarchicalcomponent descriptors, each hierarchical component descriptorcorresponding to a particular software component of a plurality ofsoftware components; filtering the plurality of software components toproduce a subset; scoring the subset of the plurality of softwarecomponents to produce a ranking, the scoring based upon applying thekeyword matching rules to the hierarchical component descriptors;displaying a list of the subset of the plurality of software componentsalong with the corresponding rankings; selecting a particular softwarecomponent displayed on the list; and modifying the hierarchicalcomponent descriptors based upon the selection of the particularsoftware component from the list.
 2. The method of claim 1, furthercomprising integrating the particular software component into a softwareapplication.
 3. The method of claim 1, wherein the filtering is basedupon dependency information stored in the hierarchical componentdescriptors.
 4. The method of claim 1, wherein the filtering is basedupon classification information stored in the hierarchical componentdescriptors.
 5. The method of claim 1, further comprising modifying thehierarchical component descriptors based upon the filtering.
 6. Themethod of claim 1, further comprising: calculating associations amongthe plurality of software components based upon the selection of theparticular software component; and modifying the hierarchical componentdescriptors based upon the associations.
 7. The method of claim 1,wherein the scoring is also based upon association information andapplication information, both stored in the hierarchical componentdescriptors.
 8. A system for selecting software components from ahierarchical directory, comprising: a plurality of software components;a plurality of hierarchical component descriptors, each hierarchicalcomponent descriptor corresponding to a particular software component ofthe plurality of software components; logic for scoring each of theplurality of software components to produce a ranking, the scoring basedupon applying keyword matching rules to the hierarchical componentdescriptors; and logic for modifying the hierarchical componentdescriptors based upon the scoring.
 9. The system of claim 8, furthercomprising: logic for displaying a list of the plurality of softwarecomponents and corresponding scores to facilitate the selection of aparticular software component; and logic for integrating the particularsoftware component into a software application.
 10. The system of claim8, further comprising: logic for filtering the plurality of softwarecomponents to produce a subset of the plurality of software components;and wherein the filtering is based upon dependency information stored inthe hierarchical component descriptors.
 11. The system of claim 10,wherein the filtering is based upon classification information stored inthe hierarchical component descriptors.
 12. The system of claim 10,further comprising logic for modifying the hierarchical componentdescriptors based upon the filtering.
 13. The system of claim 9, furthercomprising: logic for calculating an association between a selectedsoftware component and other software components included in thesoftware application; and logic for modifying the hierarchical componentdescriptors based upon the association.
 14. The system of claim 8,wherein the scoring is also based upon association information andapplication information, both stored in conjunction with thehierarchical component descriptors.
 15. A computer programming productfor selecting software components from a hierarchical directory,comprising: a memory; logic, stored on the memory, for applying keywordmatching rules to hierarchical component descriptors, each hierarchicalcomponent descriptor corresponding to a particular software component ofa plurality of software components; logic, stored on the memory, forfiltering the plurality of software components to produce a subset;logic, stored on the memory, for scoring the subset of the plurality ofsoftware components to produce a ranking, the scoring based uponapplying the keyword matching rules to the hierarchical componentdescriptors; logic, stored on the memory, for displaying a list of thesubset of the plurality of software components along with thecorresponding rankings; and logic, stored on the memory, for modifyingthe hierarchical component descriptors based upon a selection of aparticular software component from the list.
 16. The computerprogramming product of claim 15, further comprising logic, stored on thememory, for integrating the particular software component into asoftware application.
 17. The computer programming product of claim 15,wherein the filtering is based upon dependency information stored in thehierarchical component descriptors.
 18. The computer programming productof claim 15, wherein the filtering is based upon classificationinformation stored in the hierarchical component descriptors.
 19. Thecomputer programming product of claim 15, further comprising logic,stored on the memory, for modifying the hierarchical componentdescriptors based upon the filtering.
 20. The computer programmingproduct of claim 15, further comprising: logic, stored on the memory,for calculating associations among the plurality of software componentsbased upon the selection of the particular software component; andlogic, stored on the memory, for modifying the hierarchical componentdescriptors based upon the associations.