A data manipulation appliance can be installed or plugged into a computer network between business partners, and can perform many of the difficult and tedious data manipulation operations in a substantially automated manner. Examples of operations that can be performed by an embodiment of the apparatus include, but are not limited to, encryption, authentication, auditing, shaping data to a common intermediate format for exchange between partners, other auditing of data exchanges in transaction logs, filtering data for privacy compliance and risk management, error detection and correction, mapping internal non-standard data elements to external standard code sets, proxy and protocol re-writing, and so on. The appliance can be embedded with various tools to perform these operations, and therefore appears to be "intelligent."

 
Web www.patentalert.com

< Method and system for controlling memory accesses to memory modules having a memory hub architecture

< Tasks distribution in a multi-processor including a translation lookaside buffer shared between processors

> Method and system for analyzing memory leaks occurring in java virtual machine data storage heaps

> Self-service resource provisioning having collaborative compliance enforcement

~ 00611