US20160020951A1 - Managing target computer using encapsulated file - Google Patents

Managing target computer using encapsulated file Download PDF

Info

Publication number
US20160020951A1
US20160020951A1 US14/870,734 US201514870734A US2016020951A1 US 20160020951 A1 US20160020951 A1 US 20160020951A1 US 201514870734 A US201514870734 A US 201514870734A US 2016020951 A1 US2016020951 A1 US 2016020951A1
Authority
US
United States
Prior art keywords
file
files
management computer
argument
encapsulated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/870,734
Inventor
Julio Cesar Arpirez Vega
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Development Co LP
Original Assignee
Hewlett Packard Development Co LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Development Co LP filed Critical Hewlett Packard Development Co LP
Priority to US14/870,734 priority Critical patent/US20160020951A1/en
Publication of US20160020951A1 publication Critical patent/US20160020951A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/116Details of conversion of file system types or formats
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • G06F17/30076
    • G06F17/30091
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Definitions

  • Some computer networks use a management computer to configure target computers. For example, in an internet data center, a management computer can configure a large number of target computers to provide data and other information to users across the internet.
  • New operations can be added to the target computers of a network using the management computer.
  • files including code and documentation are used to add operations to the network.
  • the files can include source code, scripts, third-party libraries, and deployment descriptors.
  • the transfer of these files to the management computer for configuring a target computer can be difficult when, for example, a large number of files is involved. Further, since the files for an operation can be located in different directories of the management computer, it can be difficult to modify, update or move these files.
  • An exemplary method comprises accessing an encapsulated file at a management computer.
  • the encapsulated file contains plural files and a deployment descriptor.
  • the deployment descriptor is used to update the management computer about the plural isles.
  • a function is executed using at least one of the plural files.
  • Exemplary embodiments of a management computer include a processor configured to access an encapsulated file containing plural files and a deployment descriptor.
  • the processor is configured to use the deployment descriptor to update the management computer about the plural files and configured to cause execution of a function using at feast one of the plural files.
  • the management computer is configured to store the plural files.
  • An exemplary method comprises accessing an encapsulated file containing plural files at a management computer. At least one of the plural files is an executable file for execution on a target computer. The executable file is extracted from the encapsulated file for transfer to the target computer.
  • FIG. 1 is a flow chart illustrating steps for processing an encapsulated file at a management computer.
  • FIG. 2 illustrates a management computer for processing an encapsulated file.
  • FIG. 3 is a flow chart illustrating an exemplary method of processing an encapsulated file.
  • FIG. 1 is a flow chart illustrating an exemplary method of processing an encapsulated file.
  • the method can be implemented using a computer.
  • a computer-readable medium can contain a program which executes the method for processing an encapsulated file at the management computer (e.g., a computer used to program, control, monitor and/or oversee network operations associated with one or more target computers).
  • the management computer e.g., a computer used to program, control, monitor and/or oversee network operations associated with one or more target computers.
  • an encapsulated file containing plural files and a deployment descriptor is accessed.
  • the encapsulated file can, for example, be constructed by a user at a user interface, and transferred to the management computer.
  • the management computer can then use the encapsulated file to configure (or reconfigure) one or more target computers.
  • a “file” is a collection of data associated with an explicit or implicit file name.
  • An “encapsulated file” is a file that contains more than one file and can be transferred or otherwise manipulated using a single explicit or implicit file name. Examples of encapsulated files include ZIP files, Java Archive files (JAR files) or any other file containing plural files.
  • the encapsulated files can be Plug-in ARchive (PAR) files using a .PAR extension.
  • the PAR files can conform to the JAR format.
  • the plural files can include executable files.
  • a “deployment descriptor” is any file, text, or other information that can be used to update the management computer about the plural files.
  • the encapsulated file is data compressed (e.g., by the user interface). This reduces the size of the encapsulated file (e.g., for the encapsulated file to be transferred over a computer network to the management computer).
  • the encapsulated file can include logic and data for new operations (e.g., operations to be implemented at one or more target computers).
  • the encapsulated file can include Java source code, (.java tiles), generated code including class files, documentation, third-party library, executable files such as scripts, environment variable settings, and a deployment descriptor.
  • the encapsulated file can contain files to add functionality to a management computer.
  • files used for UNIX configuration operations can be included into the encapsulated file.
  • Including such files in an encapsulated file can simplify the transfer of the files and the manipulation of the files at the management computer.
  • accessing the encapsulated file comprises receiving the encapsulated file from another portion of the management computer.
  • the deployment descriptor is used to update the management computer about the plural files.
  • the deployment descriptor can be used to associate a function with one of the plural flies.
  • the deployment descriptor includes an indication of tasks that can be executed using the plural files of the encapsulated file. The indication can be used by the management computer to update the management computer to allow a function, such as a type of target computer configuration.
  • the function can include one or more tasks.
  • the deployment descriptor can indicate the version of the PAR or other encrypted file, name of the PAR or other encrypted file, and/or a deployment mode of the plural files (for example, whether the files are to be copied to a target computer).
  • the deployment descriptor can be used to indicate libraries for use with one or more of the plural files.
  • the deployment descriptor can also be used to indicate locking arguments for the files, tasks or functions indicating which other files, tasks or functions should, for example, be prevented from concurrent operation on a target computer. The use of locking arguments can avoid conflicts in the operation of the functions.
  • the deployment descriptor can define characteristics of the encapsulated file and thus indicate to the management computer how to use the plural files of an encapsulated file. For example, the deployment descriptor can specify whether the executable files for the encapsulated files should be remotely copied to a target computer, or whether if can be assumed that the executable files already exist on the target computer or are already accessible to the target computer.
  • the encapsulated file can be considered to have two main parts: a declarative part including the deployment descriptor and environment variable settings that define configurable behavior; and a procedural part including executable files.
  • a function is executed using at least one of the plural files.
  • the functions can include tasks or combinations of tasks.
  • the functions can include configuration of a target computer or other device.
  • the execution of the function can include the transfer and/or execution of an executable file.
  • Executable files include compiled or uncompiled code that can be executed at the target computer.
  • the executable files can include scripts which are programs written in an interpreted programming language such as Perl, Tcl/Tk, PYTHON, VBA, DOS batch file, COM automation, or any other scripting language. Scripts are not compiled and provide flexibility.
  • the function includes the transfer of an executable file to a target computer.
  • the execution of the function does not require the transfer of an executable file to the target computer.
  • the function can be a remote procedure call, such as a Java RMl call, made to the target computer.
  • the function can be executed without restarting the management computer, in one example, the deployment descriptor is used to update a mapping file or folder.
  • the mapping file or folder associates files from the encrypted file with functions that use these files.
  • the management computer can use the mapping file or folder to find the files needed for a function.
  • the mapping file or folder can be updated without restarting the management computer. This allows a new function to be added without restarting the management computer. For example, with Java based systems, dynamic class loading can be used.
  • the management computer can use the encapsulated file to configure a target computer.
  • the execution of the function can include executing the function on a target computer.
  • FIG. 2 illustrates an exemplary embodiment of a management computer 200 within a system, or network 201 .
  • the management computer 200 comprises a processor 204 and memory 212 .
  • the processor 204 is configured to access an encapsulated file 208 containing plural files and a deployment descriptor 207 .
  • One of the plural files can be an executable file 209 .
  • the processor 204 is configured to use the deployment descriptor 207 to update the management computer 200 about the plural files.
  • the deployment descriptor 207 can be used to associate a function with one of the plural files.
  • the deployment engine software 202 executing at the processor 204 uses the deployment descriptor to update the mapping folder 211 .
  • the processor 204 is configured to cause execution of a function using at least one of the plural files.
  • the processor can be configured to use the encapsulated file to configure a target computer.
  • the processor can initiate the execution of the function on a target computer.
  • the memory 212 is configured to store the plural files.
  • the function is executed without restarting the management computer.
  • the mapping folder 211 can be updated with associations between functions and the plural files as the encapsulated files are received.
  • the management computer 200 can use the updated mapping folder 211 to determine which files are needed for a new function without restarting.
  • One of the plural files can be an executable file which is transferred to a target computer.
  • the system 201 can include the target computer 216 configured to execute the function.
  • the exemplary FIG. 2 system 201 includes a management computer 200 with deployment engine software that can deploy encapsulated files in the management computer.
  • Deployment engine 202 can include software running on a processor 204 at management computer 200 to receive the encapsulated file 208 .
  • the encapsulated file 208 contains plural files, including the executable file 209 , and deployment descriptor 207 .
  • the deployment can include unencapsulating the encapsulated file, and storing the plural files within the management computer.
  • the mapping folder or file 211 can be updated with information concerning the plural files, in one example, the deployment engine software deploys the encapsulated file such that it can be read by resource manager software 210 using an application programing interface (API).
  • API application programing interface
  • the plural files including the executable file are available to resource manager software at the management computer.
  • the resource manager software 210 can access executable files using API 214 .
  • the management computer can use the encapsulated file to configure the target computer.
  • the management computer sends the executable file to one or more of the target computers 218 , 218 , or 220 .
  • the management computer provides instructions to the target computers to execute the executable files.
  • the encapsulated file need not contain an executable file, and an executable file need not be transferred to a target computer.
  • the encapsulated file contains directory information for the plural files (e.g., so that the management computer can determine contents, and/or path and/or file types included in the encapsulated file).
  • An exemplary encapsulated file is as follows:
  • Each file is also associated with a path which can be used by the management computer to construct a directory to store the file.
  • the above example includes a declarative descriptor file, “par.xml”, executable flies such as “addIP.sh” (a script file), Java code such as “UXOS.java”, and class file information such as “UXOS.class”.
  • the deployment descriptor is an XML file.
  • the tags in the XML file can indicate how to interpret the information in the XML file.
  • the deployment descriptor can be used to associate a function with a file in the encapsulated files. For example, the file “addUser.sh” is indicated as being a script that is associated with an “add user” function by the deployment descriptor tags.
  • a Document Type Definition (DTD) is used to define tags in the deployment descriptor XML file.
  • Document Type Definitions are used for XML files and allow the XML files to be correctly parsed for an application.
  • the example of FIG. 2 shows a service builder unit 221 .
  • the service builder unit 221 includes an encapsulated file constructor user interface 222 .
  • This user interface allows users to specify files which can be grouped together to produce an encapsulated file, in one example, the user interface encapsulates the plural flies using a protocol such as the JAP protocol.
  • the encapsulated file can then be transferred to the management computer 200 .
  • the deployment engine 202 takes the encapsulated file and processes if so that it can be accessed by the resource manager software 210 .
  • tags in the deployment descriptor can be used by the resource manager software 210 to identify the functions associated with the plural files.
  • a mapping folder or file 211 can then be constructed to indicate the new functionality.
  • Higher level software 223 can produce instructions across an application programming interface 224 to the resource manager to perform operations that can use the plural files.
  • the higher level software 223 can include a compound task transaction controller.
  • the compound task transaction controller can include a transaction manager, a resource adapter connector, and an Enterprise Java Bean (EJB) unit.
  • the higher level software can also include a user interface workflow manager and a tracking unit.
  • the higher-level software 223 receives requests to execute a compound task including a number of atomic tasks.
  • An exemplary system is described in the patent application “System And Method Of Using A Transactional Unit Comprised Of Transactional Subunits”, by Julio Cesar Arpirez Vega, U.S. Ser. No. 10/375,083, now patented as U.S. Pat. No.
  • the atomic tasks can be undone under the control of the management computer.
  • Code for atomic tasks can be stored within one of the plural files.
  • the management computer sets up a table, such as a mapping tile or folder, to indicate which of the plural files contains the requested atomic task code.
  • the encapsulated file enables a number of related operations.
  • the encapsulated file can enable UNIX operations including add user, remove user and the like. Some of the operations can include steps in which the executable file is transferred from the management computer to a target computer and then the executable file executes at the target computer.
  • the memory can store the plural flies within the encapsulated file such as encapsulated file 213 . Alternately, the plural files can be separately stored in the memory.
  • the encapsulated file 208 contains directory information, as already mentioned, that allows the construction of a directory within the memory 212 to store the plural files.
  • the management computer can use the encapsulated file to configure the target computer. In one example, the configuring of the target computer causes the executable file to execute at the target computer.
  • the encapsulated file 208 is data compressed. Data compression reduces the size of the encapsulated file and thus can reduce the amount of data transferred across a computer network to the management computer.
  • the resource manager software 210 at the processor 204 is used to transfer the executable file to the target computer 220 .
  • Any suitable file transfer protocol can be used.
  • the executable file is transferred during a shell session, and the management computer can use the shell session to control the target computer.
  • the management computer stores an indication of whether the target computer has the executable file. If the target computer already has the executable file, the executable file does not have to be transferred in the shell session.
  • the executable file can foe transferred along with environment variables for use in running the executable file at the target computer.
  • deployment engine 202 is used to deploy the encapsulated file 208 at the management computer.
  • the target computer 220 can be configured to execute the executable file transferred from the management computer.
  • a system specification for encapsulated files can foe followed such that new options can be added into the management computer using an encapsulated file following the system specification.
  • the creation of encapsulated files that comply with the system specification can foe aided by the use of the service builder unit
  • the system specification can be associated with the PAR format.
  • the resource manager software is informed when an encapsulated file has been loaded into the management computer.
  • the resource manager software can extend the capabilities of the system by adding new operations without restarting. Enabling operations with an encapsulated file means that the resource manager software code need not be changed as new operations are added. As long as the operations enabled by the encapsulated files conform to the system specification, any operation can be invoked by the resource manager without code changes to the resource manager software.
  • Service builder software of unit 221 can use the encapsulated file constructor user interface 222 for the generation of the files and the packing of the files into the encapsulated files.
  • Use of an encapsulated file permits modification of the environment variables and deployment descriptor without recompiling the source code. Simply by modifying these attributes using the user interface and redeploying the new encapsulated file, characteristics of the system can be changed without a recompliation of source code.
  • Customers can use the user interface to modify the operations enabled by the encapsulated file without being concerned with compilation issues or modification of source code to change certain attributes.
  • the system 201 comprises an internet data center.
  • the internet data center can provide services to users across the internet.
  • One or more target computers can be configured by the management computer as described herein to provide such services.
  • FIG. 3 is a flow chart illustrating an exemplary method of processing an encapsulated file at a management computer, in step 302 , an encapsulated file containing plural files is accessed.
  • at least one of the plural files contains an executable file for execution on a target computer.
  • the executable file is extracted from the encapsulated file for transfer to the target computer.
  • the encapsulated file is unencapsulated and the plural flies, including the executable file, are stored at a location where the executable file can be transferred to the target computer.
  • the unencapsulation can be performed following a standard such as the ZIP or JAR standards.
  • the plural files can be kept within the encapsulated file.
  • the executable file can be extracted from the encapsulated file.
  • the accessing of the encapsulated file includes receiving the encapsulated file from another location.
  • the plural files can be encapsulated into the encapsulated file and then provided to the management computer.
  • the encapsulation can be performed using software that constructs a ZIP or JAR file.
  • step 308 the executable file is transferred to the target computer.
  • step 308 the executable file is executed at the target computer.
  • the execution of the executable file at the target computer can be part of the configuration of the target computer.

Abstract

An encapsulated file is accessed at a management computer. The encapsulated file contains plural files and a deployment descriptor. The deployment descriptor is used to update the management computer about the plural files. A function is execute using at least one of the plural files.

Description

    RELATED APPLICATIONS
  • The patent applications “System And Method Of Using A Transactional Unit Comprised Of Transactional Sub-units”, by Julio Cesar Arpirez Vega, U.S. Ser. No. 10/375,083, now patented as U.S. Pat. No. 7,827,480, and “Method For Managing Plurality Of Target Computers Using A Management Computer”, by Julio Cesar Arpirez Vega and Miguel Murillo Condon, U.S. Ser. No. 10/375,176, now published as U.S. Patent Application Publication No. 20040172487, which are filed concurrently with the present application are incorporated herein by reference.
  • BACKGROUND
  • Some computer networks use a management computer to configure target computers. For example, in an internet data center, a management computer can configure a large number of target computers to provide data and other information to users across the internet.
  • New operations can be added to the target computers of a network using the management computer. In one example, files including code and documentation are used to add operations to the network. The files can include source code, scripts, third-party libraries, and deployment descriptors. The transfer of these files to the management computer for configuring a target computer can be difficult when, for example, a large number of files is involved. Further, since the files for an operation can be located in different directories of the management computer, it can be difficult to modify, update or move these files.
  • SUMMARY
  • Exemplary methods are disclosed for processing an encapsulated file at a management computer. An exemplary method comprises accessing an encapsulated file at a management computer. The encapsulated file contains plural files and a deployment descriptor. The deployment descriptor is used to update the management computer about the plural isles. A function is executed using at least one of the plural files.
  • Exemplary embodiments of a management computer include a processor configured to access an encapsulated file containing plural files and a deployment descriptor. The processor is configured to use the deployment descriptor to update the management computer about the plural files and configured to cause execution of a function using at feast one of the plural files. The management computer is configured to store the plural files.
  • Exemplary methods are disclosed for processing an encapsulated file at a management computer. An exemplary method comprises accessing an encapsulated file containing plural files at a management computer. At least one of the plural files is an executable file for execution on a target computer. The executable file is extracted from the encapsulated file for transfer to the target computer.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The accompanying drawings provide visual representations which will be used to more fully describe the representative embodiments disclosed herein and can be used by those skilled in the art to better understand them and their inherent advantages. In these drawings, like reference numerals identity corresponding elements and:
  • FIG. 1 is a flow chart illustrating steps for processing an encapsulated file at a management computer.
  • FIG. 2 illustrates a management computer for processing an encapsulated file.
  • FIG. 3 is a flow chart illustrating an exemplary method of processing an encapsulated file.
  • DETAILED DESCRIPTION
  • FIG. 1 is a flow chart illustrating an exemplary method of processing an encapsulated file. The method can be implemented using a computer. A computer-readable medium can contain a program which executes the method for processing an encapsulated file at the management computer (e.g., a computer used to program, control, monitor and/or oversee network operations associated with one or more target computers).
  • In step 102, an encapsulated file containing plural files and a deployment descriptor is accessed. The encapsulated file can, for example, be constructed by a user at a user interface, and transferred to the management computer. The management computer can then use the encapsulated file to configure (or reconfigure) one or more target computers.
  • As used herein, a “file” is a collection of data associated with an explicit or implicit file name. An “encapsulated file” is a file that contains more than one file and can be transferred or otherwise manipulated using a single explicit or implicit file name. Examples of encapsulated files include ZIP files, Java Archive files (JAR files) or any other file containing plural files. The encapsulated files can be Plug-in ARchive (PAR) files using a .PAR extension. The PAR files can conform to the JAR format. The plural files can include executable files. As used herein, a “deployment descriptor” is any file, text, or other information that can be used to update the management computer about the plural files.
  • In one embodiment, the encapsulated file is data compressed (e.g., by the user interface). This reduces the size of the encapsulated file (e.g., for the encapsulated file to be transferred over a computer network to the management computer).
  • The encapsulated file can include logic and data for new operations (e.g., operations to be implemented at one or more target computers). For example, the encapsulated file can include Java source code, (.java tiles), generated code including class files, documentation, third-party library, executable files such as scripts, environment variable settings, and a deployment descriptor.
  • The encapsulated file can contain files to add functionality to a management computer. For example, files used for UNIX configuration operations can be included into the encapsulated file. Including such files in an encapsulated file (e.g., in a single file) can simplify the transfer of the files and the manipulation of the files at the management computer. In one example, accessing the encapsulated file comprises receiving the encapsulated file from another portion of the management computer.
  • In step 104, the deployment descriptor is used to update the management computer about the plural files. The deployment descriptor can be used to associate a function with one of the plural flies. In one embodiment, the deployment descriptor includes an indication of tasks that can be executed using the plural files of the encapsulated file. The indication can be used by the management computer to update the management computer to allow a function, such as a type of target computer configuration. The function can include one or more tasks.
  • The deployment descriptor can indicate the version of the PAR or other encrypted file, name of the PAR or other encrypted file, and/or a deployment mode of the plural files (for example, whether the files are to be copied to a target computer). The deployment descriptor can be used to indicate libraries for use with one or more of the plural files. The deployment descriptor can also be used to indicate locking arguments for the files, tasks or functions indicating which other files, tasks or functions should, for example, be prevented from concurrent operation on a target computer. The use of locking arguments can avoid conflicts in the operation of the functions.
  • The deployment descriptor can define characteristics of the encapsulated file and thus indicate to the management computer how to use the plural files of an encapsulated file. For example, the deployment descriptor can specify whether the executable files for the encapsulated files should be remotely copied to a target computer, or whether if can be assumed that the executable files already exist on the target computer or are already accessible to the target computer. In one example, the encapsulated file can be considered to have two main parts: a declarative part including the deployment descriptor and environment variable settings that define configurable behavior; and a procedural part including executable files.
  • In step 108, a function is executed using at least one of the plural files. The functions can include tasks or combinations of tasks. The functions can include configuration of a target computer or other device. The execution of the function can include the transfer and/or execution of an executable file. Executable files include compiled or uncompiled code that can be executed at the target computer. The executable files can include scripts which are programs written in an interpreted programming language such as Perl, Tcl/Tk, PYTHON, VBA, DOS batch file, COM automation, or any other scripting language. Scripts are not compiled and provide flexibility.
  • In one embodiment, the function includes the transfer of an executable file to a target computer. The execution of the function does not require the transfer of an executable file to the target computer. For example, the function can be a remote procedure call, such as a Java RMl call, made to the target computer.
  • After the encapsulated file is received, the function can be executed without restarting the management computer, in one example, the deployment descriptor is used to update a mapping file or folder. The mapping file or folder associates files from the encrypted file with functions that use these files. The management computer can use the mapping file or folder to find the files needed for a function. When an encrypted file is received, the mapping file or folder can be updated without restarting the management computer. This allows a new function to be added without restarting the management computer. For example, with Java based systems, dynamic class loading can be used.
  • The management computer can use the encapsulated file to configure a target computer. The execution of the function can include executing the function on a target computer.
  • FIG. 2 illustrates an exemplary embodiment of a management computer 200 within a system, or network 201. The management computer 200 comprises a processor 204 and memory 212. The processor 204 is configured to access an encapsulated file 208 containing plural files and a deployment descriptor 207. One of the plural files can be an executable file 209. The processor 204 is configured to use the deployment descriptor 207 to update the management computer 200 about the plural files. The deployment descriptor 207 can be used to associate a function with one of the plural files. In one embodiment, the deployment engine software 202 executing at the processor 204 uses the deployment descriptor to update the mapping folder 211.
  • The processor 204 is configured to cause execution of a function using at least one of the plural files. For example, the processor can be configured to use the encapsulated file to configure a target computer. The processor can initiate the execution of the function on a target computer. The memory 212 is configured to store the plural files.
  • In one embodiment, after the encapsulated file is received, the function is executed without restarting the management computer. The mapping folder 211 can be updated with associations between functions and the plural files as the encapsulated files are received. The management computer 200 can use the updated mapping folder 211 to determine which files are needed for a new function without restarting.
  • One of the plural files can be an executable file which is transferred to a target computer. The system 201 can include the target computer 216 configured to execute the function.
  • The exemplary FIG. 2 system 201 includes a management computer 200 with deployment engine software that can deploy encapsulated files in the management computer. Deployment engine 202 can include software running on a processor 204 at management computer 200 to receive the encapsulated file 208. The encapsulated file 208 contains plural files, including the executable file 209, and deployment descriptor 207. The deployment can include unencapsulating the encapsulated file, and storing the plural files within the management computer. Additionally, the mapping folder or file 211 can be updated with information concerning the plural files, in one example, the deployment engine software deploys the encapsulated file such that it can be read by resource manager software 210 using an application programing interface (API).
  • In an exemplary embodiment, the plural files including the executable file are available to resource manager software at the management computer. In FIG. 2, the resource manager software 210 can access executable files using API 214.
  • The management computer can use the encapsulated file to configure the target computer. In the FIG. 2 example, the management computer sends the executable file to one or more of the target computers 218, 218, or 220. In one example, the management computer provides instructions to the target computers to execute the executable files. The encapsulated file need not contain an executable file, and an executable file need not be transferred to a target computer.
  • In an exemplary embodiment, the encapsulated file contains directory information for the plural files (e.g., so that the management computer can determine contents, and/or path and/or file types included in the encapsulated file). An exemplary encapsulated file is as follows:
  • C:\WINDOWS\TEMP\UXOS.par
    Name Size Path
    par.xml 10,975 manifest\
    HP-UXiamakekey 20,480 files\
    SunOSiamakekey 7,060 files\
    addChmod.sh 819 scripts\
    addDir.pl 7,290 scripts\
    addIP.sh 12,873 scripts\
    addUser.sh 8,032 scripts\
    addUserToGroup.pl 6,623 scripts\
    createGroup.pl 2,705 scripts\
    disFTPpub.sh 1,207 scripts\
    enFTPpub.sh 1,935 scripts\
    IAPerlCommon.pm 14,121 scripts\
    libscripts 5,788 scripts\
    removeDir.pl 2,522 scripts\
    removeGroup.pl 2,716 scripts\
    rmIP.sh 7,146 scripts\
    rmUser.sh 1,543 scripts\
    rmUserFmGroup.pl 7,374 scripts\
    UXOS.class 6,468 classes\com\hp\ov\activator\plugins\
    UXOS.java 49,669 src\com\hp\ov\activator\plugins\

    The encapsulated tile can contain a number of tiles, each having a file name. Each file is also associated with a path which can be used by the management computer to construct a directory to store the file. The above example includes a declarative descriptor file, “par.xml”, executable flies such as “addIP.sh” (a script file), Java code such as “UXOS.java”, and class file information such as “UXOS.class”.
  • Below is an example of the deployment descriptor file, “par.xml”.
  • < ?xml version=“ 1.0” encoding= “UTF-8”? >
    < !--> <Copyright (c) 2002 Hewlett-Packard Company. All Rights
    Reserved-->
    < Plugin version= “ 1. O” :>
    < !--
    ***********************************************
    Plugin Archive Manifest File.
    > <hp Open View service activator.
    ***********************************************
    -->
    <Name> UXOS</Name>
    <Version major=“ I” minor= “O” revision= “O” I>
    <Description> A common set of Perl functions.
    < /Description >
    < ClassName > com. hp. ov. activator. plugins. UXOS< /ClassName >
    < NameSpace type= “GLOBAL” I>
    <DeploymentModel >ON_DEMAND< /DeploymentModel >
    <Lock>
    <Argument> 1 < J Argument>
    </Lock>
    < Configuration>
    < Param name=“FILENOLIST” value=“//opt /var /usr /home /users” I>
    <Param name=“LOGGING” value= “I” I>
    </Configuration>
    <!--Atomic tasks-->
    <Atomic Tasks>
    <Task exported= “true” execution= “ON_LINE” >
    <Name> UXOS_add User< /Name>
    <Argument> machine< /Argument>
    < Argument> login< /Argument>
    <Argument> passwd </Argument>
    < Argument > uid < /Argument>
    < Argument> homedir </Argument>
    <Argument> group< /Argument>
    <Description> Use the UXOS_add User atomic task to add a user.
    < /Description>
    </Task>
    <Task exported=“true” execution= “ON_LINE” >
    <Name> UXOS_rmUser</Name>
    <Argument> machine< /Argument>
    <Argument> login< /Argument>
    <Argument> passwd </Argument>
    <Argument> uid </Argument>
    < Description> Use the UXOS_rm User atomic task to remove a user.
    < /Description>
    </Task>
    <Task exported= “true” execution= “ON_LINE” >
    <Name> UXOS_createGroup < /Name >
    <Argument> machine< /Argument>
    < Argument> group< /Argument>
    < Description> Use the UXOS_createGroup atomic task to create a new
    group. < /Description >
    </Task>
    <Task exported= “true” execution= “ON_LINE” >
    <Name> UXOS_removeGroup</Name>
    <Argument> machine< /Argument>
    <Argument> group< /Argument>
    < Description >Use the UXOS_removeGroup atomic task to remove a
    group. < /Description>
    </Task>
    <Task exported=“true” execution= “ON_LINE”>
    <Name> UXOS_addUserToGroup </Name>
    <Argument> machine< /Argument>
    < Argument> user < /Argument>
    < Argument> group< /Argument>
    <Description> Use the UXOS_addUserToGroup atomic task to add a
    user to a group.< /Description>
    </Task>
    <Task exported= “true” execution= “ON LINE”>
    <Name> UXOS_rmUserFmGroup</Name>
    <Argument> machine< /Argument>
    <Argument> user< /Argument>
    <Argument> group </Argument>
    <Description> Use the UXOS_rmUserFmGroup atomic task to remove a
    user from a group.< !pescription>
    </Task>
    <Task exported= “true” execution= “ON LINE”>
    <Name> UXOS_removeDir </Name>
    <Argument> machine< /Argument>
    <Argument> dirPath </Argument>
    < Description> Use the UX OS_ remove Dir atomic task to remove a
    directory
    structure. < /Description>
    </Task>
    <Task exported= “true” execution=“ON_LINE” >
    <Name> UXOS_addAliasIP </Name>
    <Argument> machine< /Argument>
    < Argument> ipaddr </Argument>
    < Argument> itfname </Argument>
    < Argument> subnetmask < /Argument>
    < Argument> broadcastaddr </Argument>
    <Description> Use the UXOS_addAliasIP atomic task to add an alias IP
    address to an interface. < /Description>
    </Task>
    <Task exported= “true” execution= “ON LINE”>
    <Name> UXOS_rmAliasIP </Name>
    < Argument > machine </Argument >
    < Argument> ipaddr < /Argument>
    <Argument> itfname < /Argument>
    <Argument> subnetmask </Argument>
    < Argument> broadcastaddr < /Argument>
    <Description> Use the UXOS_rmAliasIP atomic task to remove an
    alias IP address from an interface. < /Description>
    </Task>
    <Task exported= “true” execution= “ON_LINE” >
    <Name> UXOS_chmod </Name>
    <Argument> machine< /Argument>
    <Argument> permissions< /Argument>
    < Argument> object< /Argument>
    < Description> Use the UX OS_ chmod atomic task to change the
    permissions
    on a directory or a file. </Description>
    </Task>
    <Task exported= “true” execution= “0 N LINE” >
    <Name> UXOS_enFTPUser </Name>
    <Argument> machine< /Argument>
    <Argument> username </Argument>
    <Description> Use the UXOS_enFTPUser atomic taks to allow ftp
    access to a user's account. < /Description>
    </Task>
    <Task exported=“ true” execution=“ 0 N_LINE” >
    <Name> UXOS_disFTPUser </Name>
    <Argument> machine< /Argument>
    <Argument> username </Argument>
    <Description> Use the UXOS_disFTPU ser atomic task to deny ftp
    access to a user's account. </Description>
    </Task>
    <Task exported= “true” execution= “ON_ LINE”>
    <Name> UXOS_addUserNIS</Name>
    < Argument> machine< /Argument>
    <Argument> login< /Argument>
    <Argument> passwd </Argument>
    <Argument> uid </Argument>
    < Argument> homedir </Argument>
    <Argument> group< /Argument>
    <Description> Use the UXOS_addU ser NIS atomic task to add a
    user to the NIS directory service. < /Description >
    </Task>
    <Task exported= “true” execution= “0 N _LINE” >
    <Name> UXOS_rmUserNIS</Name>
    < Argument> machine < /Argument>
    < Argument> login< /Argument>
    <Description> Use the UXOS_rmUserNIS atomic task to remove a user
    from the NIS directory service. </Description>
    </Task>
    <Task exported= “true” execution= “ON_LINE”>
    <Name> UXOS_createGroupNIS </Name>
    <Argument> machine< /Argument>
    <Argument> group< /Argument>
    <Description> Use the UXOS_createGroupNIS atomic task to add a new
    group to the NIS directory service.< /Description>
    </Task>
    <Task exported= “true” execution= “ON_ LINE”>
    <Name> UXOS_removeGroupNIS </Name>
    < Argument> machine< /Argument>
    <Argument> group< I Argument>
    <Description> Use the UXOS_removeGroupNIS atomic task to
    remove a group from the NIS directory service.< /Description>
    </Task>
    <Task exported= “true” execution= “ON_LINE” >
    <Name> UXOS_addUserToGroupNIS </Name>
    < Argument> machine < /Argument>
    <Argument> group< /Argument>
    <Argument> login< /Argument>
    <Description> Use the UXOS_addUserToGroupNIS atomic task to add a
    user to an existing group in the NIS directory service. </Description>
    </Task>
    <Task exported= “true” execution= “ON_LINE” >
    <Name> UXOS_rmUserFmGroupNIS </Name>
    <Argument> machine< /Argument>
    <Argument> group< /Argument>
    < Argument> login< /Argument>
    <Description> Use the UXOS_rmUserFmGroupNIS atomic task to
    remove a user from an existing group in the NIS directory
    service. </Description>
    </Task>
    <Task exported= “true” execution= “ON LINE”>
    <Name> UXOS_setDiskQuota </Name>
    <Argument> machine< /Argument>
    <Argument> login< /Argument>
    < Argument> filesystem </Argument >
    <Argument> softblocks </Argument>
    < Argument> hardblocks < /Argument>
    <Argument> softinodes </Argument>
    < Argument> hardinodes < I Argument >
    <Description> Use the UXOS_setDiskQuota atomic task to add a
    disk quota for a user on a given file system. </Description>
    </Task>
    <Task exported= “true” execution= “ON_ LINE”>
    <Name> UXOS_addExport </Name>
    <Argument> machine< /Argument>
    < Argument> directory </Argument>
    <Argument> hostname </Argument>
    <Description> Use the UXOS_addExport atomic task to allow a host to
    mount a directory or file.< /Description>
    </Task>
    <Task exported= “true” execution= “ON_LINE” >
    <Name> UXOS_removeExport </Name>
    < Argument> machine< /Argument>
    < Argument> directory < /Argument>
    < Argument> hostname < /Argument>
    <Description> Use the UXOS_removeExport atomic task to deny a host
    from mounting the specified directory or file.< /Description>
    </Task>
    <Task exported= “true” execution= “ON_LINE” >
    <Name> UXOS_mountNFS </Name>
    <Argument> machine </Argument>
    < Argument> hostname < /Argument>
    <Argument> path< /Argument>
    <Argument> directory< /Argument>
    <Description> Use the UXOS_mountNFS atomic task to mount
    a remote NFS directory. </Description>
    </Task>
    <Task exported= “true” execution= “ON_ LINE”>
    <Name> UXOS_umountNFS </Name>
    <Argument> machine< /Argument>
    < Argument> directory< /Argument>
    <Description> Use the UXOS_umountNFS atomic task to
    unmount a remote NFS directory. < /Description>
    </Task>
    </AtomicTasks >
    < !--Scripts section-- >
    <Scripts>
    <Script name= “IAPerlCommon” file= “IAPerlCommon.pm” >
    < Description> A common set of Perl functions.
    </Description>
    </Script>
    <Script name= “addUser” file= “addUser.sh” interpreter= “ksh” >
    <Description> Adds a User.
    < /Description>
    </Script>
    < Script name= “rm User” file= “rm User. sh” interpreter= “ksh” >
    < Description> Removes a User.
    < /Description>
    </Script>
    <Script name=“ createGroup” file=“ createGroup. pl” interpreter=
    “perl” >
    < Description> Creates a group.
    < /Description>
    </Script>
    <Script name= “removeGroup” file= “removeGroup.pl” interpreter=
    “perl” >
    < Description> Removes a group.
    < /Description>
    </Script>
    <Script name= “addUserToGroup” file= “addUserToGroup.pl”
    interpreter= “perl” >
    < Description> Adds a User to a group.
    < /Description>
    </Script>
    <Script name= “rmUserFmGroup” file= “rmUserFmGroup.pl”
    interpreter= “perl” >
    <Description> Removes a User from a group.
    < /Description >
    </Script>
    < Script name= “add Dir” file= “addDir. pl” interpreter=“perl” >
    <Description> Creates a directory structure.
    < /Description>
    </Script>
    <Script name= “removeDir” file= “removeDir.pl” interpreter= “perl” >
    < Description> Removes a directory structure.
    </Description>
    </Script>
    <Script name= “addIP” file= “addIP.sh” interpreter= “ksh” >
    <Description> Adds an alias IP address to an interface.
    </Description>
    </Script>
    <Script name= “rmIP” file= “rmIP.sh” interpreter= “ksh” >
    < Description > Removes an alias IP address from an interface.
    </Description>
    </Script>
    <Script name= “addChmod” file= “addChmod.sh” interpreter= “ksh” >
    <Description> Change mode on a file.
    < /Description>
    </Script>
    <Script name= “disFTPpub” file= “disFTPpub.sh” interpreter= “ksh” >
    <Description> Disable FTP access for a user.
    < /Description>
    </Script>
    <Script name= “enFTPpub” file= “enFTPpub.sh” interpreter= “ksh” >
    < Description > Enable FTP access for a user.
    < /Description>
    </Script>
    < Script name= “libscripts” file= “libscripts” >
    < Description> Common shell functions.
    < /Description>
    </Script>
    </Scripts>
    <!--Files section-->
    <Files>
    <File name= “SunOSiamakekey 11 file= ”SunOSiamakekey 11 I>
    <File name= “HP-UXiamakekey” file= 11HP-UXiamakekey” I>
    </Files>
    </Plugin>
  • In the above example, the deployment descriptor is an XML file. The tags in the XML file can indicate how to interpret the information in the XML file. In one example, the deployment descriptor can be used to associate a function with a file in the encapsulated files. For example, the file “addUser.sh” is indicated as being a script that is associated with an “add user” function by the deployment descriptor tags.
  • In one example, a Document Type Definition (DTD), is used to define tags in the deployment descriptor XML file. Document Type Definitions are used for XML files and allow the XML files to be correctly parsed for an application.
  • The example of FIG. 2 shows a service builder unit 221. The service builder unit 221 includes an encapsulated file constructor user interface 222. This user interface allows users to specify files which can be grouped together to produce an encapsulated file, in one example, the user interface encapsulates the plural flies using a protocol such as the JAP protocol. The encapsulated file can then be transferred to the management computer 200. In one example, the deployment engine 202 takes the encapsulated file and processes if so that it can be accessed by the resource manager software 210. For example, tags in the deployment descriptor can be used by the resource manager software 210 to identify the functions associated with the plural files. A mapping folder or file 211 can then be constructed to indicate the new functionality. Higher level software 223 can produce instructions across an application programming interface 224 to the resource manager to perform operations that can use the plural files.
  • The higher level software 223 can include a compound task transaction controller. The compound task transaction controller can include a transaction manager, a resource adapter connector, and an Enterprise Java Bean (EJB) unit. The higher level software can also include a user interface workflow manager and a tracking unit. In one example, the higher-level software 223 receives requests to execute a compound task including a number of atomic tasks. An exemplary system is described in the patent application “System And Method Of Using A Transactional Unit Comprised Of Transactional Subunits”, by Julio Cesar Arpirez Vega, U.S. Ser. No. 10/375,083, now patented as U.S. Pat. No. 7,827,480, (Attorney docket number 600203544) filed concurrently with the present application and incorporated herein by reference. For example, the atomic tasks can be undone under the control of the management computer. Code for atomic tasks can be stored within one of the plural files. In one example, the management computer sets up a table, such as a mapping tile or folder, to indicate which of the plural files contains the requested atomic task code.
  • In one example, the encapsulated file enables a number of related operations. For example, the encapsulated file can enable UNIX operations including add user, remove user and the like. Some of the operations can include steps in which the executable file is transferred from the management computer to a target computer and then the executable file executes at the target computer.
  • The memory can store the plural flies within the encapsulated file such as encapsulated file 213. Alternately, the plural files can be separately stored in the memory. In one example, the encapsulated file 208 contains directory information, as already mentioned, that allows the construction of a directory within the memory 212 to store the plural files. The management computer can use the encapsulated file to configure the target computer. In one example, the configuring of the target computer causes the executable file to execute at the target computer.
  • In one embodiment, the encapsulated file 208 is data compressed. Data compression reduces the size of the encapsulated file and thus can reduce the amount of data transferred across a computer network to the management computer.
  • In an exemplary embodiment, the resource manager software 210 at the processor 204 is used to transfer the executable file to the target computer 220. Any suitable file transfer protocol can be used. In one example, the executable file is transferred during a shell session, and the management computer can use the shell session to control the target computer.
  • In one example, the management computer stores an indication of whether the target computer has the executable file. If the target computer already has the executable file, the executable file does not have to be transferred in the shell session. The executable file can foe transferred along with environment variables for use in running the executable file at the target computer.
  • In the example of FIG. 2, deployment engine 202 is used to deploy the encapsulated file 208 at the management computer. The target computer 220 can be configured to execute the executable file transferred from the management computer.
  • A system specification for encapsulated files can foe followed such that new options can be added into the management computer using an encapsulated file following the system specification. The creation of encapsulated files that comply with the system specification can foe aided by the use of the service builder unit For example, the system specification can be associated with the PAR format.
  • In one example, the resource manager software is informed when an encapsulated file has been loaded into the management computer. The resource manager software can extend the capabilities of the system by adding new operations without restarting. Enabling operations with an encapsulated file means that the resource manager software code need not be changed as new operations are added. As long as the operations enabled by the encapsulated files conform to the system specification, any operation can be invoked by the resource manager without code changes to the resource manager software.
  • Service builder software of unit 221 can use the encapsulated file constructor user interface 222 for the generation of the files and the packing of the files into the encapsulated files. Use of an encapsulated file permits modification of the environment variables and deployment descriptor without recompiling the source code. Simply by modifying these attributes using the user interface and redeploying the new encapsulated file, characteristics of the system can be changed without a recompliation of source code. Customers can use the user interface to modify the operations enabled by the encapsulated file without being concerned with compilation issues or modification of source code to change certain attributes.
  • In one example, the system 201 comprises an internet data center. The internet data center can provide services to users across the internet. One or more target computers can be configured by the management computer as described herein to provide such services.
  • FIG. 3 is a flow chart illustrating an exemplary method of processing an encapsulated file at a management computer, in step 302, an encapsulated file containing plural files is accessed. According to an exemplary embodiment, at least one of the plural files contains an executable file for execution on a target computer.
  • In step 304, the executable file is extracted from the encapsulated file for transfer to the target computer. In an exemplary embodiment, the encapsulated file is unencapsulated and the plural flies, including the executable file, are stored at a location where the executable file can be transferred to the target computer. The unencapsulation can be performed following a standard such as the ZIP or JAR standards.
  • Alternatively, the plural files can be kept within the encapsulated file. Before the transfer of the executed file to the target computer, the executable file can be extracted from the encapsulated file.
  • In an exemplary embodiment, the accessing of the encapsulated file includes receiving the encapsulated file from another location. The plural files can be encapsulated into the encapsulated file and then provided to the management computer. The encapsulation can be performed using software that constructs a ZIP or JAR file.
  • In step 308, the executable file is transferred to the target computer. In step 308, the executable file is executed at the target computer. The execution of the executable file at the target computer can be part of the configuration of the target computer.
  • It will be appreciated by those of ordinary skill in the art that the system and method can be embodied in other specific forms without departing from the spirit or essential character thereof. The presently disclosed embodiments are therefore considered in all respects to be illustrative and not restrictive. The scope of the system and method is indicated by the appended claims rather than the foregoing description, and all changes which come within the meaning and range of equivalents thereof are intended to be embraced therein.

Claims (14)

1-26. (canceled)
27. A method comprising:
receiving, at a management computer, an encapsulated file including a plurality of files and a deployment descriptor, said deployment descriptor including information describing a plurality of configuration tasks performed using the plurality of files;
using, by the management computer, the deployment descriptor extracted from the encapsulated file to identify associations between the plurality of configuration tasks and the plurality of files extracted from the encapsulated file;
updating, by the management computer, a mapping element to include the associations;
using, by the management computer, the mapping element to find at least one of the plurality of files extracted from the encapsulated file needed for a first configuration task of the plurality of configuration tasks; and
performing, by the management computer, a first configuration task of the plurality of configuration tasks using the identified associations and the plurality of files extracted from the encapsulated file to reconfigure a target computer other than the management computer.
28. The method of claim 28, wherein the plurality of files includes an executable file, and performing the first configuration task includes said management computer executing said executable file.
29. The method of claim 27, wherein said executing includes making a remote procedure call to said target computer.
30. The method of claim 28, wherein the plurality of files includes an executable file, and performing the first configuration task includes:
said management computer transferring said executable file to said target computer; and
causing said target computer to execute said executable file.
31. The method of claim 29, wherein said extracting said executable file from said encapsulated file occurs before said executable file is transferred to said target computer.
32. The method of claim 28, comprising:
extracting, by the management computer, the plurality of files and the deployment descriptor from said encapsulated file; and
storing, on the management computer, the plurality of files extracted from the encapsulated file.
33. A system comprising non-transitory computer-readable storage media, said media being encoded with code configured to, when executed by a management computer having one or more processors, cause the management computer to implement a method including:
determining a configuration function to be applied to a target computer other than said management computer;
Identifying required files required by said function, said identifying including accessing, by the management computer, an encapsulated file containing plural contained files and a deployment descriptor, said deployment descriptor including information associating some of said plural contained files with a configuration function requiring that contained file the information describing a plurality of configuration tasks performed using the plural contained files;
identifying, using the deployment descriptor extracted from the encapsulated isle, a plurality of associations between the plurality of configuration tasks and the plural contained files extracted from the encapsulated file;
updating, by the management computer, a mapping element to include the associations;
using, by the management computer, the mapping element to find at least one of the plurality of files extracted from the encapsulated file needed for a first configuration task of the plurality of configuration tasks; and
performing, by said management computer, a first configuration task of the plurality of configuration tasks using the identified associations and the plural contained files extracted from the encapsulated file applying said function using said required files so as to reconfigure said target computer.
34. The system of claim 32, wherein said plural contained files including an executable file that, when executed by one or more processors, causes said management computer to make a remote procedure call to said target computer.
35. The system of claim 32, further comprising a deployment engine for processing said encapsulated file so that it can be accessed by said management computer.
38. The system of claim 32, wherein said plural contained files including an executable file and said code provides for transferring said executable file to said target computer for execution by said target computer to effect configuration of said target computer.
37. The system of claim 35, wherein said extracting said executable file from said encapsulated file occurs before the encapsulated file is transferred to said target computer.
38. The system of claim 32, further comprising said management computer, said management computer including said storage media.
39. The system of claim 32, said code provides for:
said management computer extracting the deployment descriptor and the plural contained files; and
storing, on the management computer, the plural contained files extracted from the encapsulated file.
US14/870,734 2003-02-28 2015-09-30 Managing target computer using encapsulated file Abandoned US20160020951A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/870,734 US20160020951A1 (en) 2003-02-28 2015-09-30 Managing target computer using encapsulated file

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/375,198 US9164750B2 (en) 2003-02-28 2003-02-28 Managing target computer using encapsulated file
US14/870,734 US20160020951A1 (en) 2003-02-28 2015-09-30 Managing target computer using encapsulated file

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/375,198 Continuation US9164750B2 (en) 2003-02-28 2003-02-28 Managing target computer using encapsulated file

Publications (1)

Publication Number Publication Date
US20160020951A1 true US20160020951A1 (en) 2016-01-21

Family

ID=32907769

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/375,198 Active 2028-11-14 US9164750B2 (en) 2003-02-28 2003-02-28 Managing target computer using encapsulated file
US14/870,734 Abandoned US20160020951A1 (en) 2003-02-28 2015-09-30 Managing target computer using encapsulated file

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/375,198 Active 2028-11-14 US9164750B2 (en) 2003-02-28 2003-02-28 Managing target computer using encapsulated file

Country Status (1)

Country Link
US (2) US9164750B2 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040172487A1 (en) * 2003-02-28 2004-09-02 Arpirez Julio Cesar Method for managing plurality of target computers using a management computer
US7797697B2 (en) * 2004-05-05 2010-09-14 Bea Systems, Inc. System and method for deploying applications with library modules
US20050251495A1 (en) * 2004-05-06 2005-11-10 Bea Systems, Inc. System and method for unified file management
US7730112B2 (en) * 2004-05-10 2010-06-01 Bea Systems Inc. Scoped applications
US7428733B2 (en) * 2004-05-13 2008-09-23 Bea Systems, Inc. System and method for custom module creation and deployment
US7814484B2 (en) * 2004-05-14 2010-10-12 Bea Systems, Inc. System and method for web application extensibility
US8572494B2 (en) * 2004-07-14 2013-10-29 International Business Machines Corporation Framework for development and customization of web services deployment descriptors
US8077338B2 (en) * 2008-02-27 2011-12-13 Arcsoft, Inc. Method for online printing digital project
US9755886B2 (en) * 2009-09-30 2017-09-05 Micro Focus Software Inc. Techniques for conditional name resolution and configuration
US20140380300A1 (en) * 2013-06-25 2014-12-25 Bank Of America Corporation Dynamic configuration framework
CN106909353B (en) * 2015-12-22 2019-12-13 阿里巴巴集团控股有限公司 Application program running method and device
CN108228208A (en) * 2016-12-22 2018-06-29 北京神州泰岳软件股份有限公司 A kind of dynamic updating method and device of JAVA application programs
CN109683924B (en) * 2017-10-18 2022-02-25 株洲中车时代电气股份有限公司 Application software upgrading method, system, equipment and computer readable storage medium
US10430179B1 (en) * 2019-03-07 2019-10-01 Capital One Services, Llc Methods and systems for managing application configurations

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5832511A (en) * 1992-06-11 1998-11-03 Beck Systems, Inc. Workgroup network manager for controlling the operation of workstations within the computer network
US6098098A (en) * 1997-11-14 2000-08-01 Enhanced Messaging Systems, Inc. System for managing the configuration of multiple computer devices
US20030050932A1 (en) * 2000-09-01 2003-03-13 Pace Charles P. System and method for transactional deployment of J2EE web components, enterprise java bean components, and application data over multi-tiered computer networks
US6535894B1 (en) * 2000-06-01 2003-03-18 Sun Microsystems, Inc. Apparatus and method for incremental updating of archive files
US6542908B1 (en) * 2000-03-22 2003-04-01 International Business Machines Corporation Technique for automatically and transparently transforming software components into software components capable of execution in a client/server computing environment
US6718364B2 (en) * 1999-08-10 2004-04-06 Sun Microsystems, Inc. Method and apparatus for expedited file downloads in an applet environment
US6757685B2 (en) * 2001-02-19 2004-06-29 Hewlett-Packard Development Company, L.P. Process for executing a downloadable service receiving restrictive access rights to at least one profile file
US6766353B1 (en) * 2000-07-11 2004-07-20 Motorola, Inc. Method for authenticating a JAVA archive (JAR) for portable devices
US6947943B2 (en) * 2001-10-26 2005-09-20 Zeosoft Technology Group, Inc. System for development, management and operation of distributed clients and servers

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6026500A (en) * 1997-05-13 2000-02-15 Electronic Data Systems Corporation Method and system for managing computer systems
US6920608B1 (en) * 1999-05-21 2005-07-19 E Numerate Solutions, Inc. Chart view for reusable data markup language
US6941510B1 (en) * 2000-06-06 2005-09-06 Groove Networks, Inc. Method and apparatus for efficient management of XML documents

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5832511A (en) * 1992-06-11 1998-11-03 Beck Systems, Inc. Workgroup network manager for controlling the operation of workstations within the computer network
US6098098A (en) * 1997-11-14 2000-08-01 Enhanced Messaging Systems, Inc. System for managing the configuration of multiple computer devices
US6718364B2 (en) * 1999-08-10 2004-04-06 Sun Microsystems, Inc. Method and apparatus for expedited file downloads in an applet environment
US6542908B1 (en) * 2000-03-22 2003-04-01 International Business Machines Corporation Technique for automatically and transparently transforming software components into software components capable of execution in a client/server computing environment
US6535894B1 (en) * 2000-06-01 2003-03-18 Sun Microsystems, Inc. Apparatus and method for incremental updating of archive files
US6766353B1 (en) * 2000-07-11 2004-07-20 Motorola, Inc. Method for authenticating a JAVA archive (JAR) for portable devices
US20030050932A1 (en) * 2000-09-01 2003-03-13 Pace Charles P. System and method for transactional deployment of J2EE web components, enterprise java bean components, and application data over multi-tiered computer networks
US6757685B2 (en) * 2001-02-19 2004-06-29 Hewlett-Packard Development Company, L.P. Process for executing a downloadable service receiving restrictive access rights to at least one profile file
US6947943B2 (en) * 2001-10-26 2005-09-20 Zeosoft Technology Group, Inc. System for development, management and operation of distributed clients and servers
US7730111B2 (en) * 2001-10-26 2010-06-01 Zeosoft Technology Group Inc. System for development, management and operation of distributed clients and servers

Also Published As

Publication number Publication date
US9164750B2 (en) 2015-10-20
US20040172407A1 (en) 2004-09-02

Similar Documents

Publication Publication Date Title
US20160020951A1 (en) Managing target computer using encapsulated file
US11182152B2 (en) Methods and systems that share resources among multiple, interdependent release pipelines
US8171141B1 (en) Provisioning system including stack manager
US8347263B1 (en) Repository including installation metadata for executable applications
US8621419B2 (en) Automating the life cycle of a distributed computing application
US7774762B2 (en) System including run-time software to enable a software application to execute on an incompatible computer platform
US9454616B2 (en) Method and system for unifying configuration descriptors
US20150309789A1 (en) Modifying mobile application binaries to call external libraries
US20050289538A1 (en) Deploying an application software on a virtual deployment target
US20100205604A1 (en) Systems and methods for efficiently running multiple instances of multiple applications
US8832714B1 (en) Automated service interface optimization
US20080222160A1 (en) Method and system for providing a program for execution without requiring installation
US20040088397A1 (en) System and method for management of software applications
US8504987B2 (en) System and method for supporting an object oriented scripting tool
CN105490860A (en) Method, device and system for deploying application program operation environment
US20130326487A1 (en) Emulating cloud functioning of applications locally
US20170364844A1 (en) Automated-application-release-management subsystem that supports insertion of advice-based crosscutting functionality into pipelines
JP2004272912A (en) Architecture for distributed computing system and automated design, development and management of distributed application
US20190163616A1 (en) Automated-application-release-management subsystem that provides efficient code-change check-in
CN110968340A (en) Method and device for realizing multi-version dependence isolation
US8904346B1 (en) Method and system for automated load testing of web applications
US20070061277A1 (en) Method, system, and storage medium for providing dynamic deployment of grid services over a computer network
US20080216050A1 (en) Method and System for Accessing a Resource Implemented in a Computer Network
US20050283779A1 (en) Method and apparatus for deploying software applications using a zone architecture
EP1902379B1 (en) Node-to-node communication pipelines

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION