Patent application number | Description | Published |
20090193426 | SYSTEM AND METHOD FOR DESCRIBING APPLICATIONS FOR MANAGEABILITY AND EFFICIENT SCALE-UP DEPLOYMENT - Systems, methods and computer storage media for operating a scalable computing platform are provided. A service description describing a requested service is received. Upon receiving the service description a determination of the required resources and the available resources is made. An instance description is produced. The resources required to sustain the deployment of the service are mapped to the available resources of the computing platform so the service may be deployed. The instance description is amended with each deployment of the service to allow for sustained deployment of the service. | 07-30-2009 |
20100106678 | MONITORING AGENT PROGRAMS IN A DISTRIBUTED COMPUTING PLATFORM - Methods, systems, and computer-readable media for monitoring information passed from instances of role(s) of a service application installed on a distributed computing platform and for indexing and analyzing the information within a data store are provided. Monitoring involves a monitoring agent that is integrated within an operating system of computing devices that make up the distributed computing platform. In operation, the monitoring agent retrieves information from the role instances and converts the information into parameters that are assembled to documents. Generally, the parameters are assembled to a uniform-structured format in accordance with a schema imposed by the distributed computing platform. Accordingly, each of the documents across the platform have a common format that promotes processing and analysis without a need for reconfiguration. Accordingly, the health of the service application, although dispersed throughout the distributed computing environment, may be observed and evaluated in a consistent manner. | 04-29-2010 |
20100106768 | PROVIDING FUNCTIONALITY TO CLIENT SERVICES BY IMPLEMENTING AND BINDING CONTRACTS - Methods, systems, and computer-readable media for automating the expression of functional aspects of a target service to a client service via a vehicle referred to herein as a contract are provided. Generally, the methods are performed in the context of a distributed computing environment configured to underlie operations of service application(s). In embodiments, the contract is implemented and bound upon ascertaining that the expressed functional aspects satisfy dependencies of the client service. Generally, the contract defines interfaces and maintains properties that configure the interfaces during installation. During the implementation, one of the interfaces is established and parameterized in accordance with the properties associated therewith. During the binding, the target service and the client service are linked via communication channels that are routed through the established interface. Accordingly, calls from the client service over the communication channels allow for reaching and employing the functional aspects of the target service. | 04-29-2010 |
20100106812 | AUTOMATING DEPLOYMENT OF SERVICE APPLICATIONS BY EXPOSING HOSTING ENVIRONMENT CONSTRAINTS - Methods, systems, and computer-readable media for automating deployment of service applications by exposing environmental constraints in a service model are provided. In general, the methods are performed in the context of a general purpose platform configured as a server cloud to run various service applications distributed thereon. Accordingly, the general purpose platform may be flexibly configured to manage varying degrees of characteristics associated with each of the various service applications. Typically, these characteristics are provided in the service model that governs the environmental constraints under which each component program of the service application operates. As such, hosting environments are selected and adapted to satisfy the environmental constraints associated with each component program. Adapting the hosting environments includes installing parameters transformed from configuration settings of each component program via map constructs, thereby refining the hosting environment to support operation of the component program. | 04-29-2010 |
20100107015 | EXPRESSING FAULT CORRELATION CONSTRAINTS - Methods, systems, and computer-readable media for expressing fault correlation constrains to a developer of a service application are provided. Initially, the fault correlation constraints are identified by inspecting an architecture of resources comprising a data center. Based on the resources, sets of nodes that become concurrently unavailable due to a failure mode or update scheme are aggregated. These fault correlation constraints, upon being communicated to the developer, then may be incorporated into a service model produced thereby. Accordingly, the service model is tailored to the specific characteristics of the data center and is provided with instructions as to how to partition instances of the service application throughout the distributed resources of the data center. Thus, the fault correlation constraints provide a developer with insight into rules and structures on which the data center is constructed and assurances of a certain level of fault tolerance upon deploying the service application. | 04-29-2010 |
20100198970 | ENHANCING AVAILABILITY OF REMOTE APPLICATIONS - Systems, products, and methods are disclosed for performing a method of allocating services (functionalities of software applications) across several computing devices that make up various domains of a data center so that the functional aspects will continue to be available to remote users even when, from time to time, different sets of computing devices are unavailable. | 08-05-2010 |
20130024564 | MONITORING AGENT PROGRAMS IN A DISTRIBUTED COMPUTING PLATFORM - Methods, systems, and computer-readable media for monitoring information passed from instances of role(s) of a service application installed on a distributed computing platform and for indexing and analyzing the information within a data store are provided. Monitoring involves a monitoring agent that is integrated within an operating system of computing devices that make up the distributed computing platform. In operation, the monitoring agent retrieves information from the role instances and converts the information into parameters that are assembled to documents. Generally, the parameters are assembled to a uniform-structured format in accordance with a schema imposed by the distributed computing platform. Accordingly, each of the documents across the platform have a common format that promotes processing and analysis without a need for reconfiguration. Accordingly, the health of the service application, although dispersed throughout the distributed computing environment, may be observed and evaluated in a consistent manner. | 01-24-2013 |
Patent application number | Description | Published |
20100058318 | ROLLING UPGRADES IN DISTRIBUTED APPLICATIONS - Embodiments described herein are directed to updating the various software associated with a distributed application in a piecemeal fashion. All instances of the software are analyzed and separated into different portions, called “roles.” Each instance of a role is strategically assigned to an update domain based on the structural information included in the service model of the distributed application. The distributed application is upgraded one update at a time by selecting an update or host update domain, bringing the roles assigned thereto offline, updating the offline roles, bringing the roles back online, and repeating for other update or host update domains. | 03-04-2010 |
20100251328 | MODEL BASED SECURITY FOR CLOUD SERVICES - Applications, such as cloud services, may be deployed within a network environment (e.g., a cloud computing environment). Unfortunately, when the applications are instantiated within the network environment, they have the ability to compromise the security of other applications and/or the infrastructure of the network environment. Accordingly, as provided herein, a security scheme may be applied to a network environment within which an application is to be instantiated. The security scheme may comprise one or more security layers (e.g., virtual machine level security, application level security, operating system level security, etc.) derived from an application service model describing the application and/or resources allocated to the application. | 09-30-2010 |
20110289478 | ORGANIZATION OF APPLICATION STATE AND CONFIGURATION SETTINGS - The operating system manages software entities by creating a construct called a context that organizes and manages software-related state and configuration settings of applications. A context may comprise an installation service, a configuration service and an activation service. Contexts can be linked or arranged hierarchically to form parent-child relationships. Hierarchies may be used to affect accessibility of software items, to satisfy dependencies, to control the visibility/invisibility of software items, to provide access to configuration settings and to override software availability, dependencies and configuration settings. An override may be applied to set policy when more than one context has a configuration setting, dependency or access to a software entity. | 11-24-2011 |
20120151467 | PROVIDING COM ACCESS TO AN ISOLATED SYSTEM - The database (namespace) for storing component metadata for an application that is to be run in an isolated environment is isolated by an operating system by storing the component metadata in a local set of information associated with the isolated application instead of in a global namespace. The operating system utilizes this local metadata instead of the global database when components are employed. Registration data for components is placed within a manifest, enabling the operating system to determine the relationship between an application and a component or set of components used by the application. | 06-14-2012 |