Patent application number | Description | Published |
20090204961 | SYSTEMS AND METHODS FOR DISTRIBUTING AND MANAGING VIRTUAL MACHINES - An embodiment relates generally to a method of distributing virtual machines. The method includes specifying a set of requirements for a virtual machine and instantiating a virtual machine based on a lightweight reusable profile, based on the set of requirements as described in the profile. The method also includes importing the profile to a distribution server; and distributing the profile to at least one physical machine in response to a request. Software can be added to the at least one physical machine that can manage the deployment of the physical hosts as a farm to hosting the virtual images | 08-13-2009 |
20100049838 | METHODS AND SYSTEMS FOR AUTOMATICALLY REGISTERING NEW MACHINES IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can be configured to include an inventory module. The inventory module can be configured to automatically detect new target machines that are connected to the provisioning environment. Once detected, the inventory module can be configured to determine identification information for the detected target machines. The identification information can include information that uniquely identifies the detected machines and information describing the detected machines. The inventory module can be configured to enter the identification information in an inventory of machines in the provisioning environment. Once registered, the provisioning server can perform provisioning processes on the detected machines. | 02-25-2010 |
20100050169 | METHODS AND SYSTEMS FOR PROVIDING REMOTE SOFTWARE PROVISIONING TO MACHINES - A provisioning server can generate a network boot emulator configured to provision software for target machines that may not support network booting. The provisioning server can be configured to build the network boot emulator in a format that is usable by target machines regardless of the software available on the target machines. The network boot emulator can include instructions necessary to locate and access software distributions, combine software distributions according to the templates or profiles in order to generate a software installation, and install the software installation on a target machine. The network boot emulator can also include instructions necessary to configure the software installation. | 02-25-2010 |
20100054156 | SYSTEMS AND METHODS FOR SOFTWARE PROVISIONING IN MULTIPLE NETWORK CONFIGURATION ENVIRONMENT - Embodiments relate to systems and methods for provisioning software to machines in a set of diverse networks. A provisioning (or “cobbler”) server can interact with a remote installation client to initiate a software provisioning process to machines installed on two or more diverse networks, such as local area, wide area, virtual private, or other networks. The remote installation clients in different networks can report the network interface types and configurations of their networks to the cobbler server. During provisioning, the administrator can specify one software distribution to the entire set of diverse networks, and the cobbler server can generate different distribution versions tailored to the network configurations of the various different networks. In embodiments, the cobbler server can maintain a set of network configuration templates to automatically set network settings such as static IP addresses, gateway information, hostname information, network mask information, and other settings for the different network types. | 03-04-2010 |
20100057833 | METHODS AND SYSTEMS FOR CENTRALLY MANAGING MULTIPLE PROVISIONING SERVERS - A software provisioning environment can include several provisioning server for providing software provisioning. One of the several provisioning server can be configured to be a central provisioning server. The central provisioning server can be configured to maintain the provisioning objects required for the the software provisioning. The central provisioning server can be configured to manage the software provisioning supported by additional provisioning servers in the environment. The central provisioning server can be configured to select the provisioning objects to be supported by each additional provisioning server. | 03-04-2010 |
20100057890 | METHODS AND SYSTEMS FOR ASSIGNING PROVISIONING SERVERS IN A SOFTWARE PROVISIONING ENVIRONMENT - A software provisioning environment can include several provisioning servers for providing software provisioning to one or more target machines. To assign provisioning servers to the target machines, a provisioning server can be configured to assign the provisioning servers utilizing the provisioning objects. The provisioning server can be configured to associate selected provisioning objects with respective provisioning servers. By associating a provisioning object with a respective provisioning server, the respective provisioning server will operate as the provisioning server for any provisioning processes performed on target machines utilizing the selected provisioning object. The provisioning server can be configured to associate the provisioning objects with the provisioning servers based on any number of factors such as location of the provisioning servers, specifications of the provisioning servers, load on a provisioning server, and performance of a provisioning server. | 03-04-2010 |
20100057913 | SYSTEMS AND METHODS FOR STORAGE ALLOCATION IN PROVISIONING OF VIRTUAL MACHINES - Embodiments relate to systems and methods for storage allocation in the provisioning of virtual machines. A provisioning (or “cobbler”) server can interact with a local virtual machine installation client to initiate software provisioning to a set of virtual machines. The provisioning process can entail, for example, the selection and delivery of an operating system to the target set of virtual machines, as well as the installation of applications or other software. In conjunction with the provisioning process, the virtual machine installation client can identify and access a set of storage resources, such as hard disk or other storage, to be associated with the set of virtual machines, which themselves contain no local storage. That client can determine an allocation of the set of storage resources to each virtual machine in the set of virtual machines, for instance on a pro-rata basis or based on processing consumption or other factors. | 03-04-2010 |
20100057930 | METHODS AND SYSTEMS FOR AUTOMATICALLY LOCATING A PROVISIONING SERVER - A provisioning client can be configured to automatically locate a provisioning server in a provisioning environment in order to perform software provisioning. The provisioning client can locate the provisioning server by detecting the location of the provisioning server or by selecting the appropriate provisioning server from a record of available provisioning servers. Once located, the provisioning client can be configured to establish a connection with the provisioning server and to request or receive software provisioning. | 03-04-2010 |
20100058307 | METHODS AND SYSTEMS FOR MONITORING SOFTWARE PROVISIONING - A provisioning server can actively monitor the software provisioning processes being performed on a target machine to determine the status and integrity of the provisioning processes and notify an administrator or user of the status and integrity. The provisioning server can be configured to include a monitoring module and a message module. The monitoring module can be configured to monitor software provisioning processes being performed on a target machine and determine the status and integrity of the provisioning processes. The message module can be configured send notification to the administrator or user of the status and integrity of the provisioning processes. | 03-04-2010 |
20100058327 | METHODS AND SYSTEMS FOR PROVIDING CUSTOMIZED ACTIONS RELATED TO SOFTWARE PROVISIONING - A provisioning server can be configured to determine software provisioning processes to be performed on one or more target machines. The software provisioning processes can include one or more customized actions to be taken before, during, or after the software provisioning processes, upon the occurrence of a particular event. The customized actions can be performed by the provisioning server, the target machines, provisioning clients assisting the provisioning, or by the software being provisioned. | 03-04-2010 |
20100058328 | SYSTEMS AND METHODS FOR DIFFERENTIAL SOFTWARE PROVISIONING ON VIRTUAL MACHINES HAVING DIFFERENT CONFIGURATIONS - Embodiments relate to systems and methods for differential software provisioning on virtual machines having different configurations. A provisioning (or “cobbler”) server can interact with a local virtual machine installation client to initiate a software provisioning process to diverse sets of virtual machines. The provisioning process can entail, for example, the selection and delivery of an operating system to the diverse sets of virtual machines, as well as the installation of applications or other software. In conjunction with the provisioning process, the koan client can identify the virtual machine configuration or type for the various virtual machine sets, such as those based or hosted on a Xen virtualization type, a VMware virtualization type, or kernel-based virtual machine (KVM) type. The cobbler server can generate differentiated versions of the virtualized installations for the different types of target virtual machines, compatible with the various configurations. The supported virtual types can be extensible. | 03-04-2010 |
20100058330 | METHODS AND SYSTEMS FOR IMPORTING SOFTWARE DISTRIBUTIONS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can import a software distribution and determine the type of distribution in order to integrate the software distribution in the software provisioning environment. The provisioning server can be configured to determine a type for the software distribution. Once determined, the provisioning server can be configured to locate a configuration template that matches the type of the software distribution. The configuration template can allow the generation of a configuration file that enables the software distribution to be incorporated into software provisioning processes, automatically. Once located, the provisioning server can be configured to generate a profile for the imported software distribution. | 03-04-2010 |
20100058332 | SYSTEMS AND METHODS FOR PROVISIONING MACHINES HAVING VIRTUAL STORAGE RESOURCES - Embodiments relate to systems and methods for provisioning machines having virtual storage resources, such as virtual disks. A provisioning (or “cobbler”) server can interact with a local virtual machine installation client to initiate software provisioning to a set of target machines. Each virtualization profile or virtualized system record can have one or more virtual disks associated with it for installation and storage. The provisioning process can entail, for example, the delivery of an operating system, applications, or other software to the targets. The virtual machine installation client can identify potential locations for virtual disks on the target, such as volume identifiers, media types, and/or file systems. The cobbler server can generate a distribution to the target machine taking the configuration of the virtual disk into account, and install the provisioned software to that storage resource without a need to manually specify storage parameters. Diskless machines can also be provisioned. | 03-04-2010 |
20100058444 | METHODS AND SYSTEMS FOR MANAGING ACCESS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can be configured to associate user actions with users that have access to perform the associated user actions. The user actions can include any user action performed within or by the provisioning server, such as configuring the provisioning server, modifying provisioning objects in the provisioning server, accessing provisioning processes by the provisioning server, and the like. The association can be based on the identity of the users or a type of user (administrator, client, guest, etc.). Once a request is received for a particular user action, the provisioning server can be configured to enable the requested action if the requested action is associated with the requesting user. | 03-04-2010 |
20100082799 | METHODS AND SYSTEMS FOR MANAGING NETWORK CONNECTIONS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can manage network connections in the software provisioning environment. The provisioning server can maintain a network record of network configurations for the networks served by the provisioning server. The network record can include information describing the structure, hardware, software, and configuration of the networks served by the provisioning server. The provisioning server can manage and configure existing networks and instantiate new networks or sub-networks associated with the provisioning server. The network configuration module can retrieve the network configurations maintained in the network record to manage, configure, and instantiate existing or new networks. | 04-01-2010 |
20100083245 | METHODS AND SYSTEMS FOR MANAGING NETWORK CONNECTIONS ASSOCIATED WITH PROVISIONING OBJECTS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can manage and configure the network parameters for target machines and systems residing in the networks associated with the provisioning server. The provisioning server can associate provisioning objects with the network configurations stored in the network record. The provisioning server can maintain an object record that associates the network configurations with different provisioning object. The provisioning server can utilize the object record to determine network parameters for target machines requesting provisioning processes, such as target machine installs, and virtualization. | 04-01-2010 |
20100088197 | SYSTEMS AND METHODS FOR GENERATING REMOTE SYSTEM INVENTORY CAPABLE OF DIFFERENTIAL UPDATE REPORTS - Embodiments relate to systems and methods for generating a remote system inventory capable of differential update reports. A network management server communicates with a set of hosts, e.g. local servers, each in turn serving a set of client computers or other targets. A systems administrator can interrogate any target and/or host to receive an inventory of the hardware, software, or other resources installed on the subject machine. The resulting inventory report can be stored as a tree, database, or other record based on the host name of the host or target being inventoried. A series of inventory reports generated over time can be stored. The systems administrator can access the inventory data store and generate comparative or differential reports on the inventory of a subject machine captured at different times. Differential updates can be transmitted to an administrator or other user via an RSS or other feed. | 04-08-2010 |
20100128639 | METHODS AND SYSTEMS FOR SUPPORTING MULTIPLE NAME SERVERS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can be configured to include a network configuration module that can set-up, configure, and manage network connections served by the provisioning server including name servers, such as Domain Name System (DNS) servers, in the network connections. The provisioning server can be configured to maintain a set of network modules, each network module corresponding to a different type of name server. Each of the network modules can be configured to include logic for generating or altering a configuration file for the corresponding type of name server. | 05-27-2010 |
20100131625 | SYSTEMS AND METHODS FOR REMOTE NETWORK MANAGEMENT HAVING MULTI-NODE AWARENESS - Embodiments relate to systems and methods for remote network configuration management having multi-node awareness. A management server can communicate with a set of hosts in a network, each of which can have associated target machines such as computer clients. The configuration details of the set of hosts can be stored in a set of configuration files. The configuration files can specify, for example, processor, memory, hardware, I/O, and other resources of the hosts or targets associated with the hosts. When a systems administrator or other user wishes to push an updated configuration or send new data to the set of hosts, the management server can identify versions of software and other resources to transmit and install to hosts in the set of hosts based on their particular configuration details reflected in the corresponding configuration files(s), without having to manually identify versions to be distributed to individual hosts or resolve dependencies. | 05-27-2010 |
20100131648 | METHODS AND SYSTEMS FOR PROVIDING POWER MANAGEMENT SERVICES IN A SOFTWARE PROVISIONING ENVIRONMENT - A software provisioning server can be configured to communicate with a power management system of the target machines to alter the power state of the target machines during actions requiring a change in the power states such as power cycling the target machines during a software installation. The software provisioning server can communicate with the power management system of the target machines and instruct the power management systems to alter the power state of the target machines during the actions. | 05-27-2010 |
20100131860 | SYSTEMS AND METHODS FOR ANALYZING ACTIVITY PATTERNS IN ONLINE COMMUNITIES - Embodiments relate to systems and methods for analyzing patterns and trends in online communities, and more particularly to organizing and analyzing data from community collaboration platforms and websites such as wikis, mailing lists, bug trackers, project management tools, and version control systems. At least one collaboration space can contain and store topics which can be submitted to and accessible by a plurality of users. The plurality of users can start new topics or add to existing topics within the at least one collaboration space. The at least one collaboration space can organize data within the topics according to various attributes of the data and the topics. The at least one collaboration space can send the organized data to a dashboard, which can create data organization aids to analyze the data. | 05-27-2010 |
20100138521 | METHODS AND SYSTEMS FOR PROVIDING A RESCUE ENVIRONMENT IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can remotely deliver a rescue environment to a malfunctioning target machine. The provisioning server can operate in conjunction with a network management server in order to identify malfunctioning target machines, for example, target machines with damaged operating systems. Once a malfunctioning target machine is identified, the provisioning server can be configured to identify a rescue environment to repair the malfunctioning target machine and provide the rescue environment to the malfunctioning target machine. | 06-03-2010 |
20100138526 | METHODS AND SYSTEMS FOR PROVIDING HARDWARE UPDATES IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can remotely determine target machines, requiring a hardware update, and remotely provide the hardware updates to the target machines. The provisioning server can identify hardware updates for target machines in a network it serves. The provisioning server can operate in conjunction with a network management server in order to identify the target machines, requiring the hardware update. The provisioning server can generate the hardware update for the target machines and provide the hardware update to the target machines. | 06-03-2010 |
20100138696 | SYSTEMS AND METHODS FOR MONITORING HARDWARE RESOURCES IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can provide and utilize a diagnostic tool to test and interrogate hardware on target machines and to collect data from the hardware. The diagnostic tool can operate on the target machine independently of software already installed on the target machine. The diagnostic tool can interrogate hardware of the target machine and collect data from the hardware of the target machine. The provisioning server can select the diagnostic tool from a set of pre-generated diagnostic tools or generate a custom diagnostic tool tailored to a specific target machine. The provisioning server can interact directly with the diagnostic tool or interact with the diagnostic tool utilizing a network management server. Once data is collected, the provisioning server can be configured to store the collected data and/or output the data to other parties or systems. | 06-03-2010 |
20100217840 | METHODS AND SYSTEMS FOR REPLICATING PROVISIONING SERVERS IN A SOFTWARE PROVISIONING ENVIRONMENT - A software provisioning environment can include several provisioning servers for providing software provisioning to one or more target machines. In the environment, one of the provisioning servers can initiate a replication action. The replication action can transfer and apply the metadata from one provisioning server to another provisioning server. Additionally, the replication action can transfer and apply portions of an inventory of provisioning objects from one provisioning server to another provisioning server. During the replication action, the provisioning server can utilize the interfaces and protocols of standard provisioning processes to transfer the metadata and portions of the inventory. | 08-26-2010 |
20100217843 | SYSTEMS AND METHODS FOR COLLECTING AND ALTERING FIRMWARE CONFIGURATIONS OF TARGET MACHINES IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can provide and interact with a firmware tool on target machines. The firmware toot can communicate with the firmware of the target machines and collect data representing the configuration of the firmware of the target machines, independent of the types of the target machines. To communicate independent of the type of target machine, the firmware tool can include a translation library. The translation library enables the firmware tool to receive common instructions for interacting with firmware and convert those common instructions into specific instructions that are compatible with different types of the target machines. | 08-26-2010 |
20100217848 | SYSTEMS AND METHODS FOR INVENTORYING UN-PROVISIONED SYSTEMS IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can utilize an inventory tool on new target machines in order to collect specification data from the target machines, prior to provisioning software. The inventory tool can be configured to operate on the new target machines without software, such as an operating system, being installed on the new target machines. The inventory tool can be configured to communicate with the hardware of the new target machines and collect data representing the specifications of the new target machines. The inventory tool can be configured to operate and execute on any new target machine regardless of the type and configuration of the new target machine. | 08-26-2010 |
20100217944 | SYSTEMS AND METHODS FOR MANAGING CONFIGURATIONS OF STORAGE DEVICES IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can provide and interact with a storage device tool on target machines. The storage device tool can communicate with the storage devices of the target machines, independent of the types of the storage devices. To communicate independent of the type of the storage device, the storage device tool can include a translation library. The translation library enables the storage device tool to receive common commands and/or instructions for interacting with the storage devices and convert those common commands and/or instructions into specific commands and/or instructions that are compatible with different types of the storage devices. | 08-26-2010 |
20100218243 | METHODS AND SYSTEMS FOR SECURE GATE FILE DEPLOYMENT ASSOCIATED WITH PROVISIONING - A software provisioning server can be configured to communicate with a certificate authority to evaluate security credential requests received from one or more target machines prior to a software installation. The certificate authority can issue certificates to the one or more target machines and notify an administrator and the software provisioning server of the issued certificates. The software provisioning server can manage the software installation to the one or more target machines based on the issued certificates and other specifications. | 08-26-2010 |
20100220584 | SYSTEMS AND METHODS FOR AUTOMATICALLY GENERATING SYSTEM RESTORATION ORDER FOR NETWORK RECOVERY - Embodiments relate to systems and methods for automatically generating a system restoration order for network recovery. A set of managed machines, such as personal computers or servers, can be managed by a network management platform communicating with the machines via a secure channel. The network management platform can access a dependency map indicating a required order for restoration of machines or nodes on a network. The network management platform likewise access a reverse kickstart file for each machine to be automatically restored in order to ensure proper functioning of the network, and extract a current configuration of that machine for purposes of restoring the overall network. | 09-02-2010 |
20100223274 | SYSTEMS AND METHODS FOR GENERATING A CHANGE LOG FOR FILES IN A MANAGED NETWORK - Embodiments relate to systems and methods for generating a change log for files in managed network. A set of managed machines, such as personal computers or servers, can be managed by a network management platform communicating with the machines via a secure channel. The network management platform can employ a package management tool to manage files stored or hosted in the managed network. The network management platform can further employ a change monitor or other logic to locate additional files located in the managed network but that may not be under the control of or registered to the package management tool. A systems administrator or other user can invoke both the package management tool and the change monitor logic to initiate a discovery process and locate all available files associated with the network, and generate a unified change log recording all available files and/or their changes. | 09-02-2010 |
20100223367 | SYSTEMS AND METHODS FOR INTEGRATING SOFTWARE PROVISIONING AND CONFIGURATION MANAGEMENT - A provisioning server can cooperate with configuration management systems to deliver provisioning processes integrated with configuration management services. The provisioning server can associate provisioning objects for the various provisioning processes with management classes supported by the configuration management systems. The management classes can include data for configuring the resources of a target machine (hardware, software, data, etc.). As the provisioning server performs the provisioning process for a particular provisioning object on a target machine, the provisioning server can apply the management class, associated with the particular provisioning object, to the target machine. | 09-02-2010 |
20100223369 | SYSTEMS AND METHODS FOR DEPOPULATION OF USER DATA FROM NETWORK - Embodiments relate to systems and methods for depopulation of user data from a network. A network management platform can communicate with a set of managed machines in a network, and generally manage user accounts including user lDs, associated network processes, services, application files, data files, and/or other user data. In embodiments, a user may have a change in status, such as departing from the organization operating the network, changing their name or user name, or other updates. In such cases, a systems administrator may need to update or delete files, processes, services, and/or other user data associated with the user from the network. The network management platform can interrogate the network for files, processes, or other resources associated with the user ID of interest. The search can exhaustively interrogate every available node in the network, to update or purge all files associated with the subject user ID(s). | 09-02-2010 |
20100223375 | SYSTEMS AND METHODS FOR SEARCHING A MANAGED NETWORK FOR SETTING AND CONFIGURATION DATA - A network management server can be configured to search the components of computing systems and devices in a managed network for specified settings and configurations in order to determine if the computing systems or devices contain the specified settings and configurations. The network management server can receive a request containing search parameters. The search parameters can identify specific settings and configurations to search for in the components of the systems and devices of the managed network. The network management server can initiate a search of the components of all the systems and devices in the managed network based on the search parameters. | 09-02-2010 |
20100223473 | SYSTEMS AND METHODS FOR NETWORK MANAGEMENT USING SECURE MESH COMMAND AND CONTROL FRAMEWORK - Embodiments relate to systems and methods for network management using a secure mesh command and control framework. A network management server can communicate with a set of supervisory hosts, which in turn communicate with an underlying set of targets. The set of targets can have associated digital certificates which can be authenticated by common certificate authorities. A controlled target can authenticate one or more other target requesting access to the controlled target via the trusted common certificate authority. One authenticated target can therefore mesh on a trusted basis with another target to perform installation, monitoring, testing, or other activities directly on the target of interest, without channeling commands through an intervening supervisory host. | 09-02-2010 |
20100223504 | SYSTEMS AND METHODS FOR INTERROGATING DIAGNOSTIC TARGET USING REMOTELY LOADED IMAGE - Embodiments relate to systems and methods for interrogating one or more diagnostic targets using a remotely loaded image. A set of managed machines, such as personal computers or servers, can be managed by a network management engine communicating with the machines via a secure channel. The network management engine can access a selected diagnostic target to temporarily deactivate the installed native operating system on that target, insert a substitute operating environment, and remotely interrogate the target to perform hardware, software, security, or other diagnostics or installs. The network management engine can connect to the diagnostic target, extract security keys from the native operating environment, remotely load the substitute environment, and then perform diagnostic or provisioning activities while the native environment is deactivate and the diagnostic target is effectively off-network. Installations, diagnostics, or other activities that require the diagnostic target to be isolated from other machines can therefore be safely conducted. | 09-02-2010 |
20100223607 | SYSTEMS AND METHODS FOR ABSTRACTING SOFTWARE CONTENT MANAGEMENT IN A SOFTWARE PROVISIONING ENVIRONMENT - To provision software content from the different software repositories and manage updates to the repositories, a provisioning server can maintain a repository record. The repository record can include an identification of the repositories associated with the provisioning server. Additionally, the repository record can associate, with each identification of a repository, the type of repository, the software content contained in the repository, and provisioning objects associated with the software content contained in the repository. The provisioning server can be configured to utilize the repository record during provisioning processes for software content and for updating software content of target machines. | 09-02-2010 |
20100223609 | SYSTEMS AND METHODS FOR AUTOMATIC DISCOVERY OF NETWORK SOFTWARE RELATIONSHIPS - Embodiments relate to systems and methods for automatic discovery of network software relationships. A set of managed machines, such as personal computers or servers, can be managed by a network management platform communicating with the machines via a secure channel. The network management platform can issue a set of discovery commands interrogating nodes of the network to report software or services which they consume. The network management platform can build a dependency map encoding the dependency or other relationships between nodes in the managed network based on their use of software resources. Network restorations can therefore be conducted in a rational order, maintaining stability in the restored nodes and network. | 09-02-2010 |
20100223610 | SYSTEMS AND METHODS FOR PROVIDING A LIBRARY OF VIRTUAL IMAGES IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can maintain a library of virtual images. The virtual images can be a disk image of software that has been previously installed according to metadata. The metadata can represent parameters utilized to create the virtual image and the parameters required to provision the virtual image on a target machine. The provisioning server can maintain the metadata for a virtual image in a virtual image record associated with the virtual image. The provisioning server can provision a virtual image to one or more target machines. To provision the virtual image, the provisioning server can copy the virtual image to a storage device on the one or more target machines and configure the target machine according to metadata in the associated virtual image record. | 09-02-2010 |
20100250907 | SYSTEMS AND METHODS FOR PROVIDING CONFIGURATION MANAGEMENT SERVICES FROM A PROVISIONING SERVER - A provisioning server can perform configuration management services on target machines served by the provisioning server. The provisioning server can maintain a set of management templates. The set of management templates can be utilized to generate management configuration files for target machines. The management configuration files, generated from the management templates, can cause the target machines to operate according to a defined role (e.g. web server, client device, application server, etc.). To enable configuration management services, the provisioning server can associate the management templates with provisioning objects (e.g. profiles, provisioning templates, system records, etc.). | 09-30-2010 |
20100306305 | SYSTEMS AND METHODS FOR PROVIDING A COMPLETE VIEW OF LARGE COMPUTING NETWORKS - The management tool can determine and store all information that is relevant to the computing systems in the network. The management tool can generate and provide reports that are customizable by a requester. The management tool can receive a request to generate a report which specifies the information relevant to the computing systems to be included in the report. The management tool can search the stored information and generate the report with the stored information that matches the request. The reports can include network topology maps based on the request and geographic maps based on the request. | 12-02-2010 |
20100306337 | SYSTEMS AND METHODS FOR CLONING TARGET MACHINES IN A SOFTWARE PROVISIONING ENVIRONMENT - A provisioning server can provide and interact with a cloner agent on target machines. The cloner agent can execute on a source target machine and copy the contents of storage on the source target machine to a storage location of the provisioning server. Once copied, the provisioning server can provide the cloner agent to destination target machines. The cloner agent can copy the contents of the source target machine, stored at the provisioning server, to the destination target machines. | 12-02-2010 |
20100306347 | SYSTEMS AND METHODS FOR DETECTING, MONITORING, AND CONFIGURING SERVICES IN A NETWORK - A services tool can detect, monitor, and manage software providing services in and for the network. The services tool can identify different types of software that provides services for the network (“services software”) and types of software that provide support (“support software”) to the services software. The services tool can determine configuration data for both the services software and the support software. The services tool can automatically identify when particular services software needs to be linked to particular support software. The services tool can configure the services software and/or support software to link the two according to the rules. | 12-02-2010 |
20100306354 | METHODS AND SYSTEMS FOR FLEXIBLE CLOUD MANAGEMENT WITH POWER MANAGEMENT SUPPORT - A cloud management system can determine if the operational state of the virtual machines and/or the computing systems needs to be altered in order to instantiate virtual machines. If the operational state of the computing systems needs to be altered, the cloud management system retrieves an identification of the power management systems supporting the computing systems. The cloud management system can utilize the identification of the power management systems to instruct the power management systems to alter the power state of the computing system in order to instantiate the virtual machines. | 12-02-2010 |
20100306359 | SYSTEMS AND METHODS FOR MANAGEMENT OF MAINFRAME RESOURCES IN PRE-BOOT ENVIRONMENT - Embodiments relate to systems and methods for the management of mainframe resources in a pre-boot environment. According to embodiments, a network management platform, for instance a platform equipped or compatible with pre-boot discovery and management tools such as the known pre-boot execution environment (PXE), can integrate a set of mainframe-based virtual machines using a pre-boot management engine. The pre-boot management engine can reside in or communicate with the mainframe operating system, and present a set of resources to the network management platform to allow the platform to include time-sliced or other virtual machines or resources, into the pre-boot protocol. According to embodiments, for instance, the set of virtual machines can be assigned temporary or pseudo media access control (MAC) or other hardware identifiers, so that the network management platform can view individual mainframe-based virtual machines as having a network connection and thereby receive similar boot commands to hardware-based client machines. | 12-02-2010 |
20100306377 | METHODS AND SYSTEMS FOR FLEXIBLE CLOUD MANAGEMENT - A cloud management system can maintain a set of “virtual groups,” and assign different “virtual groups” to particular computing resources. The “virtual groups” can be based on the particular usage (type of virtual machine, application of the virtual machine, function of the virtual machine, and the like) of the members in the groups and/or can be based on the specifications of the computing resources (type and amount of computing resources). When instantiating virtual machines in a cloud, the cloud management system can utilize the “virtual groups” to identify and allocate the computing resources. | 12-02-2010 |
20100306380 | SYSTEMS AND METHODS FOR RETIRING TARGET MACHINES BY A PROVISIONING SERVER - A provisioning server can provide and interact with an eraser agent on target machines. The eraser agent can execute on one or more target machines to erase all the contents of storage on the target machines. In particular, the eraser agent can utilize secure algorithms to alter and obscure the information stored the storage devices of the target machines. The provisioning server can instruct the target machines to alter their power state (e.g. power cycle), if necessary, to provide and to initiate the eraser agent. | 12-02-2010 |
20100306566 | SYSTEMS AND METHODS FOR POWER MANAGEMENT IN MANAGED NETWORK HAVING HARDWARE-BASED AND VIRTUAL RESOURCES - Embodiments relate to systems and methods for power management in a managed network having hardware-based and virtual resources. A network management platform can host a power management engine to configure and manage the power operations of a mixed set of hardware-implemented and virtual machines. The virtual machines can be instantiated, for instance, via a mainframe platform and/or a cloud computing environment. The power management engine can maintain a power management settings indicating power management rules or preferences for the managed network. The power management settings can contain rules or commands, for instance, to sequence the power-on or power-off order between different hardware-implemented or virtual machines, based for instance on dependency orders or predetermined schedules. | 12-02-2010 |
20100306765 | METHODS AND SYSTEMS FOR ABSTRACTING CLOUD MANAGEMENT - A cloud management system can utilize an abstraction library for management of clouds. The abstraction library can abstract out the differences between different cloud management schemes. The cloud management system can utilize the abstraction library to perform various processes associated with the virtual machines regardless of the cloud management scheme of the virtual machine. The cloud management system can format, configure, and convert virtual machines to the cloud management scheme of the cloud in which the virtual machine will be instantiated. The cloud management system can utilize the abstraction library to enable communication with virtual machines that are formated according to a different cloud management scheme than the communication. | 12-02-2010 |
20100306767 | METHODS AND SYSTEMS FOR AUTOMATED SCALING OF CLOUD COMPUTING SYSTEMS - A cloud management system can receive rules for altering the virtual machines based on demands on the virtual machines and/or computing resources supporting the virtual machines. The cloud management system can receive data from the internal monitoring agents and/or external monitoring agents and to determine when the conditions of the rules are met. Once the conditions are met, the cloud managements system can take the appropriate action to alter the instantiated virtual machines. | 12-02-2010 |
20100333084 | SYSTEMS AND METHODS FOR MESSAGE-BASED INSTALLATION MANAGEMENT USING MESSAGE BUS - Embodiments relate to systems and methods for message-based installation management using a message bus. In embodiments, a deployment server or other provisioning host can be connected to a message bus with a managed network, including sets of hosts and targets, as well as a set of applications, management platform(s), and/or other resources. Those resources monitor the bus message traffic for installation events, such as the powering up, operating system provisioning, and bringing online of a set of real or virtual client machines. The set of applications or other resources listening to the message bus can detect the occurrence of an installation event, or transmit installation commands to the provisioning server. For instance, the set of applications can direct the installation of user applications or other software in dependency order. The set of applications or other resources can also initiate installations not based on detection of an in-process installation event. | 12-30-2010 |
20110055361 | SYSTEMS AND METHODS FOR GENERATING MANAGEMENT AGENT INSTALLATIONS - Embodiments relate to systems and methods for installation of management agents on target machines. In embodiments, a central management server can scan a managed network to identify different types and configurations of target machines. Different types of target machines may require different types of management agent software in order to invoke different types of management services, such as configuration management or performance monitoring services. The necessary types of management agent may depend, for instance, on the operating system and/or applications installed on individual targets. In embodiments, different types or classes of management agents can register or communicate with different types of remote management servers. The management agent(s) on individual targets can thereby initiate and manage the installation of agents or other resources that may be needed to register to the remote network services, without a requirement to install or use specific package management tools for specific products. | 03-03-2011 |
20110055377 | METHODS AND SYSTEMS FOR AUTOMATED MIGRATION OF CLOUD PROCESSES TO EXTERNAL CLOUDS - A cloud management system can receive rules for altering the virtual machines based on demands on the virtual machines and/or computing resources supporting the virtual machines. The cloud management system can receive data from the internal monitoring agents and/or external monitoring agents and to determine when the conditions of the rules are met. Once the conditions are met, the cloud management system can migrate the virtual machines to an external cloud. | 03-03-2011 |
20110055396 | METHODS AND SYSTEMS FOR ABSTRACTING CLOUD MANAGEMENT TO ALLOW COMMUNICATION BETWEEN INDEPENDENTLY CONTROLLED CLOUDS - To manage and communicate with virtual machines in an external cloud regardless of the cloud management scheme of clouds, the cloud management system can utilize an abstraction library. The abstraction library can be configured to abstract out the differences between different cloud management schemes utilized by the cloud management systems and an independent cloud management system of the external cloud. | 03-03-2011 |
20110055397 | SYSTEMS AND METHODS FOR ABSTRACTING STORAGE VIEWS IN A NETWORK OF COMPUTING SYSTEMS - A storage tool can determine and provide an abstract view of storage systems in a network of computing system. The storage tool can utilize the abstract view in order to identify the storage systems based on the performance and capabilities of the storage systems without regard to the configuration of the storage system, storage devices in the storage system, or the details of the storage devices. | 03-03-2011 |
20110055398 | METHODS AND SYSTEMS FOR FLEXIBLE CLOUD MANAGEMENT INCLUDING EXTERNAL CLOUDS - A cloud management system can maintain a set of “virtual groups,” and assign different “virtual groups” to particular computing resources of both local and external clouds. The “virtual groups” can be based on the particular usage (type of virtual machine, application of the virtual machine, function of the virtual machine, and the like) of the members in the groups and/or can be based on the specifications of the computing resources (type and amount of computing resources). When instantiating virtual machines in local or external clouds, the cloud management system can utilize the “virtual groups” to identify and allocate the computing resources. | 03-03-2011 |
20110055544 | SYSTEMS AND METHODS FOR TRACKING A HISTORY OF CHANGES ASSOCIATED WITH SOFTWARE PACKAGES AND CONFIGURATION MANAGEMENT IN A COMPUTING SYSTEM - In order to track actions performed by a package manager or a configuration management system, a computing system can be configured to include a tagging tool. The tagging tool can be configured to cooperate with the package manager and the configuration management system in order to determine and generate a history of the actions performed by the package manager and the configuration management system. The history can include a description of the actions, the reasons why the actions were performed, and a list and description of the software programs, files, and software libraries that are affected by the actions. | 03-03-2011 |
20110055588 | METHODS AND SYSTEMS FOR SECURELY TERMINATING PROCESSES IN A CLOUD COMPUTING ENVIRONMENT - When terminating a process instantiated in a cloud, a cloud management system can provide and interact with an eraser agent on the computing systems supporting the process. The process can be any type of process that can exits in the cloud such a virtual machine, software appliance, or software instance. The eraser agent can execute on the computing systems to erase information stored on physical storage devices of the computing systems and associated with the process. In particular, the eraser agent can utilize secure algorithms to alter and obscure the information stored on the physical storage devices of the computing systems and associated with the process. | 03-03-2011 |
20110055636 | SYSTEMS AND METHODS FOR TESTING RESULTS OF CONFIGURATION MANAGEMENT ACTIVITY - Embodiments relate to systems and methods for testing results of configuration management activity. In embodiments, a configuration management server can control and maintain the configuration state of one or more targets, hosts, servers, clients, or other machines in a managed. In aspects, a testing tool hosted on the configuration management server can verify the correct implementation of configuration instructions. In embodiments, the testing tool can access or receive an anticipated or target configuration state for one or more target(s) or other machines, indicating the status of services, memory, security, storage, and/or other configuration parameters after a selected configuration command is to be transmitted and run on the recipient machine. After the configuration change or update is performed, the test tool can receive results indicating the actual configuration state achieved after running the configuration management command(s), and compare those to the anticipated configuration state. Any discrepancies can be flagged, and corrective commands can be issued. | 03-03-2011 |
20110055669 | SYSTEMS AND METHODS FOR DETECTING MACHINE FAULTS IN NETWORK USING ACOUSTIC MONITORING - Embodiments relate systems and methods for detecting machine faults in a network using acoustic monitoring. In embodiments, one or more servers, clients, or other machines in a managed network can have a microphone or other acoustic sensor integrated into motherboard or other hardware. The sensor can sample acoustic signals from inside or near the machine, and can digitize that data. The resulting set of acoustic data can be transmitted to a management server or other destination for analysis of the operating sounds related to that machine. For instance, the acoustic data can be analyzed to detect indications of a failed or failing hard drive, for instance by detecting spindle whine or head movement noises, or a failed or failing power supply based on other sounds. The management server can respond to potential fault events for instance by issuing configuration commands, such as instructions to power down the malfunctioning component. | 03-03-2011 |
20110055810 | SYSTEMS AND METHODS FOR REGISTERING SOFTWARE MANAGEMENT COMPONENT TYPES IN A MANAGED NETWORK - Embodiments relate to systems and methods for registering management software component types in a managed network. In embodiments, a central registration server can scan a managed network to identify different types and configurations of target machines. The registration server can, for instance, perform an authorization process on some or all targets in a network, and determine a management software component type required by or compatible with each target. The Different target machines may have requirements for different management software component types depending, for instance, on the operating system or other resources installed on each target. Once a management software component type has been identified, the registration server can take an inventory of further resources hosted on the target, as well as identify types of management agents that can be distributed to the target to registration to remote management services, such as configuration management or performance monitoring services. | 03-03-2011 |
20110055826 | SYSTEMS AND METHODS FOR TRACKING A HISTORY OF CHANGES ASSOCIATED WITH SOFTWARE PACKAGES IN A COMPUTING SYSTEM - In order to track actions performed by a package manager, a computing system can be configured to include a tagging tool. The tagging tool can be configured to cooperate with the package manager in order to determine and generate a history of the actions performed by the package manager. The history can include a description of the actions, the reasons why the actions were performed, and a list and description of the software programs, files, and software libraries that are affected by the actions. | 03-03-2011 |
20110078301 | SYSTEMS AND METHODS FOR DETECTING NETWORK CONDITIONS BASED ON CORRELATION BETWEEN TREND LINES - Embodiments relate systems and methods for detecting network conditions based on a correlation between trend lines. In embodiments, a network management server can monitor the status and operation of network machines, such as servers or targets, as well as network transmission hardware (e.g. routers). Streams of network operation data from those sources can be captured and stored. The management server or other logic can examine the network operation data to identify trend lines for network conditions, such as application faults, attempted intrusions, or other events or conditions. Trend line data can be treated to generate second or other higher-order derivatives, such as third-order derivatives or others. A time correlation between two or more trend lines and/or their higher order derivatives, for instance, the occurrence of a peak value in the same time window, can be used to identify an event, state or condition. | 03-31-2011 |
20110078302 | SYSTEMS AND METHODS FOR DETECTING NETWORK CONDITIONS BASED ON DERIVATIVES OF EVENT TRENDING - Embodiments relate systems and methods for detecting network conditions based on derivatives of event trending. In embodiments, a network management server can monitor the status and operation of network machines, such as servers or targets, as well as network transmission hardware (e.g. routers). Streams of network operation data from those sources can be captured and stored. The management server or other logic can examine the network operation data to identify trend lines for network conditions, such as application faults, attempted intrusions, or other events or conditions. trend line data can be treated to generate second or other higher-order derivatives, such as third-order derivatives representing the rate of change of acceleration (or jerk) in the time series of one or more conditions. The presence of acceleration or jerk for one or more trend lines, such as attempted network intrusions, can reflect an event and trigger a flag or other automated response. | 03-31-2011 |
20110107103 | SYSTEMS AND METHODS FOR SECURE DISTRIBUTED STORAGE - Embodiments relate to systems and methods for secure distributed storage. In aspects, a set of remote storage hosts, such as personal computers, servers, media devices, cell phones, or others, can subscribe or register to provide storage via a cloud-based or other distributed network. Source data from an originating computer, such as a data file, can be decomposed into data storage subunits, each of which is encrypted via a cloud management system or other logic or control. The data storage subunits can comprise data blocks or even or uneven size. The set of encrypted data storage subunits can be registered to a table or other record, and disseminated to the remote storage hosts. In the event of data loss at the originating computer or at other times, the remotely stored data storage subunits can be extracted, decrypted, and reassembled to reconstruct the original source data. | 05-05-2011 |
20110107299 | SYSTEMS AND METHODS FOR INTEGRATED PACKAGE DEVELOPMENT AND MACHINE CONFIGURATION MANAGEMENT - Embodiments relate to systems and methods for integrated package development and machine configuration management. In aspects, a stage management engine can be invoked by a developer to initiate the development, testing, and deployment of a software package, e.g. an application or operating system. A set of repositories can store related versions of the software under development at different stages of building, testing, and deployment. The repositories can enforce consistent file naming and avoid duplication of stored files. In embodiments, the stage management engine can likewise interface with a configuration management database that stores and manages a resource configuration state of a host virtual machine used to develop and run the subject software package. Both the package and virtual machine bed can be moved through various development stages to production in coordinated fashion, ensuring consistency in both the software to be installed and the target machine for the installation. | 05-05-2011 |
20110107300 | SYSTEMS AND METHODS FOR UTILIZING A HISTORY OF CHANGES ASSOCIATED WITH SOFTWARE PACKAGES AND CONFIGURATION MANAGEMENT TO MANAGE MULTIPLE COMPUTING SYSTEMS - An administrator system can utilize a history generated by a tagging tool to determine the current configuration of computing systems. The administrator system can utilize the current configuration to verify that the computing systems have been configured properly and verify, over time, that the computing systems maintain the desired configuration. The administrator system can compare the current configuration with the desired configuration for the computing systems. | 05-05-2011 |
20110107326 | SYSTEMS AND METHODS FOR SPACE EFFICIENT SOFTWARE PACKAGE MANAGEMENT - A space management tool can consolidate the duplicate files in the software packages while maintaining the file structure of the software packages. The space management tool can search the software packages to identify duplicate files and consolidate the duplicate files without altering the file structure of the software packages. In particular, the space management tool can consolidate the storage space utilized by the software packages by removing duplicate files in the software packages and replacing the removed files with a reference to the remaining file. | 05-05-2011 |
20110107419 | SYSTEMS AND METHODS FOR IMPROVED IDENTIFICATION AND ANALYSIS OF THREATS TO A COMPUTING SYSTEM - A security tool can access a tagging tool and the history generated by the tagging tool in order to identify potential threats and analyze the identified threats. When a potential threat is detected or an actual threat is identified, the security tool can request the history of actions from the tagging tool corresponding to the threat. The security tool can compare the potential or actual threat with the history of any action recorded by the tagging tool in order to classify a potential threat as an actual threat or determine the source or cause of an actual threat. | 05-05-2011 |
20120089729 | SYSTEMS AND METHODS FOR ABSTRACTING STORAGE VIEWS IN A NETWORK OF COMPUTING SYSTEMS - A storage tool can determine and provide an abstract view of storage systems in a network of computing system. The storage tool can utilize the abstract view in order to identify the storage systems based on the performance and capabilities of the storage systems without regard to the configuration of the storage system, storage devices in the storage system, or the details of the storage devices. | 04-12-2012 |
20150067360 | PROVIDING POWER MANAGEMENT SERVICES IN A SOFTWARE PROVISIONING ENVIRONMENT - A software provisioning server can communicate with a power management system of the target machines to alter the power state of the target machines during actions requiring a change in the power state, such as power cycling the target machines during a software installation. The software provisioning server can communicate with the power management system of the target machines and instruct the power management systems to alter the power state of the target machines during the actions. | 03-05-2015 |