US20040148184A1 - System and method to manage the distribution of services software in a distributed network - Google Patents

System and method to manage the distribution of services software in a distributed network Download PDF

Info

Publication number
US20040148184A1
US20040148184A1 US10/407,872 US40787203A US2004148184A1 US 20040148184 A1 US20040148184 A1 US 20040148184A1 US 40787203 A US40787203 A US 40787203A US 2004148184 A1 US2004148184 A1 US 2004148184A1
Authority
US
United States
Prior art keywords
service
services
business
infrastructure
remote
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/407,872
Inventor
Waqar Sadiq
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HP Enterprise Services LLC
Original Assignee
Electronic Data Systems LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Electronic Data Systems LLC filed Critical Electronic Data Systems LLC
Priority to US10/407,872 priority Critical patent/US20040148184A1/en
Assigned to ELECTRONICS DATA SYSTEMS CORPORATION reassignment ELECTRONICS DATA SYSTEMS CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SADIQ, WAQAR
Priority to CA002510676A priority patent/CA2510676A1/en
Priority to PCT/US2004/001980 priority patent/WO2004066105A2/en
Priority to MXPA05007573A priority patent/MXPA05007573A/en
Priority to EP04704941A priority patent/EP1586033A4/en
Priority to AU2004206591A priority patent/AU2004206591A1/en
Publication of US20040148184A1 publication Critical patent/US20040148184A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • G06Q30/015Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
    • G06Q30/016After-sales

Definitions

  • the present invention is directed, in general, to data processing system services management.
  • An application contract consists of one or more interface definitions, reflecting the right level of interface granularity and service behavior such as operations exposed and their inputs and outputs.
  • the preferred embodiment provides a system and method for composing, configuring, deploying, and managing services in a data processing system and data processing system network.
  • This system provides deployment domains to define a logical set of business services that have similar requirements for an application infrastructure.
  • a deployment domain is created, and a graphical user interface allows a user to compose, configure, deploy, and manage services within the deployment domain and associated hosts using a drag-and-drop interface.
  • a system and method for distributing and updating services software in the network and configuring heterogeneous underlying web services hosting platforms is claimed.
  • FIG. 1 depicts a block diagram of the relationships between service layers in accordance with a preferred embodiment of the present invention
  • FIG. 2 depicts a block diagram relating a development and deployment lifecycle with data objects and service objects in accordance with a preferred embodiment of the present invention
  • FIG. 3 depicts a block diagram of a runtime environment in accordance with a preferred embodiment of the present invention
  • FIG. 4 illustrates a federated metadata storage and access system in accordance with a preferred embodiment of the present invention
  • FIG. 5 depicts a virtual composition environment in accordance with a preferred embodiment of the present invention
  • FIG. 6 depicts a block diagram of a virtual container accordance with a preferred embodiment of the present invention.
  • FIG. 7 depicts a flowchart of a process in accordance with a preferred embodiment of the present invention.
  • FIG. 8 depicts a flowchart of a process in accordance with a preferred embodiment of the present invention.
  • FIGS. 1 through 8, discussed below, and the various embodiments used to describe the principles of the present invention in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the invention. Those skilled in the art will understand that the principles of the present invention may be implemented in any suitably arranged device. The numerous innovative teachings of the present application will be described with particular reference to the presently preferred embodiment.
  • Business Service Contract A business service contract describes the business service exposed. This normally contains information such as operations provided by the service, their inputs and outputs.
  • Business Service Implementation is the software code required strictly to implement the above mentioned business behavior. This does not include other capabilities such as providing security or managing transactions.
  • Application Infrastructure Services are all those services that themselves do not contribute to the business behavior, however they are necessary for the correct operation of the business service. These services can be added, removed or replaced without changing the business behavior of the business service.
  • Virtual Container A virtual container couples a business service implementation with one or more application infrastructure services and provides the definition for a complete business service. This definition exists in metadata and contains all the metadata that customizes the specific usage of application infrastructure services inside the said virtual container.
  • Physical Business Service A physical business service is the platform specific programming code that can be generated according to the previously discussed definition of the virtual container. This code can then be compiled and deployed in the underlying platform specific manner.
  • Web Services will soon be providing complex and mission critical services to business partners and internal customers by providing a viable alternative to most application integration scenarios.
  • the disclosed embodiments provide a system and method for composing, configuring, deploying, and managing services in a data processing system and data processing system network.
  • This system provides deployment domains to define a logical set of business services that have similar requirements for an application infrastructure.
  • a deployment domain is created, and a graphical user interface allows a user to compose, configure, deploy, and manage services within the deployment domain and associated hosts using a drag-and-drop interface.
  • a system and method for distributing and updating services software in the network and configuring heterogeneous underlying web services hosting platforms is claimed.
  • the metadata is managed by a federated metamodel system.
  • a visual composition environment allows composition of a virtual container that couples the business service implementation in question with the application level infrastructure services that it needs.
  • the code generators can then generate platform specific code for the virtual container. All this can be packaged for easy shipment.
  • the packaged business services can then be easily deployed on any of the machines available to the system.
  • the disclosed embodiments include a method and system for describing the underlying application services infrastructure, a virtual execution environment for business services implementations and a system to integrate the two in a loosely coupled way through metadata so that the two can evolve independently and still stay compatible.
  • a deployment domain is created, and a graphical user interface allows a user to compose, configure, deploy, and manage services within the deployment domain and associated hosts using a drag-and-drop interface.
  • the preferred embodiment includes the following features:
  • FIG. 1 illustrates these objectives further.
  • a management framework 120 hides the underlying application server environment 140 from the business service implementation 110 and augments the underlying environment by providing the ability to add and integrate application infrastructure services.
  • an implementation framework 130 can be provided that even provides implementation services 150 such as a database management system.
  • the preferred embodiment provides a platform that provides a level of abstraction, much higher than the one that is provided by application servers and other web services platforms currently available. This platform brings the development, configuration, deployment and management capabilities to the business services.
  • the lifecycle shown in FIG. 2 relates to either doing new development or introspecting existing application for the purpose of converting them into managed business services.
  • the lifecycle includes the model or introspection phase 205 , in which the application architects design the interfaces for the business services to be developed or introspect an existing service.
  • the skeleton of business service implementation can be generated and then developed by the developers.
  • a gateway implementation can be automatically generated 210 .
  • the system architects then configure 215 the runtime for the business service. Finally, the administrators then deploy 220 and manage 225 the business services.
  • One disclosed feature of the preferred embodiment is a federated meta-model 230 that stores and provides access to the metadata describing the business services themselves and their infrastructure.
  • This metadata describes the interface of the business service itself, the metadata about those infrastructure services, and the metadata about the virtual container that couples a business service implementation with one or more infrastructure services along with their uniquely customized properties.
  • the preferred embodiment is designed to expose a level of abstraction higher than those provided by industry standards 240 .
  • the standards and technologies in the web services area are changing very rapidly. As a result, the business services that leverage those standards run the risk of becoming outdated very quickly.
  • the preferred embodiment exposes a higher level interface that can be generated by the metadata itself. This results in more stable and longer-lasting applications.
  • the preferred embodiment provides the horizontal platform that can be used to build the vertical solutions that are more specific to industries in the form of industry specific templates 250 . These solutions do not have to be complete themselves. In fact, most likely these solutions will be partial solutions designed to be extended for particular business problems.
  • FIG. 3 describes the runtime environment for which the business services are configured and in which they are deployed. This architecture is described here at the logical level and can have one or more physical manifestations, in accordance with the disclosed or claimed embodiments.
  • a deployment domain 300 is a mechanism for partitioning a large IT environment into smaller logical clusters of machines and applications so that these different clusters can be configured differently from each other.
  • these deployment domains serve to logically separate environments with different requirements domain.
  • This domain may be configured with a specific security service.
  • Another domain may be for business partners and may be configured with a different kind of security service.
  • this domain may also be configured with a management service, e.g., to bill the users for usage of the business service.
  • the deployment domain serves to define the scope of the infrastructure services that it is composed of and the business services that are deployed in it.
  • the deployment domain defines the logical boundaries and scope of the infrastructure and business services within it. It is a logical partition of a large computing environment which consists of many physical machines.
  • the metadata data related to the deployment domain defines that logical partition.
  • One or more physical machines can be configured for a deployment domain and one or more application infrastructure services can be made part of the fabric that is a deployment domain.
  • Each server machine, called a host, that is configured to participate in one or more deployment domains will contain a core software service.
  • the metadata that describes a host can include such items as host name, host's IP address, the core directory path on the host for the application, etc.
  • An application infrastructure service is defined as a service that provides a discrete non-business level service. Some examples of infrastructure services are security services, transaction services, service monitoring, load balancing, fault tolerance, and messaging service. An infrastructure may also provide some other services such as reliable delivery or asynchronous messaging. These services can also be much higher level; services such as accounting & billing services, service level agreement management services and user profile management services.
  • the metadata of an infrastructure service consists of property sheets with each property sheet containing one or more related properties.
  • a security service may contain five sheets for general properties, authentication, authorization, message integrity, and message confidentiality.
  • Each sheet contains properties that allow customization of the underlying infrastructure service for this specific use. Since these properties are specific to the underlying service, their interpretation is left completely up to the service itself and its plugin. Furthermore, since the property values are specific to the specific usage of this service, these properties need only be defined once a virtual service container is configured with this service.
  • an infrastructure service has been written or purchased, it has to be made part of one or more deployment domains so that it can be used.
  • This interface allows the deployment management tools and runtime software to plugin an infrastructure service into the deployment domain and allows the service to be used at runtime.
  • the tools that allow the user to visually configure the virtual service container may allow mechanisms to “drag” the infrastructure service and “drop” it on the virtual service container on a canvass.
  • the tools can at this time present the required set of properties to be defined for the service for this particular container. This is accomplished by requesting the plugin to provide its customizable property sheets so that they can be filled.
  • the virtual container receives the requests sent to the business service and invokes plugs for all the application infrastructure services configured for this container.
  • the plugin can then retrieve the metadata and use it to perform the work. If the actual infrastructure service is implemented as a set of libraries, then the plugin can invoke those libraries or if it represents a remote service then it can communicate with that remote service in a manner that is specific to that infrastructure service.
  • the runtime is not aware of the details of the operation—it simply invokes the plugin and passes it the runtime invocation-related data.
  • Each infrastructure service is therefore required to implement the plugin interface as a precondition to it becoming part of an infrastructure.
  • An infrastructure service may provide different plugins for different deployment domains. The location and other necessary information required to load the plugin is part of the metadata of the infrastructure service.
  • a business service implementation is an implementation of the business behavior that a service is expected to provide. This behavior should be implementable in a manner independent of how it is accessed. For example, it should be possible to implement the business logic for a procurement service without being specific to Jave Platform 2 Enterprise Edition (J2EE)-based access or Microsoft .NET based access. However, once the service has been constructed, it may be deployed in a virtual container 320 that is specific to the underlying platform. This virtual container then decouples the service implementation from the infrastructure in which it is deployed.
  • J2EE Jave Platform 2 Enterprise Edition
  • This virtual service container 320 is conceptually similar to a J2EE container to the extent in that it provides the several needed services such as transaction and database management. However, unlike J2EE like containers, these services are not fixed but can be added, removed and updated.
  • the virtual container 320 of the preferred embodiment is a higher level concept. It views an environment as a collection of discrete higher level services and recognizes the need for business services to be integrated with those higher level services. It limits its scope to the infrastructure level services and does not provide those services that are needed for implementing the business logic, such as database management.
  • the container is called “virtual” because it itself is a platform independent definition rather than a physical implementation. It is described in terms of metadata.
  • the metadata for the container describes the business service implementation that is it hosting. This service was built using the development tools and its definition is part of the development metadata. In an integrated system of tools, the deployment tool may retrieve this definition from the development metadata repository.
  • the metadata for the container also describes one or more application infrastructure services required by the virtual container.
  • a virtual container When a virtual container is created, it is created for a particular deployment domain. This deployment domain is already preconfigured with one or more infrastructure-level services. The deployment engineer can select from those infrastructure services and integrate them into the container using visual mechanisms such as dragging and dropping them on the container. At this time, the tools may invoke the plugin and bring up the set of properties necessary to correctly use the infrastructure-level service.
  • the virtual container Once the virtual container has been defined, there is enough metadata to generate a physical implementation of the virtual container, build it, package it and transfer the required binaries to the host. Once this is done, the business service is ready to be deployed and used.
  • the code When the code is generated, it is generated according to some pre-defined mappings of the metadata to the underlying platform. So for example, the physical implementation for .NET platform may be quite different from the physical implementation for J2EE. These mappings define what elements of the metadata generate what kind of code for the underlying platform.
  • the code generator first creates XML documents for all the code that it wants to generate. It then invokes the infrastructure service plugs and provides them an opportunity to add code specific to them by passing the XML documents representing the code to be generated. Once all the plugs have added their code, the code generator converts the XML documents back into either language specific code or configuration code, as necessary. This way, the code generation process can be kept completely independent of a particular infrastructure service while still allowing them to customize the generated code.
  • the separation between the business service implementation and the underlying environment provides two benefits. First, it allows the underlying application infrastructure and the business service implementation itself to evolve independent of each other. Secondly, this allows the physical manifestation of the hosted service to leverage fully the capabilities offered by various infrastructures. This is explained in more detailed below, but simply put it means that the virtual container 320 , through metadata 330 and visual tools, can be visually composed to integrate one or more services offered by the underlying infrastructure. Since this integration is performed through the virtual container and at configuration time, it does not become part of the service implementation itself. The same procurement service can then be configured and deployed in two different deployment domains providing different levels of service.
  • a package can be created that includes all the necessary platform specific binary assemblies required for this service. This package is then placed in a master vault. At this point, a visual deployment tool can provide some mechanism such as drag-and-drop to deploy this business service on any machine that is part of the deployment domain. If a host is then dragged and dropped on the virtual container, its package is collected from the master vault and brought over to the machine being dragged and dropped. This package is then opened up and its contents are extracted. These contents are then configured in a manner that is specific to the underlying platform.
  • the actual addressable and accessible service is then provided by the physical form of the virtual container 320 which can be specific to the underlying environment.
  • management services tools 310 are network managers.
  • the management services and tools described here have more application level context than the system level context.
  • Some examples of management tools are business service monitoring tools, service level agreement (SLA) managament tools, fault tolerance tools, application event handling, billing and accounting services or user profile management.
  • SLA service level agreement
  • the metadata 330 is logical metadata. Logically, each deployment domain 300 has its own instance of metadata 330 . This metadata describes the deployment domain itself in terms of the infrastructure services that it is able to offer and the virtual service containers 320 that are deployed in it.
  • the exact form that the metadata is stored in is not important.
  • the platform can choose an XML format, a relational database or some binary form.
  • FIG. 4 illustrates a federated metadata storage and access system with various possible clients of the metadata.
  • the development tools will require metadata that describes the team development environment and will allow sharing of development artifacts.
  • One exemplary implementation of the metadata architecture is illustrated below.
  • the metadata has been described above as a part of other elements. It is useful to note that the two kinds of metadata that are relevant here are configuration/deployment metadata and operational metadata.
  • the configuration/deployment metadata is used by the configuration and deployment tools as well as by the runtime system. This data will not change often but will rather be accessed concurrently by large number of users.
  • a configuration metadata server should preferably offer extensive caching features where the data is handed out with a time-to-live parameter indicating how long the client can use the data before being required to refresh it.
  • Operational metadata is used by one or more infrastructure services such as a monitoring service, load balancing service, and fault-tolerance service. This data tends to change very frequently and the tools that present this data, for viewing and analysis, may be required to refresh based on user preferences.
  • the two initial applications that have been identified have different needs.
  • the first application is an Online Loan Approval System.
  • the bank wants to build a new system that uses that logic but re-implements it in a more consolidated and scalable manner.
  • the bank employed a large loan approval department that received the loan requests either through fax or telephone and used these multiple systems to score the applicant's credit history and make the loan decisions.
  • the bank wants to make this system available online so that the applicant's could themselves apply for the loan.
  • the bank may also decide later on to make this system available to its smaller business partners to get credit history of clients and to provide services such as credit risk scoring. For those services, the bank may charge those business partners on a per-transaction basis.
  • the second system is an application, called Customer Service Online system, that will allow bank's consumer loan clients to get the status of their accounts, directly without going through customer service.
  • This information already exists in a legacy J2EE system that is deployed in the internal secure network.
  • the bank wants to build a front-end web service to this system.
  • the bank has standardized on toolkit in accordance with the preferred embodiment.
  • the bank also has a well-structured group that runs its data centers.
  • the data center has system architects and system administrators who collectively run the managed environment for all the bank's applications.
  • the application architects use a off-the-shelf modeling tool to model the service contract.
  • This contract identifies the operations (business functions) that the service exposes, defines a type system that defines the data required as inputs or is returned as outputs by those operations.
  • This business interface is critical data because it defines the Contract between this business service and its users.
  • the development team then takes this business contract and conducts a detailed design and develops the business logic.
  • the development team decides to use C# as the development language and the implementation is developed as C# assembly.
  • an implementation package is created that contains the necessary metadata and DLLs and is handed over to the data center that is responsible for deploying and managing bank's applications.
  • the customer service system presents a different scenario than the first one.
  • the bank really does not want to change the exiting system.
  • the system works well and already has all the necessary functions required to fulfill the task.
  • this system was purchased by the bank from a 3rd party and provides no way for bank to expose it to external users and is not manageable.
  • This process is very simple.
  • the introspection capabilities of the preferred embodiment are used to analyze the J2EE interfaces exposed by the existing applications. From these, then one or more functions are selected and system then automatically generates the required metadata, populates the metadata repository and then generates a gateway implementation that can delegate requests to the existing system. As in the previous case, this gateway implementation is then packaged in JAR files and an implementation package is created. This implementation package is then handed over to the data center that is responsible for configuring, deploying and managing bank's applications.
  • the data center already has several different deployment domains configured.
  • the data center also uses several infrastructure services such as Security.
  • infrastructure services such as Security.
  • the vendors provided toolkit-compatible plug-ins and for others the data center wrote its own. In either case, those infrastructure services are properly configured for the preferred embodiment and fit in its plug-and-play architecture.
  • Configuring a business service involves several different steps that allow a business service implementation to be transformed into a managed and hosted web service.
  • the business service implementation provided to the data center is an implementation package that contains one or more DLLs or JAR files that implement the business behavior. These implementations lack the appropriate environment required to make the business service addressable and hostable and they also lack the necessary infrastructure capabilities such as security.
  • the first step that the system architects do is to define a virtual container.
  • This virtual container extends the metadata describing the service contract with metadata relating to the desired infrastructure services.
  • This metadata will be used later on to create a physical web service that will provide a proper execution environment for the business logic implemented by the developers and will provide the flexible management environment required by the data center to perform its functions.
  • the system architects also decide what infrastructure level capabilities (security, transactions, etc.) are required for this business service. They then use the drag-and-drop facilities available in the visual composition environment of the preferred embodiment to create this container. As new infrastructure services are dragged onto the virtual container, these infrastructure services plugs are invoked by the graphical environment and at this time, these plugs populate the metadata with a set of properties that they would like to be customized. The graphical environment then presents those properties in a property editor and lets the system architect provide unique values of those properties. They can also customize the container itself by setting its logging levels as well as choose the correct QoS parameters such as various delivery modes.
  • the system architects can select the target platform for this web service.
  • the potential target platforms can be any of the J2EE environments supported by the installation.
  • the target platform can be Microsoft's .NET environment.
  • the composer tool can generate the code necessary for a web service that can be physically deployed and managed and then build that code along with the provided implementation into an executable. The composer then creates a deployment package that contains all the necessary DLLs or the JAR files required for deployment.
  • This package is then automatically placed in a master vault that is managed by the system of the preferred embodiment. All machines that are configured in the data center have an agent service running on them. These agents cooperate with each other to transfer packages in and out of the master vault and configure particular underlying target platforms for business services.
  • the composer tool can be used to drag different hosts on a business service. This drag-and-drop operation triggers the actual deployment process.
  • a web service can be undeployed from a host by selecting that host in composer tool and simply deleting it from there. This results in all traces of that package being removed from the machine.
  • One a service has been deployed, it can be easily managed. Whenever, a request is sent to that service, the physical container provided by the runtime environment receives it. The runtime environment then executes all the necessary infrastructure services configured for this container and then invokes the business implementation provided by the user. When it gets the response from the business service implementation, it re-invokes any necessary infrastructure services and sends the response back to the caller.
  • the infrastructure services can change.
  • the system architects can use the composer tool to slowly transition the deployed business services from an old or obsolete module to a new module by simply removing the old plug from the business service and using drag-and-drop to configure the business service with new plug.
  • the preferred embodiment automatically removes older DLLs or JARs from the physically deployed services and copies the new ones for the new plug.
  • the business services adjust to the new infra-structure service without the typical need for interruption and modification.
  • the bank decides to make that service available to its business partners for a price.
  • An internal infrastructure level billing service is developed (along with its toolkit compatible plug) and configured.
  • the system architects simple drag this infrastructure service on the Online Loan Approval service, without modifying the business implementation or bringing the service down.
  • the preferred embodiment automatically modifies the metadata, reconfigures the deployed services and the runtime environment starts using this new infrastructure service when requests are sent to the business service.
  • One specific feature of the preferred embodiment is a visual composition environment.
  • the preferred embodiment uses visual tools to generate metadata. These tools can present the core metadata in a tree structure as shown in FIG. 5.
  • FIG. 5 shows an exemplary user interface 500 for a visual composition environment in accordance with the preferred embodiment.
  • GUI interface 500 is divided into multiple areas, including available objects area 510 , active object identifier 540 , related objects area 520 , and properties area 530 .
  • Available objects area 510 shows all objects that are available to be configured or deployed, including hosts, infrastructure services, service implementations, and deployment domains.
  • the folder named “hosts” contains the list of all available hosts in the entire managed space. The information that is visible for each host in this list can be such as the name of the server and its machine address.
  • infrastructure services contains a list of all available infrastructure services. This information preferably does not contain anything more than the name of the service and its description and purpose. These are all the infrastructure services available to be deployed.
  • the folder named “implementation services” contains all the implementation packages that have been made available. Each of these contain the related metadata describing the service contract as well as the binaries that contain the actual implementation of that service contract behavior. It is also possible to further group the service implementations.
  • the folder named “deployment domains” contains the deployment domains underneath it. Each deployment domain can have a folder of its own. Each deployment domain furthermore has one folder for each virtual container in it. The folder for the virtual container all the infrastructure services that it is configured with and all the hosts that it is deployed on.
  • Active object identifier 540 shows which object is currently active.
  • “Domain 1” is the active object; this label will change to correspond to whichever object the user is acting upon. This area is actually sensitive to whether a deployment domain is selected or a virtual container is selected.
  • Related objects area 520 shows all objects, grouped according to type, which are currently associated with the active object.
  • the related objects area 520 shows all hosts, infrastructure services, and virtual containers for business services that are currently deployed in Domain 1.
  • both Host 1 and Host 2 are associated with Domain 1, and the Security and Package Tracking services are deployed in Domain 1.
  • the related objects area 520 would display all deployment domains, infrastructure services, and virtual containers related to Host 1. Whatever type of object is showing as the active object 540 , the other types of objects will be show in the related objects area 540 .
  • properties area 530 is used to define and modify the properties for any object.
  • any customizable properties related to that object will be shown in properties area 530 . The user may then edit these properties as appropriate.
  • interface 500 the user can select an active object 540 , then drag and drop objects between the available objects 510 and the related objects area 520 .
  • an object is dragged from the available objects area 510 into the related objects area 520 , the system will then perform all necessary file generation and configuration, as defined by the appropriate properties, to actually form the logical relationship between the dropped object and the active object. This process is described in more detail elsewhere in this disclosure, and the implementation is within the abilities of one of skill in the art.
  • the elements are those that exist in global space. These are elements or pieces of metadata that are not specific to a deployment domain. Further into the deployment domain, the metadata becomes more specific.
  • One or more hosts can be prepared to host a deployment domain. Similarly, a single deployment domain can span multiple hosts. All the hosts configured for a specific deployment domain appear in the folder belonging to that deployment domain. These nodes may contain data such as the working area to store different deployment packages containing different binaries and configuration files belonging to the infrastructure as well as business services in that deployment domain.
  • An infrastructure service can be configured in multiple deployment domains and a single deployment domain will have multiple infrastructure services. This relationship is similar to the many-to-many relationship that the hosts have to a deployment domain.
  • its related software such as its plugins, is physically transferred to all the hosts that are configured for the domain.
  • a visual tool of the preferred embodiment can use drag-and-drop capabilities to compose the virtual service container.
  • FIG. 6 shows an exemplary virtual container represented on a canvas.
  • the larger outside cylinder is the virtual service container 600 .
  • the smaller cylinders inside the larger one represent the plugins 610 for the infrastructure services.
  • the business service implementation 620 At the end of the chain is the business service implementation 620 that the virtual service container is hosting.
  • the user can drag and drop infrastructure services, configured for that domain, from either the tree structure or a graphical palette.
  • the container can be dragged onto a host in that domain, thus triggering the physical deployment.
  • Another feature is the unique customization of the use of the configured infrastructure properties through a system of property sheets.
  • a virtual container is configured with an infrastructure service
  • the preferred embodiment loads the plug of the infrastructure service and invokes the plug, providing it the empty collection of property sheets.
  • the plug responds by populating this collection with property sheets that contain properties that it is interested in.
  • the runtime system and the composition tools do not know anything about these properties.
  • One the plug has populated the property collections with properties specific to it, the composition tools presents those properties in a property editor that allows the user to provide unique values for those properties. These properties are then saved with the other metadata and can be changed later on.
  • Each collection contains one or more property sheets and each property sheet contains one or more properties. This organization of properties allows for a more readable and understandable organization of the properties.
  • Another feature of the preferred embodiment is the code-generation capability. Once a container has been configured, its definition is complete. However, it is not yet ready to be physically deployed because it is only a definition at this point. However, since now the definition is complete, the user can select a target environment such as .NET or an EJB server. Once the target environment has been selected a code generation scheme can be selected to generate software code that maps the definition of the virtual container to the computer facilities offered by the underlying target platform. This code can then be compiled and linked with the runtime environment required by the platform and a package is created.
  • a target environment such as .NET or an EJB server.
  • the code generation software can additionally generate smart proxies that perform the equivalent of the virtual service container for the client.
  • These smart proxies integrate the infrastructure services as defined by the business service for the client. For example, a business service may require the client application to authenticate itself against the security infrastructure service and send only the authentication token to the business service.
  • a smart proxy will retrieve the metadata for the client and invoke the infrastructures configured for the virtual container that are relevant for the client environment. These plugs can then prompt the client for any data that they might require and use the runtime environment to send that data to the virtual container along with the rest of the request data.
  • the smart proxies can also be packaged into a distributable unit. These units can then be separately provided to those who are interested in building client applications to those business services.
  • Another feature of the preferred embodiment is software configuration capability. Once the code for the virtual service container has been generated, compiled, and packaged, the container can be placed into a packaged state. At this point, a host can be dragged on the container. This will cause the software configuration facility to perform separate steps:
  • the web server can be configured to know about the web service.
  • the EJB server can be configured to know about the service;
  • the configuration files can be placed into the proper areas.
  • the virtual service container has been transformed into a physical service that can be invoked.
  • FIG. 7 shows a flowchart of an exemplary process in accordance with the preferred embodiment.
  • the user accesses a user interface and selects a deployment domain (step 705 ).
  • the user then drags an icon representing a host system into the deployment domain area depicted on the user interface (step 710 ).
  • the host is associated with that deployment domain and any other objects in the deployment domain (labeled DD in figure, step 715 ).
  • the user drags an icon representing an infrastructure service (labeled IS in figure) into the deployment domain area depicted on the user interface (step 720 ).
  • the infrastructure service is associated with the deployment domain and any other objects within the deployment domain (step 725 ).
  • the user drags an icon representing a service implementation (labeled SI in figure) into the deployment domain area depicted on the user interface (step 730 ), thus starting the definition of a virtual container, and optionally specifies properties for the virtual container (step 735 ).
  • the service implementation is associated with the deployment domain and any other objects within the deployment domain (step 740 ).
  • the user then drags one or more infrastructure services from within this domain onto the virtual container (labeled VC in figure, step 745 ), and optionally specifies the properties for the infrastructure services (step 750 ).
  • the system associates this infrastructure service with the virtual container (step 755 ).
  • the system then evaluates any new or changed associations (step 760 ).
  • the system generates any code necessary to implement the associations (step 765 ), and transmits and installs the generated code as necessary (step 770 ).
  • the user is able to fully manage the deployment domain, and to deploy and manage the hosts and services within it, all using a simple and intuitive user interface.
  • the preferred embodiment provides extensive capabilities to package software modules into packages, store packages in a master location, transfer packages in and out of that master location and configuring any supported underlying platform for a web service.
  • Most conventional software configuration mechanisms deal with software distribution on a desktop client.
  • the preferred embodiment manages software distribution of web services, including the software for business service as well as the infrastructure services. It also configures the diverse underlying application server platforms such as Microsoft .NET or BEA WebLogic. Using the disclosed system and methods, the users can manage the automatic distribution of web services in a distributed network, distribute software updates remotely and transparently deploy that software on the underlying platforms.
  • the presently preferred system uses commonly available zip and compression algorithms to package software modules and other related files. All packages, which may include programming language specific code and binaries or platform specific assemblies are stored in the same format.
  • One component of the preferred system is the runtime framework. Any infrastructure service plugs or business service implementation, or business service containers require the binaries from the framework in order to build successfully.
  • This package contains the core binaries of the framework. There is one such package for each supported language or compilation system. Initially, there may be multiple such packages, e.g., one for building things in Microsoft's .NET environment, another for Java, and others for other virtual environments.
  • the infrastructure services are integrated by writing plugs that represent them in the system environment. These plugs are then distributed to the machines from which these infrastructure services are being used. However, in addition to these plugs, the binaries associated with the infrastructure service itself also need to be distributed.
  • This package one for each infrastructure service and for each compilation environment, includes the binary code for the software plug itself, as well as the compilation environment specific binaries for the infrastructure service.
  • a service implementation package contains all the binaries required for the implementation of business logic.
  • this may be a dynamic linking library (DLL) that contains the code for the business service implementation and one or more DLLs required for correct linking and execution of the business logic implementation.
  • DLL dynamic linking library
  • the package may contain either one or more class files or JAR files.
  • a manifest file describes each of these binaries.
  • a deployment package contains the code necessary for the physical implementation of the virtual container. It does not include the code for the system framework itself or the infrastructure services or the business service implementations. Those packages are not included because they already exist in the vault separately and are copied only when necessary.
  • Master vault is a machine in the entire network that serves as the designated repository to store various packages during the entire lifecycle of the services. In a sense it is the file-server for the disclosed platform.
  • the work area for master vault is represented by a top-level directory.
  • each service implementation has a folder.
  • the raw metadata for the service, its contract definition and the implementation packages are kept as files.
  • An agent is a software service that runs on each machine. On windows based systems, this service can run as a Windows service and on non-windows machines, it can run as a background process.
  • This service provides all the logic necessary for managing the vault and software configuration of the supported underlying platform.
  • One machine can be designated as the Master Vault.
  • the agent that runs on that machine assumes the role of the master agent.
  • This dual personality of the agents allows any machine to be designated as the master vault.
  • the master agent receives the requests for transfer of software packages into and out of the master vault.
  • the master agent also maintains a directory structure on the master vault for organizing various software packages. Depending upon the task to be performed, an agent may either perform the request itself or it may delegate the request to the agent running on the master vault.
  • the agents are responsible for correct configuration of the underlying application services platform, with the least amount of input from the user.
  • FIG. 8 shows a process of this remote deployment and configuration of updated packages in accordance with a preferred embodiment of the present invention.
  • the system first determines which remote systems are running an environment that requires an updated infrastructure service (step 810 ). Next, the business services running on those remote machines in the network are requested to pause their request processing (step 815 ). Next, the remote machines are requested to and will unload the existing software package (step 820 ).
  • the software agents are used to transfer the updated package for the infrastructure service to that machine (step 825 ).
  • the paused business service on each machine is then requested to reload the infrastructure package (step 830 ).
  • the business services on the remote systems will resume request processing using the updated infrastructure services package (step 835 ). In this way, the infrastructure services are updated with a very slight impact on the processing of the remote systems, and without having to “bring down” any systems.
  • Creation of deployment package in the system involves multiple steps. First, an administrator uses system tools to configure a virtual container for the business service. This container exists only in metadata and is platform-neutral. The administrator then provides unique property values for fine-tuning. Next, the administrator selects a specific underlying platform and generates code for the physical container (the web service). The code generators generate code for that specific container according to the pre-defined mappings of the virtual container to the physical container. This code is then built and packaged into platform-specific packages. As described, this package does not need to include the package for the business service implementation as well as the infrastructure services, since this information is already available in the metadata.
  • the agents When the administrator attempts to deploy the service to a specific host, the agents first determine the supported platforms on that machine. If multiple platforms are supported on that machine, then the user is prompted for the choice. Once the platform has been determined, the agent on the local machine collaborates with the master agent to retrieve the correct deployment package, as well the package for business service implementation and packages for all the configured infrastructure services from the mater vault. The contents of these packages are then extracted and copied to a file structure that is specific to the underlying platform. After that, the underlying platform itself is configured, e.g., Microsoft's IIS requires creation of a virtual directory while the J2EE platforms require modification of server configuration files.
  • Microsoft's IIS requires creation of a virtual directory while the J2EE platforms require modification of server configuration files.
  • the preferred embodiment operates on the principal of minimum configuration and self-healing.
  • the system is able to detect its own errors and attempt to take necessary actions to correct itself.
  • One particular feature of the preferred embodiment is the ability to integrate one or more infrastructure services with a business service to provide the desired level of support required for the correct operation of the business service.
  • This support is provided in such a way so that the infrastructure is very flexible.
  • This infrastructure can be continually enhanced by adding more infrastructure services, removing the outdated or deprecated services or by updating the existing services with new versions.
  • the infrastructure service integration capability also allows the services to be updated. So for example, if the new version of a service becomes available and the plug for that service has to be updated, the architecture should allow that kind of update as well.
  • the metadata that describes an infrastructure service consists of information required to load a service plug, properties that it is interested in and information necessary to determine whether the plug has relevance to client-side, server-side or both.
  • the most important metadata for an infrastructure service is in the form of a property sheet collection.
  • a property sheet collection contains one or more named property sheets.
  • Each property sheet contains a set of related properties that the plug needs to tune its behavior for a specific usage.
  • Each plug by default has a property sheet named “General” that contains some basic properties. These properties indicate whether the plug processes incoming messages or outgoing messages or both and whether it participates in the code generation process. Default values are assigned to these properties.
  • This collection has 5 sheets that provide sets of properties related to each other. This allows the plug to have multiple properties with the same name but in different sheets. Various parts of the plugs runtime can retrieve these properties and use them as needed.
  • the metadata also describes whether a particular infrastructure service acts only on the server side or the client side or both. It further indicates whether the infrastructure service need to participate in the code generation process to provide code that is specific to it.
  • Each infrastructure service is represented in the system environment through a system plug interface.
  • This plug represents an infrastructure service in the environment.
  • the preferred embodiment itself does not differentiate between a specific kind of infrastructure service (e.g. it does not differentiate a security service from the transaction service).
  • all infrastructure services appear the same and it invokes them at the right points during the message processing.
  • a message processing model makes it possible to write service implementations and client programs that have absolutely zero knowledge of what infrastructure services are executing, what inputs do they require and what kind of extra information needs to be inserted in the messages or extracted from them for the correct operation.
  • the service plugs therefore perform all that logic themselves in a completely encapsulated manner.
  • an infrastructure service is a simple service and is implemented in terms of a library, the plug would wrap that service and the service would be invoked inline.
  • most sophisticated infrastructure services are standalone third-party services.
  • a security service may have a separate service process that may perform authentication and authorization.
  • the plug actually acts on behalf of the remote service inside the tool-time or runtime environment.
  • the system runtime defines an abstract interface known as ServiceHandler interface. A plug for an infrastructure service first has to implement this interface.
  • an infrastructure service has no significance or identity until it is selected to be integrated inside a business service virtual container, and the metadata for an infrastructure service is mostly undefined until this point.
  • the plug for the service is loaded in at that time and this method is invoked on the plug and the empty metadata container is passed to it.
  • the plug populates the metadata with a set of properties.
  • the properties are represented generically and related properties are organized into sheets for easy organization, traverse-ability and presentation.
  • the plugs then populate the metadata with only those properties that are required by it to provide the proper behavior at runtime when it is invoked.
  • the plugs may also modify other pieces of metadata. For example, by default all plugs are marked as service-side as well as client-side plugs. This means that these plugs will be loaded and invoked by the runtime, regardless of whether it is in the client-side or server-side. However, for some plugs, it does not make sense to do that on the client-side. For example, for collection of service metrics, the plug of the monitoring service only needs to be invoked on the service-side. Hence this plug does not need to be distributed, loaded and invoked on the client-side. The plug can again override these values at this time too.
  • this metadata can then be saved in the metadata server.
  • This method is invoked by the runtime when it loads the plug into the runtime for business service virtual container. At this time the plug can initialize tits internal data structures, allocate any resources that it needs to, and cache the needed metadata.
  • the plug For example, if the plug represents a remote service then it would need to establish a connection with that service in order to communicate with it. Instead of opening that connection every time, the plug may need to open the connection in this method upfront and use it whenever needed.
  • the business service virtual container When the business service virtual container receives a service request, it invokes all the loaded plugs by calling this method on them. Two of the arguments to this method are the parameters that were provided with the requests, or in case of a response the response values, and the direction of the request. The direction of the request indicates whether this request is incoming or outgoing. The third parameter is the context of the request and has many pieces of information.
  • the direction parameter allows determination of the direction and the context can be type-casted to either a ServiceContext or ClientContext to determine whether the plug is being invoked on the server-side or client-side.
  • This method allows the plug to insert the code that might be essential for its operation on the service-side.
  • the programming code itself is represented in XML and the plug adds to that XML. Later, the code generator converts that XML back to the programming language specific code.
  • An infrastructure plug has executable code associated with it.
  • the binaries associated with the remote service might also be required. All of these need to be in the appropriate directories on the machines where the business service is executing.
  • System administration tools allow creation of packages for these infrastructure services. These packages are then placed in the master vault so that they can be copied to any machine for correct deployment.
  • One significant feature of the disclosed system environment is its ability to provide a very configurable and dynamic runtime execution environment that a) provides a host for the business service implementation and b) integrates it with one or more infrastructure level services that are needed for its correct operation.
  • mappings of this virtual container to the physical containers for all supported underlying platform environment. Once these mappings have been defined, code can be automatically generated to produce the physical container from the virtual container.
  • the code for the physical container produced by the code generators is then compiled and linked with all the related binaries for the business service implementation as well as all the binaries for required infrastructure services. This is the code that can actually be deployed to an underlying platform environment and has a physical address and receive requests.
  • the runtime framework is a lightweight framework that provides the mechanisms hosting a business service implementation and allowing that hosted service to also leverage capabilities offered by one or more existing infrastructure services.
  • the framework processes the request through the plugs configured for the target service. In doing this, only those plugs are processed that have relevance to the client environment. Once this processing finishes, the request is then dispatched to the actual target service via its proxy. The response is again processed through the service plugs before it is returned back to the client implementation.
  • this framework transparently intercepts all incoming requests and processes those requests through the configured plugs for this virtual container. Once all those plugs have been processed, the service request is dispatched to the actual service implementation. Once that request finishes, the response is processed through all the necessary plugs and eventually forwarded back to the invoking client.
  • the framework In addition to managing the invocation of the related service plugs, the framework also provides extensive logging capabilities. The properties related to logging levels can be modified on-the-fly without any need to stop and restart applications.
  • the client-side and the server-side components of the framework separate the client implementation and the service implementation from the infrastructure capabilities completely. This actually allows the framework to provide various levels of quality of service such as reliable delivery and asynchronous reliable delivery. These capabilities can be customized for each virtual container.
  • the preferred embodiment provides mechanisms to partition a large IT environment into smaller logical partitions so that they can be configured with a set of infrastructure capabilities.
  • Business services are deployed in a deployment domain.
  • a set of related applications would be deployed in the same deployment domain.
  • This deployment domain would be configured with a set of infrastructure services necessary for the quality of service desired.
  • a deployment domain consists of one or more hosts. These hosts collectively define the logical boundary of the deployment domain. Any business services that are part of this domain can be deployed on any of the hosts in that are part of that domain.
  • a deployment domain also consists of one or more infrastructure services that in turn come from the list of globally available infrastructure services.
  • the significance of this subset of infrastructures services is to control visibility of the infrastructure services further and provide easy configuration of the business service containers.
  • a deployment domain consists of one or more business service containers created in that domain. These container can then be configured with one or more infrastructure services, those infrastructure services can be customized, code for physical container be generated and the services can be deployed.
  • a service context carries with it the necessary information that is required to process a request as well as general information that is common the environment. Service context in initialized once and then cached. If the service receives notification of changed metadata, then the service context can be re-initialized.
  • This context is initialized for the client's runtime. It initializes the metadata for the client, creates the pipeline for the required plugs for the client and also initializes the logging mechanism for the client.
  • This context accomplishes the same for the server-side runtime environment.
  • One of uses of these contexts are also to determine whether a particular piece of code is executing in the client environment or the server environment. While they both derive from the class Context they can be typecasted to either one of the derived class instances in order to decide.
  • plugs are loaded in such a way so that they can be unloaded and reloaded without bringing the application down. So for example, in .NET these plugs are loaded in separate application domains. This is important because the preferred system allows dynamic configuration and reconfiguration and software updates. This is evident from the following exemplary scenarios:
  • a business service is configured with a new infrastructure service.
  • the Composer tool modifies the metadata, copies the package contents for the new infrastructure service into the appropriate directories of the hosts that the business service is deployed on and then informs the business service container for the change.
  • Business service container can then load the plug for the newly configured service and insert it in the appropriate place in the pipeline.
  • An infrastructure service is removed from the configuration of a business service.
  • the Composer tool removes the plug from the metadata and removes the binaries from the appropriate directories from the deployed hosts.
  • the business service is then informed which then unloads the plug and removes it from the pipeline.
  • This kind of plug architecture allows the business service implementations to be completely devoid of any logic that relates to the infrastructure services thus making it possible to completely replace the infrastructure services and underlying products without effecting the service implementations or flow of business requests at all.
  • the system container generates the shell skeleton of a business service implementation. These derive from the class ManagedContainer from the runtime framework. This managed container provides the implementation of many of the methods that are necessary entry points into the runtime framework.
  • the logging levels of the logging mechanism can be changed. This method changes the logging level on-the-fly.
  • ManagedContainer allows applications to store named sets of data in a thread-safe manner instead of saving the state information in local variables in un-safe manner.
  • Smart proxies provide an environment for the client-side code that performs the same kind of processing as performed by the runtime on the server-side in the virtual container.
  • the smart proxies sit above the proxies that might be generated by tools such as Microsoft .NET platform, and uses those proxies.
  • the proxy retrieves the metadata for the target web service and for performance caches it. It then constructs a pipeline of plugs that the target service is configured with in the same manner that the server runtime does. However, only those handlers are configured that are relevant to the client.
  • Smart proxies may also be specialized by the intelligent code generation process.
  • the plugs for a load-balancing service might insert code for making load-balancing decision in the smart proxy itself during the request processing.
  • machine usable mediums include: nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs), and transmission type mediums such as digital and analog communication links.
  • ROMs read only memories
  • EEPROMs electrically programmable read only memories
  • user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs
  • transmission type mediums such as digital and analog communication links.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Stored Programmes (AREA)
  • Computer And Data Communications (AREA)

Abstract

A system and method for composing, configuring, deploying, and managing services in a data processing system and data processing system network. This system provides deployment domains to define a logical set of business services that have similar requirements for an application infrastructure. A deployment domain is created, and a graphical user interface allows a user to compose, configure, deploy, and manage services within the deployment domain and associated hosts using a drag-and-drop interface. A system and method for distributing and updating services software in the network and configuring heterogeneous underlying web services hosting platforms is claimed.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • The present application is a continuation-in-part of U.S. patent application Ser. No. 10/350,164, filed [0001] 23 Jan. 2003, for “System And Method For Composing, Configuring, Deploying, And Managing Services Using A Graphical User Interface,” which is hereby incorporated by reference, and claims the benefit of the filing date thereof.
  • This application also shares at least some common text and figures with, but is otherwise unrelated to, commonly assigned U.S. patent application Ser. No. ______ for “System And Method For Providing A Plug-And-Play Architecture For Integrating Infrastructure Services With Business Service Implementations,” Ser. No. ______ for “System And Method For Automated Code Generation Using Language Neutral Software Code,” and Ser. No. ______ for “System And Method For Customizing Infrastructure Services For Use In Network Services,” all filed concurrently herewith, and which are hereby incorporated by reference.[0002]
  • TECHNICAL FIELD OF THE INVENTION
  • The present invention is directed, in general, to data processing system services management. [0003]
  • BACKGROUND OF THE INVENTION
  • In the area of conventional business service development, there are, in general, three major roles, each role having specific tools to address its needs. [0004]
  • Application architects are primarily concerned with defining the contracts of the business services to meet the business requirements. An application contract consists of one or more interface definitions, reflecting the right level of interface granularity and service behavior such as operations exposed and their inputs and outputs. [0005]
  • An important aspect of the architect's task here is to ensure that existing interface types are reused so that multiple interface types and messages are not reinvented to fulfill similar requirements. [0006]
  • Once the correct interfaces have been defined, the application developers are ready to implement those interfaces. This often involves writing code that implements business logic. The developers also have to be able to unit test the code that they have just written. [0007]
  • Finally, once the code has been developed, it can be given to the system administrators for configuration, deployment and management. They can then configure the runtime execution environment for the newly developed service and deploy the application. Once deployed, the application can then be managed through the means available in the environment. [0008]
  • In the conventional development model, the applications are developed from scratch. This allows the users to perform top-down design and leverage the full capabilities of the available technologies since no baggage needs to be carried from the past. [0009]
  • Currently, there are 5 major phases of the lifecycle of the business services. In the model phase, the application architects design the interfaces for the business services to be developed. Once the interfaces have been designed, the business logic is developed by the developers of the system. The system architects then configure the runtime for the business service and the administrators then deploy and manage the business services. [0010]
  • In many cases, the business services already exist but are not manageable. These services may be either 3rd party off-the-shelf (COTS) applications or custom applications developed in-house or by system integrators. [0011]
  • This style of development is bottom-up development where the interfaces are actually constructed based on existing applications. The architects first use introspection to reverse engineer metadata from the existing applications. These applications may exist in one of many supported technologies such as Java classes, CORBA, EJB's, existing web services or COTS packages such as SAP or Siebel. Introspection would result in one-to-one interface generation. However, in real world, these interfaces may need to be refactored. Refactoring involves either suppressing some of the operation in an interface, creating brand new ones, combining two or more interfaces (contract aggregation) or splitting a contract into two or more contracts (contract dissemination). [0012]
  • It should be noted that the existing applications could also be web services. The process should however be no different than that for 3rd party COTS or custom applications supporting a particular technology. [0013]
  • Business logic generally does not change in nature. However, the underlying technologies are changing very rapidly. For example, there are a number of new standards that are being developed to address various aspects of distributed business services. Many standards do not have any sort of industry consensus and many areas have competing standards. However, the applications have to be developed today. Typically, the business services are written to provide all the other necessary functionality, such as security and others (application infrastructure services) that do not actually contribute to the business behavior itself. As the standards and technologies for these other services (application infrastructure services) evolve, the business services have to be modified and enhanced in order to take advantage of them. Furthermore, in the current state of the art, the configuration and deployment of these services is specific to a particular underlying environment and the underlying products. [0014]
  • There is, therefore, a need in the art for an improved system and method for distributing updated, modified, and enhanced services in a distributed network. [0015]
  • SUMMARY OF THE INVENTION
  • To address the above-discussed deficiencies of the prior art, and to provide generally improved systems and methods, it is a primary object of the present invention to provide an improved system and method for business services development and management in a data processing system and data processing system network. [0016]
  • The preferred embodiment provides a system and method for composing, configuring, deploying, and managing services in a data processing system and data processing system network. This system provides deployment domains to define a logical set of business services that have similar requirements for an application infrastructure. A deployment domain is created, and a graphical user interface allows a user to compose, configure, deploy, and manage services within the deployment domain and associated hosts using a drag-and-drop interface. A system and method for distributing and updating services software in the network and configuring heterogeneous underlying web services hosting platforms is claimed. [0017]
  • The foregoing has outlined rather broadly the features and technical advantages of the present invention so that those skilled in the art may better understand the detailed description of the invention that follows. Additional features and advantages of the invention will be described hereinafter that form the subject of the claims of the invention. Those skilled in the art will appreciate that they may readily use the conception and the specific embodiment disclosed as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. Those skilled in the art will also realize that such equivalent constructions do not depart from the spirit and scope of the invention in its broadest form. [0018]
  • Before undertaking the DETAILED DESCRIPTION OF THE INVENTION below, it may be advantageous to set forth definitions of certain words or phrases used throughout this patent document: the terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation; the term “or” is inclusive, meaning and/or; the phrases “associated with” and “associated therewith,” as well as derivatives thereof, may mean to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, or the like; and the term “controller” means any device, system or part thereof that controls at least one operation, whether such a device is implemented in hardware, firmware, software or some combination of at least two of the same. It should be noted that the functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. Definitions for certain words and phrases are provided throughout this patent document, and those of ordinary skill in the art will understand that such definitions apply in many, if not most, instances to prior as well as future uses of such defined words and phrases. [0019]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, wherein like numbers designate like objects, and in which: [0020]
  • FIG. 1 depicts a block diagram of the relationships between service layers in accordance with a preferred embodiment of the present invention; [0021]
  • FIG. 2 depicts a block diagram relating a development and deployment lifecycle with data objects and service objects in accordance with a preferred embodiment of the present invention; [0022]
  • FIG. 3 depicts a block diagram of a runtime environment in accordance with a preferred embodiment of the present invention; [0023]
  • FIG. 4 illustrates a federated metadata storage and access system in accordance with a preferred embodiment of the present invention; [0024]
  • FIG. 5 depicts a virtual composition environment in accordance with a preferred embodiment of the present invention; [0025]
  • FIG. 6 depicts a block diagram of a virtual container accordance with a preferred embodiment of the present invention; [0026]
  • FIG. 7 depicts a flowchart of a process in accordance with a preferred embodiment of the present invention; and [0027]
  • FIG. 8 depicts a flowchart of a process in accordance with a preferred embodiment of the present invention. [0028]
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIGS. 1 through 8, discussed below, and the various embodiments used to describe the principles of the present invention in this patent document are by way of illustration only and should not be construed in any way to limit the scope of the invention. Those skilled in the art will understand that the principles of the present invention may be implemented in any suitably arranged device. The numerous innovative teachings of the present application will be described with particular reference to the presently preferred embodiment. [0029]
  • Definitions: Following are short definitions of the usual meanings of some of the technical terms which are used in the present application. (However, those of ordinary skill will recognize whether the context requires a different meaning.) Additional definitions can be found in the standard technical dictionaries and journals. [0030]
  • Business Service Contract—A business service contract describes the business service exposed. This normally contains information such as operations provided by the service, their inputs and outputs. [0031]
  • Business Service Implementation—A business service implementation is the software code required strictly to implement the above mentioned business behavior. This does not include other capabilities such as providing security or managing transactions. [0032]
  • Application Infrastructure Services—Application Infrastructure Services are all those services that themselves do not contribute to the business behavior, however they are necessary for the correct operation of the business service. These services can be added, removed or replaced without changing the business behavior of the business service. [0033]
  • Virtual Container—A virtual container couples a business service implementation with one or more application infrastructure services and provides the definition for a complete business service. This definition exists in metadata and contains all the metadata that customizes the specific usage of application infrastructure services inside the said virtual container. [0034]
  • Physical Business Service—A physical business service is the platform specific programming code that can be generated according to the previously discussed definition of the virtual container. This code can then be compiled and deployed in the underlying platform specific manner. [0035]
  • Web Services will soon be providing complex and mission critical services to business partners and internal customers by providing a viable alternative to most application integration scenarios. [0036]
  • The disclosed embodiments provide a system and method for composing, configuring, deploying, and managing services in a data processing system and data processing system network. This system provides deployment domains to define a logical set of business services that have similar requirements for an application infrastructure. A deployment domain is created, and a graphical user interface allows a user to compose, configure, deploy, and manage services within the deployment domain and associated hosts using a drag-and-drop interface. A system and method for distributing and updating services software in the network and configuring heterogeneous underlying web services hosting platforms is claimed. [0037]
  • The metadata is managed by a federated metamodel system. A visual composition environment allows composition of a virtual container that couples the business service implementation in question with the application level infrastructure services that it needs. The code generators can then generate platform specific code for the virtual container. All this can be packaged for easy shipment. The packaged business services can then be easily deployed on any of the machines available to the system. [0038]
  • The disclosed embodiments include a method and system for describing the underlying application services infrastructure, a virtual execution environment for business services implementations and a system to integrate the two in a loosely coupled way through metadata so that the two can evolve independently and still stay compatible. [0039]
  • In the preferred embodiment, a deployment domain is created, and a graphical user interface allows a user to compose, configure, deploy, and manage services within the deployment domain and associated hosts using a drag-and-drop interface. [0040]
  • Furthermore, once the metadata has been defined, it becomes very easy to provide user interface based tools that allow construction of a business service by visually composing an execution environment for the already-built business service implementation. The implementation itself does not know about the kind of the environment in which it will be deployed. Because of this, the implementation can be deployed in execution environments that provide vastly different quality of service. [0041]
  • The preferred embodiment includes the following features: [0042]
  • The ability to build business service implementations without any knowledge of the underlying infrastructure environment. [0043]
  • The ability to describe a deployment environment without any knowledge of what kind of business services will be deployed in it. [0044]
  • The ability to enhance an infrastructure environment by providing custom application infrastructure services. These services, by implementing abstract interfaces, can be plugged into any supported infrastructure environment. These application infrastructure services provide discrete non-business related services and do not make any assumptions about who is going to use them and how will they be used. [0045]
  • The ability to construct a virtual container, once the business service implementations have been developed, that integrates them with preexisting infrastructure services and allows for better management. [0046]
  • The ability to describe various components and provide plug-and-play development and deployment using a metadata foundation. [0047]
  • FIG. 1 illustrates these objectives further. A [0048] management framework 120 hides the underlying application server environment 140 from the business service implementation 110 and augments the underlying environment by providing the ability to add and integrate application infrastructure services. Further, an implementation framework 130 can be provided that even provides implementation services 150 such as a database management system.
  • The preferred embodiment provides a platform that provides a level of abstraction, much higher than the one that is provided by application servers and other web services platforms currently available. This platform brings the development, configuration, deployment and management capabilities to the business services. [0049]
  • The lifecycle shown in FIG. 2 relates to either doing new development or introspecting existing application for the purpose of converting them into managed business services. As described above, the lifecycle includes the model or [0050] introspection phase 205, in which the application architects design the interfaces for the business services to be developed or introspect an existing service. In the case of new development, once the interfaces have been designed, the skeleton of business service implementation can be generated and then developed by the developers. In case of existing service, once the existing service has been introspected, a gateway implementation can be automatically generated 210. The system architects then configure 215 the runtime for the business service. Finally, the administrators then deploy 220 and manage 225 the business services.
  • One disclosed feature of the preferred embodiment is a federated meta-[0051] model 230 that stores and provides access to the metadata describing the business services themselves and their infrastructure. This metadata describes the interface of the business service itself, the metadata about those infrastructure services, and the metadata about the virtual container that couples a business service implementation with one or more infrastructure services along with their uniquely customized properties.
  • The preferred embodiment is designed to expose a level of abstraction higher than those provided by [0052] industry standards 240. The standards and technologies in the web services area are changing very rapidly. As a result, the business services that leverage those standards run the risk of becoming outdated very quickly. The preferred embodiment exposes a higher level interface that can be generated by the metadata itself. This results in more stable and longer-lasting applications.
  • The preferred embodiment provides the horizontal platform that can be used to build the vertical solutions that are more specific to industries in the form of industry specific templates [0053] 250. These solutions do not have to be complete themselves. In fact, most likely these solutions will be partial solutions designed to be extended for particular business problems.
  • Once the business services have been created, they can be orchestrated [0054] 260 using business service orchestration tools. These orchestrations themselves can be manifested as web services, thus forming a recursive relationship.
  • FIG. 3 describes the runtime environment for which the business services are configured and in which they are deployed. This architecture is described here at the logical level and can have one or more physical manifestations, in accordance with the disclosed or claimed embodiments. [0055]
  • A [0056] deployment domain 300 is a mechanism for partitioning a large IT environment into smaller logical clusters of machines and applications so that these different clusters can be configured differently from each other. In this case, these deployment domains serve to logically separate environments with different requirements domain. For example, there may be a deployment domain called internal applications. This domain may be configured with a specific security service. Another domain may be for business partners and may be configured with a different kind of security service. Additionally, this domain may also be configured with a management service, e.g., to bill the users for usage of the business service. The deployment domain serves to define the scope of the infrastructure services that it is composed of and the business services that are deployed in it.
  • The deployment domain defines the logical boundaries and scope of the infrastructure and business services within it. It is a logical partition of a large computing environment which consists of many physical machines. The metadata data related to the deployment domain defines that logical partition. [0057]
  • One or more physical machines can be configured for a deployment domain and one or more application infrastructure services can be made part of the fabric that is a deployment domain. Each server machine, called a host, that is configured to participate in one or more deployment domains will contain a core software service. [0058]
  • The metadata that describes a host can include such items as host name, host's IP address, the core directory path on the host for the application, etc. [0059]
  • Since there is a many-to-many relationship between the hosts and deployment domains, a list of hosts can exist independently of the deployment domains. When a host is configured for a deployment domain, it has to be able to run all of the business services deployed in that domain. The application infrastructure services do not have to run on the host because they can themselves be remote. [0060]
  • An application infrastructure service is defined as a service that provides a discrete non-business level service. Some examples of infrastructure services are security services, transaction services, service monitoring, load balancing, fault tolerance, and messaging service. An infrastructure may also provide some other services such as reliable delivery or asynchronous messaging. These services can also be much higher level; services such as accounting & billing services, service level agreement management services and user profile management services. [0061]
  • The best way to characterize an application infrastructure service or differentiate it from a business service is that business service in itself performs a business function, such as procurement or a human resource system. In contrast, an infrastructure service provides secondary functionality that is not part of the business functions itself. [0062]
  • The metadata of an infrastructure service consists of property sheets with each property sheet containing one or more related properties. For example, a security service may contain five sheets for general properties, authentication, authorization, message integrity, and message confidentiality. Each sheet contains properties that allow customization of the underlying infrastructure service for this specific use. Since these properties are specific to the underlying service, their interpretation is left completely up to the service itself and its plugin. Furthermore, since the property values are specific to the specific usage of this service, these properties need only be defined once a virtual service container is configured with this service. [0063]
  • Once an infrastructure service has been written or purchased, it has to be made part of one or more deployment domains so that it can be used. This is accomplished by defining an abstract plugin interface. This interface allows the deployment management tools and runtime software to plugin an infrastructure service into the deployment domain and allows the service to be used at runtime. The tools that allow the user to visually configure the virtual service container may allow mechanisms to “drag” the infrastructure service and “drop” it on the virtual service container on a canvass. The tools can at this time present the required set of properties to be defined for the service for this particular container. This is accomplished by requesting the plugin to provide its customizable property sheets so that they can be filled. [0064]
  • At runtime, the virtual container receives the requests sent to the business service and invokes plugs for all the application infrastructure services configured for this container. The plugin can then retrieve the metadata and use it to perform the work. If the actual infrastructure service is implemented as a set of libraries, then the plugin can invoke those libraries or if it represents a remote service then it can communicate with that remote service in a manner that is specific to that infrastructure service. In any case, the runtime is not aware of the details of the operation—it simply invokes the plugin and passes it the runtime invocation-related data. [0065]
  • Each infrastructure service is therefore required to implement the plugin interface as a precondition to it becoming part of an infrastructure. An infrastructure service may provide different plugins for different deployment domains. The location and other necessary information required to load the plugin is part of the metadata of the infrastructure service. [0066]
  • A business service implementation is an implementation of the business behavior that a service is expected to provide. This behavior should be implementable in a manner independent of how it is accessed. For example, it should be possible to implement the business logic for a procurement service without being specific to Jave [0067] Platform 2 Enterprise Edition (J2EE)-based access or Microsoft .NET based access. However, once the service has been constructed, it may be deployed in a virtual container 320 that is specific to the underlying platform. This virtual container then decouples the service implementation from the infrastructure in which it is deployed.
  • This [0068] virtual service container 320 is conceptually similar to a J2EE container to the extent in that it provides the several needed services such as transaction and database management. However, unlike J2EE like containers, these services are not fixed but can be added, removed and updated. The virtual container 320 of the preferred embodiment, is a higher level concept. It views an environment as a collection of discrete higher level services and recognizes the need for business services to be integrated with those higher level services. It limits its scope to the infrastructure level services and does not provide those services that are needed for implementing the business logic, such as database management.
  • The container is called “virtual” because it itself is a platform independent definition rather than a physical implementation. It is described in terms of metadata. The metadata for the container describes the business service implementation that is it hosting. This service was built using the development tools and its definition is part of the development metadata. In an integrated system of tools, the deployment tool may retrieve this definition from the development metadata repository. [0069]
  • The metadata for the container also describes one or more application infrastructure services required by the virtual container. When a virtual container is created, it is created for a particular deployment domain. This deployment domain is already preconfigured with one or more infrastructure-level services. The deployment engineer can select from those infrastructure services and integrate them into the container using visual mechanisms such as dragging and dropping them on the container. At this time, the tools may invoke the plugin and bring up the set of properties necessary to correctly use the infrastructure-level service. [0070]
  • Once the virtual container has been defined, there is enough metadata to generate a physical implementation of the virtual container, build it, package it and transfer the required binaries to the host. Once this is done, the business service is ready to be deployed and used. When the code is generated, it is generated according to some pre-defined mappings of the metadata to the underlying platform. So for example, the physical implementation for .NET platform may be quite different from the physical implementation for J2EE. These mappings define what elements of the metadata generate what kind of code for the underlying platform. [0071]
  • Many underlying platforms either need to add software code that is specific to them or require certain information in various configuration files for the applications to function properly. For example, an application infrastructure service using microsoft's implementation of WS-Security specification requires certain information to be placed into the .NET specific configuration files. Also, some application infrastructure services may need to insert specific programming code in the generated code. For example, a load balancing service may need to insert specific programming code in the generated container code as well as the generated client proxy to properly exploit its capabilities. For this reason, the code generators involve the application infrastructure service plugs in the code generation process. When code generator starts, it also loads the plugs for the infrastructure services being used by the container. All code to be generated, whether it is language code or configuration code is represented in XML. The code generator first creates XML documents for all the code that it wants to generate. It then invokes the infrastructure service plugs and provides them an opportunity to add code specific to them by passing the XML documents representing the code to be generated. Once all the plugs have added their code, the code generator converts the XML documents back into either language specific code or configuration code, as necessary. This way, the code generation process can be kept completely independent of a particular infrastructure service while still allowing them to customize the generated code. [0072]
  • The separation between the business service implementation and the underlying environment provides two benefits. First, it allows the underlying application infrastructure and the business service implementation itself to evolve independent of each other. Secondly, this allows the physical manifestation of the hosted service to leverage fully the capabilities offered by various infrastructures. This is explained in more detailed below, but simply put it means that the [0073] virtual container 320, through metadata 330 and visual tools, can be visually composed to integrate one or more services offered by the underlying infrastructure. Since this integration is performed through the virtual container and at configuration time, it does not become part of the service implementation itself. The same procurement service can then be configured and deployed in two different deployment domains providing different levels of service.
  • Once the container has been configured and its software code has been generated and built, a package can be created that includes all the necessary platform specific binary assemblies required for this service. This package is then placed in a master vault. At this point, a visual deployment tool can provide some mechanism such as drag-and-drop to deploy this business service on any machine that is part of the deployment domain. If a host is then dragged and dropped on the virtual container, its package is collected from the master vault and brought over to the machine being dragged and dropped. This package is then opened up and its contents are extracted. These contents are then configured in a manner that is specific to the underlying platform. [0074]
  • The actual addressable and accessible service is then provided by the physical form of the [0075] virtual container 320 which can be specific to the underlying environment.
  • The traditional definition of management services tools [0076] 310 are network managers. The management services and tools described here have more application level context than the system level context. Some examples of management tools are business service monitoring tools, service level agreement (SLA) managament tools, fault tolerance tools, application event handling, billing and accounting services or user profile management.
  • Various application infrastructure services may provide their own management tools that will use the data collected by their plugins. [0077]
  • The most fundamental and core capability of this architecture is the [0078] metadata 330. The metadata described here is logical metadata. Logically, each deployment domain 300 has its own instance of metadata 330. This metadata describes the deployment domain itself in terms of the infrastructure services that it is able to offer and the virtual service containers 320 that are deployed in it.
  • As a general rule, the exact form that the metadata is stored in is not important. The platform can choose an XML format, a relational database or some binary form. [0079]
  • FIG. 4 illustrates a federated metadata storage and access system with various possible clients of the metadata. The development tools will require metadata that describes the team development environment and will allow sharing of development artifacts. One exemplary implementation of the metadata architecture is illustrated below. [0080]
  • The metadata has been described above as a part of other elements. It is useful to note that the two kinds of metadata that are relevant here are configuration/deployment metadata and operational metadata. [0081]
  • The configuration/deployment metadata is used by the configuration and deployment tools as well as by the runtime system. This data will not change often but will rather be accessed concurrently by large number of users. A configuration metadata server should preferably offer extensive caching features where the data is handed out with a time-to-live parameter indicating how long the client can use the data before being required to refresh it. [0082]
  • Operational metadata is used by one or more infrastructure services such as a monitoring service, load balancing service, and fault-tolerance service. This data tends to change very frequently and the tools that present this data, for viewing and analysis, may be required to refresh based on user preferences. [0083]
  • The following is an exemplary case use in accordance with the preferred embodiment. Here, we look at a typical use case scenario of a large bank that serves consumer loan market. The bank has a large internal IT organization, responsible for delivering the business services to its users. The IT organization has to overcome the challenges of building applications that will survive the changing technology. Furthermore, the enterprise considers the conformance of industry standards as its strategic goal. [0084]
  • The two initial applications that have been identified have different needs. The first application is an Online Loan Approval System. Although the logic for credit-approval already exists in the form of many small systems, the bank wants to build a new system that uses that logic but re-implements it in a more consolidated and scalable manner. Previously, the bank employed a large loan approval department that received the loan requests either through fax or telephone and used these multiple systems to score the applicant's credit history and make the loan decisions. However, the bank wants to make this system available online so that the applicant's could themselves apply for the loan. In addition to its potential clients, the bank may also decide later on to make this system available to its smaller business partners to get credit history of clients and to provide services such as credit risk scoring. For those services, the bank may charge those business partners on a per-transaction basis. [0085]
  • The second system is an application, called Customer Service Online system, that will allow bank's consumer loan clients to get the status of their accounts, directly without going through customer service. This information already exists in a legacy J2EE system that is deployed in the internal secure network. The bank wants to build a front-end web service to this system. [0086]
  • In order to meet its strategic technical objectives, the bank has standardized on toolkit in accordance with the preferred embodiment. The bank also has a well-structured group that runs its data centers. The data center has system architects and system administrators who collectively run the managed environment for all the bank's applications. [0087]
  • As is with any system, the normal steps of requirements gathering and requirements analysis are performed. These steps are no different than any other application development project. However, once the requirements have been analyzed, the application architect will transform the requirement for the Online Loan Approval System into a business interface. This business interface becomes the contract that has to be implemented. The logic that implements this business interface is termed as the business logic that has to be developed. [0088]
  • The application architects use a off-the-shelf modeling tool to model the service contract. This contract identifies the operations (business functions) that the service exposes, defines a type system that defines the data required as inputs or is returned as outputs by those operations. This business interface is critical data because it defines the Contract between this business service and its users. Once the application architects have stabilized the business contract, they extract contract information from the modeling tools and generate metadata in a metadata repository, in accordance with the preferred embodiment. [0089]
  • The development team then takes this business contract and conducts a detailed design and develops the business logic. The development team decides to use C# as the development language and the implementation is developed as C# assembly. [0090]
  • The development team only focuses on implementing the business logic as required by the business contract. They do not address other key issues such as security, billing or scalability. Their efforts are strictly focused on building one or more assemblies that implement the business logic. [0091]
  • Once the implementation has been built and tested in stand-alone mode, an implementation package is created that contains the necessary metadata and DLLs and is handed over to the data center that is responsible for deploying and managing bank's applications. [0092]
  • The customer service system presents a different scenario than the first one. The bank really does not want to change the exiting system. The system works well and already has all the necessary functions required to fulfill the task. However, this system was purchased by the bank from a 3rd party and provides no way for bank to expose it to external users and is not manageable. [0093]
  • The application architects have decided to use a system in accordance with the preferred embodiment to build a front-end gateway service that will expose the functionality of this system to the external users and will conform to the strategic goals of the bank in being standards compliant and be manageable. [0094]
  • This process is very simple. The introspection capabilities of the preferred embodiment are used to analyze the J2EE interfaces exposed by the existing applications. From these, then one or more functions are selected and system then automatically generates the required metadata, populates the metadata repository and then generates a gateway implementation that can delegate requests to the existing system. As in the previous case, this gateway implementation is then packaged in JAR files and an implementation package is created. This implementation package is then handed over to the data center that is responsible for configuring, deploying and managing bank's applications. [0095]
  • Once the data center receives an implementation package, it is ready to configure the service. It is assumed that by this time the minimal metadata that describes the service interface has been defined in the metadata repository. [0096]
  • The data center already has several different deployment domains configured. The data center also uses several infrastructure services such as Security. For some of its infrastructure services, the vendors provided toolkit-compatible plug-ins and for others the data center wrote its own. In either case, those infrastructure services are properly configured for the preferred embodiment and fit in its plug-and-play architecture. [0097]
  • Configuring a business service involves several different steps that allow a business service implementation to be transformed into a managed and hosted web service. [0098]
  • The business service implementation provided to the data center is an implementation package that contains one or more DLLs or JAR files that implement the business behavior. These implementations lack the appropriate environment required to make the business service addressable and hostable and they also lack the necessary infrastructure capabilities such as security. [0099]
  • The first step that the system architects do is to define a virtual container. This virtual container extends the metadata describing the service contract with metadata relating to the desired infrastructure services. This metadata will be used later on to create a physical web service that will provide a proper execution environment for the business logic implemented by the developers and will provide the flexible management environment required by the data center to perform its functions. [0100]
  • During this process, the system architects also decide what infrastructure level capabilities (security, transactions, etc.) are required for this business service. They then use the drag-and-drop facilities available in the visual composition environment of the preferred embodiment to create this container. As new infrastructure services are dragged onto the virtual container, these infrastructure services plugs are invoked by the graphical environment and at this time, these plugs populate the metadata with a set of properties that they would like to be customized. The graphical environment then presents those properties in a property editor and lets the system architect provide unique values of those properties. They can also customize the container itself by setting its logging levels as well as choose the correct QoS parameters such as various delivery modes. [0101]
  • Once the virtual container has been configured, the system architects can select the target platform for this web service. For example, if the business implementation is written in Java, then the potential target platforms can be any of the J2EE environments supported by the installation. Alternatively, if the implementation was provided in DLLs, then the target platform can be Microsoft's .NET environment. [0102]
  • Once the target platform has been selected, the composer tool can generate the code necessary for a web service that can be physically deployed and managed and then build that code along with the provided implementation into an executable. The composer then creates a deployment package that contains all the necessary DLLs or the JAR files required for deployment. [0103]
  • This package is then automatically placed in a master vault that is managed by the system of the preferred embodiment. All machines that are configured in the data center have an agent service running on them. These agents cooperate with each other to transfer packages in and out of the master vault and configure particular underlying target platforms for business services. [0104]
  • Once a deployable package has been created for a web service, the composer tool can be used to drag different hosts on a business service. This drag-and-drop operation triggers the actual deployment process. [0105]
  • When a host is dragged on a business service, the SOA Agent running on that host retrieves the deployment package from the master vault, unpackages it on that machine, performs the steps necessary to configure the underlying environment and makes the web service addressable. [0106]
  • A web service can be undeployed from a host by selecting that host in composer tool and simply deleting it from there. This results in all traces of that package being removed from the machine. [0107]
  • One a service has been deployed, it can be easily managed. Whenever, a request is sent to that service, the physical container provided by the runtime environment receives it. The runtime environment then executes all the necessary infrastructure services configured for this container and then invokes the business implementation provided by the user. When it gets the response from the business service implementation, it re-invokes any necessary infrastructure services and sends the response back to the caller. [0108]
  • As the technology changes, the infrastructure services can change. The system architects can use the composer tool to slowly transition the deployed business services from an old or obsolete module to a new module by simply removing the old plug from the business service and using drag-and-drop to configure the business service with new plug. The preferred embodiment automatically removes older DLLs or JARs from the physically deployed services and copies the new ones for the new plug. The business services adjust to the new infra-structure service without the typical need for interruption and modification. [0109]
  • To continue the bank example, after the Online Loan Approval service has been deployed, the bank decides to make that service available to its business partners for a price. An internal infrastructure level billing service is developed (along with its toolkit compatible plug) and configured. The system architects simple drag this infrastructure service on the Online Loan Approval service, without modifying the business implementation or bringing the service down. The preferred embodiment automatically modifies the metadata, reconfigures the deployed services and the runtime environment starts using this new infrastructure service when requests are sent to the business service. [0110]
  • One specific feature of the preferred embodiment is a visual composition environment. The preferred embodiment uses visual tools to generate metadata. These tools can present the core metadata in a tree structure as shown in FIG. 5. [0111]
  • FIG. 5 shows an [0112] exemplary user interface 500 for a visual composition environment in accordance with the preferred embodiment. GUI interface 500 is divided into multiple areas, including available objects area 510, active object identifier 540, related objects area 520, and properties area 530.
  • [0113] Available objects area 510 shows all objects that are available to be configured or deployed, including hosts, infrastructure services, service implementations, and deployment domains. The folder named “hosts” contains the list of all available hosts in the entire managed space. The information that is visible for each host in this list can be such as the name of the server and its machine address.
  • The folder named “infrastructure services” contains a list of all available infrastructure services. This information preferably does not contain anything more than the name of the service and its description and purpose. These are all the infrastructure services available to be deployed. [0114]
  • The folder named “implementation services” contains all the implementation packages that have been made available. Each of these contain the related metadata describing the service contract as well as the binaries that contain the actual implementation of that service contract behavior. It is also possible to further group the service implementations. [0115]
  • The folder named “deployment domains” contains the deployment domains underneath it. Each deployment domain can have a folder of its own. Each deployment domain furthermore has one folder for each virtual container in it. The folder for the virtual container all the infrastructure services that it is configured with and all the hosts that it is deployed on. [0116]
  • [0117] Active object identifier 540 shows which object is currently active. Here, “Domain 1” is the active object; this label will change to correspond to whichever object the user is acting upon. This area is actually sensitive to whether a deployment domain is selected or a virtual container is selected.
  • [0118] Related objects area 520 shows all objects, grouped according to type, which are currently associated with the active object. In this example, because deployment domain “Domain 1” is the active objects, the related objects area 520 shows all hosts, infrastructure services, and virtual containers for business services that are currently deployed in Domain 1. In this example, both Host 1 and Host 2 are associated with Domain 1, and the Security and Package Tracking services are deployed in Domain 1.
  • Note that if, for example, “[0119] Host 1” were the active object 540, then the related objects area 520 would display all deployment domains, infrastructure services, and virtual containers related to Host 1. Whatever type of object is showing as the active object 540, the other types of objects will be show in the related objects area 540.
  • Finally, [0120] properties area 530 is used to define and modify the properties for any object. When an object is selected anywhere in the user interface 500, any customizable properties related to that object will be shown in properties area 530. The user may then edit these properties as appropriate.
  • Using [0121] interface 500, the user can select an active object 540, then drag and drop objects between the available objects 510 and the related objects area 520. When an object is dragged from the available objects area 510 into the related objects area 520, the system will then perform all necessary file generation and configuration, as defined by the appropriate properties, to actually form the logical relationship between the dropped object and the active object. This process is described in more detail elsewhere in this disclosure, and the implementation is within the abilities of one of skill in the art.
  • For example, if the “Online Catalog” service implementation were dragged into the [0122] related objects area 520 when the active object 540 is “Domain 1,” then the system will automatically generate all necessary binaries, and transfer and install them as appropriate, to deploy the Online Catalog service in the Domain 1 deployment domain.
  • In the same manner, if an object is dragged out of the [0123] related objects area 520, then the system will remove its logical relationship with the active object.
  • Up to this level, the elements are those that exist in global space. These are elements or pieces of metadata that are not specific to a deployment domain. Further into the deployment domain, the metadata becomes more specific. [0124]
  • One or more hosts can be prepared to host a deployment domain. Similarly, a single deployment domain can span multiple hosts. All the hosts configured for a specific deployment domain appear in the folder belonging to that deployment domain. These nodes may contain data such as the working area to store different deployment packages containing different binaries and configuration files belonging to the infrastructure as well as business services in that deployment domain. [0125]
  • An infrastructure service can be configured in multiple deployment domains and a single deployment domain will have multiple infrastructure services. This relationship is similar to the many-to-many relationship that the hosts have to a deployment domain. When an infrastructure service is configured for a deployment domain, its related software, such as its plugins, is physically transferred to all the hosts that are configured for the domain. [0126]
  • When a new virtual service container is created, it is ready to be deployed to any of the physical machines. Each container has a folder of its own underneath the deployment domain folder. The list of hosts that appear here are the hosts where this container is physically deployed and the list of infrastructure services are the ones that his container is configured to use. [0127]
  • By organizing the information like this, a visual tool of the preferred embodiment can use drag-and-drop capabilities to compose the virtual service container. [0128]
  • FIG. 6 shows an exemplary virtual container represented on a canvas. In this figure, the larger outside cylinder is the [0129] virtual service container 600. The smaller cylinders inside the larger one represent the plugins 610 for the infrastructure services. At the end of the chain is the business service implementation 620 that the virtual service container is hosting. Using this representation, the user can drag and drop infrastructure services, configured for that domain, from either the tree structure or a graphical palette. Similarly, the container can be dragged onto a host in that domain, thus triggering the physical deployment.
  • Another feature is the unique customization of the use of the configured infrastructure properties through a system of property sheets. When a virtual container is configured with an infrastructure service, at that time the preferred embodiment loads the plug of the infrastructure service and invokes the plug, providing it the empty collection of property sheets. The plug responds by populating this collection with property sheets that contain properties that it is interested in. The runtime system and the composition tools do not know anything about these properties. One the plug has populated the property collections with properties specific to it, the composition tools presents those properties in a property editor that allows the user to provide unique values for those properties. These properties are then saved with the other metadata and can be changed later on. Each collection contains one or more property sheets and each property sheet contains one or more properties. This organization of properties allows for a more readable and understandable organization of the properties. [0130]
  • Another feature of the preferred embodiment is the code-generation capability. Once a container has been configured, its definition is complete. However, it is not yet ready to be physically deployed because it is only a definition at this point. However, since now the definition is complete, the user can select a target environment such as .NET or an EJB server. Once the target environment has been selected a code generation scheme can be selected to generate software code that maps the definition of the virtual container to the computer facilities offered by the underlying target platform. This code can then be compiled and linked with the runtime environment required by the platform and a package is created. [0131]
  • Various color coding schemes can be used to describe the state that the container is in. The possible stages identified include configured, packaged, and deployed. [0132]
  • The code generation software can additionally generate smart proxies that perform the equivalent of the virtual service container for the client. These smart proxies integrate the infrastructure services as defined by the business service for the client. For example, a business service may require the client application to authenticate itself against the security infrastructure service and send only the authentication token to the business service. A smart proxy will retrieve the metadata for the client and invoke the infrastructures configured for the virtual container that are relevant for the client environment. These plugs can then prompt the client for any data that they might require and use the runtime environment to send that data to the virtual container along with the rest of the request data. [0133]
  • Just as the virtual service container can be packaged into a distributable unit, the smart proxies can also be packaged into a distributable unit. These units can then be separately provided to those who are interested in building client applications to those business services. [0134]
  • Another feature of the preferred embodiment is software configuration capability. Once the code for the virtual service container has been generated, compiled, and packaged, the container can be placed into a packaged state. At this point, a host can be dragged on the container. This will cause the software configuration facility to perform separate steps: [0135]
  • It can transfer the deployment package that contains all the related files to the target host machine; [0136]
  • These files can then be unpackaged on that machine by this facility automatically and placed into the specific directories structure required by the underlying platform; [0137]
  • In the case of web services, the web server can be configured to know about the web service. Similarly in case of an J2EE, the EJB server can be configured to know about the service; and [0138]
  • The configuration files can be placed into the proper areas. [0139]
  • Once these steps have been performed, the virtual service container has been transformed into a physical service that can be invoked. [0140]
  • At a later time, when updates are made available for either the business service implementation or the infrastructure services plugs, the corresponding packages can be updated and these updates can be propagated to all the machines where the physicial business services are deployed. [0141]
  • FIG. 7 shows a flowchart of an exemplary process in accordance with the preferred embodiment. In this process, the user accesses a user interface and selects a deployment domain (step [0142] 705). The user then drags an icon representing a host system into the deployment domain area depicted on the user interface (step 710). In response, the host is associated with that deployment domain and any other objects in the deployment domain (labeled DD in figure, step 715).
  • The user drags an icon representing an infrastructure service (labeled IS in figure) into the deployment domain area depicted on the user interface (step [0143] 720). In response, the infrastructure service is associated with the deployment domain and any other objects within the deployment domain (step 725).
  • The user drags an icon representing a service implementation (labeled SI in figure) into the deployment domain area depicted on the user interface (step [0144] 730), thus starting the definition of a virtual container, and optionally specifies properties for the virtual container (step 735). In response, the service implementation is associated with the deployment domain and any other objects within the deployment domain (step 740).
  • The user then drags one or more infrastructure services from within this domain onto the virtual container (labeled VC in figure, step [0145] 745), and optionally specifies the properties for the infrastructure services (step 750). In response, the system associates this infrastructure service with the virtual container (step 755).
  • The system then evaluates any new or changed associations (step [0146] 760). The system generates any code necessary to implement the associations (step 765), and transmits and installs the generated code as necessary (step 770). In this way, the user is able to fully manage the deployment domain, and to deploy and manage the hosts and services within it, all using a simple and intuitive user interface.
  • It should be noted that in the exemplary process described above, and other processes described herein, not all steps must be performed at any given time. Furthermore, many of the process steps described above may be performed in any order, or repeated, without changing the nature of the process or the advantages it provides. [0147]
  • It should also be noted, as discussed above, that a similar method can be used when a host or service is first selected, then other services, hosts, or a deployment domain is then associated with that host or service using the drag-and-drop technique above. Similarly, the implementing code will then be generated and installed by the system. [0148]
  • Configuration Architecture [0149]
  • The preferred embodiment provides extensive capabilities to package software modules into packages, store packages in a master location, transfer packages in and out of that master location and configuring any supported underlying platform for a web service. [0150]
  • Most conventional software configuration mechanisms deal with software distribution on a desktop client. The preferred embodiment manages software distribution of web services, including the software for business service as well as the infrastructure services. It also configures the diverse underlying application server platforms such as Microsoft .NET or BEA WebLogic. Using the disclosed system and methods, the users can manage the automatic distribution of web services in a distributed network, distribute software updates remotely and transparently deploy that software on the underlying platforms. [0151]
  • The presently preferred system uses commonly available zip and compression algorithms to package software modules and other related files. All packages, which may include programming language specific code and binaries or platform specific assemblies are stored in the same format. [0152]
  • Core Package [0153]
  • One component of the preferred system is the runtime framework. Any infrastructure service plugs or business service implementation, or business service containers require the binaries from the framework in order to build successfully. [0154]
  • This package contains the core binaries of the framework. There is one such package for each supported language or compilation system. Initially, there may be multiple such packages, e.g., one for building things in Microsoft's .NET environment, another for Java, and others for other virtual environments. [0155]
  • Infrastructure Service Package [0156]
  • The infrastructure services are integrated by writing plugs that represent them in the system environment. These plugs are then distributed to the machines from which these infrastructure services are being used. However, in addition to these plugs, the binaries associated with the infrastructure service itself also need to be distributed. This package, one for each infrastructure service and for each compilation environment, includes the binary code for the software plug itself, as well as the compilation environment specific binaries for the infrastructure service. [0157]
  • Business Implementation Package [0158]
  • A service implementation package contains all the binaries required for the implementation of business logic. In case of .NET, this may be a dynamic linking library (DLL) that contains the code for the business service implementation and one or more DLLs required for correct linking and execution of the business logic implementation. Similarly for Java based platforms, the package may contain either one or more class files or JAR files. A manifest file describes each of these binaries. [0159]
  • Deployment Package [0160]
  • A deployment package contains the code necessary for the physical implementation of the virtual container. It does not include the code for the system framework itself or the infrastructure services or the business service implementations. Those packages are not included because they already exist in the vault separately and are copied only when necessary. [0161]
  • Master Vault [0162]
  • Master vault is a machine in the entire network that serves as the designated repository to store various packages during the entire lifecycle of the services. In a sense it is the file-server for the disclosed platform. The work area for master vault is represented by a top-level directory. [0163]
  • Underneath the root of the work area, there is a sub-directory for all the available Hosts. There is a file for each of the hosts that describes that host. [0164]
  • There is also a sub-directory for Service Implementations. In this sub-directory, each service implementation has a folder. In this folder, the raw metadata for the service, its contract definition and the implementation packages are kept as files. [0165]
  • There is a directory for deployment domains here also. This directory contains separate directory for each deployment domain. In this deployment domain, all the software packages for the configured business services are kept. [0166]
  • The metadata describing each deployment domain and everything underneath resides in high performance servers that have a caching and federation architecture for high performance and scalability. [0167]
  • Agents [0168]
  • An agent is a software service that runs on each machine. On windows based systems, this service can run as a Windows service and on non-windows machines, it can run as a background process. [0169]
  • This service provides all the logic necessary for managing the vault and software configuration of the supported underlying platform. One machine can be designated as the Master Vault. The agent that runs on that machine assumes the role of the master agent. This dual personality of the agents allows any machine to be designated as the master vault. The master agent receives the requests for transfer of software packages into and out of the master vault. The master agent also maintains a directory structure on the master vault for organizing various software packages. Depending upon the task to be performed, an agent may either perform the request itself or it may delegate the request to the agent running on the master vault. [0170]
  • Configuration Process [0171]
  • The agents are responsible for correct configuration of the underlying application services platform, with the least amount of input from the user. [0172]
  • As new infrastructure services are available, various tools are used to create or update their packages. As mentioned before, these packages are distributed throughout the network, wherever the business services that use these infrastructures are deployed. That means that the system has to be able to propagate the updates throughout the network when needed. This propagation process is coordinated by the tools provided by the environment. [0173]
  • FIG. 8 shows a process of this remote deployment and configuration of updated packages in accordance with a preferred embodiment of the present invention. Those of skill in the art will recognize that not all steps are required to be performed in the order described and some embodiments may combine certain steps or reorder them without departing from the invention. [0174]
  • The system first determines which remote systems are running an environment that requires an updated infrastructure service (step [0175] 810). Next, the business services running on those remote machines in the network are requested to pause their request processing (step 815). Next, the remote machines are requested to and will unload the existing software package (step 820).
  • Next, the software agents are used to transfer the updated package for the infrastructure service to that machine (step [0176] 825). The paused business service on each machine is then requested to reload the infrastructure package (step 830). After they have done so, the business services on the remote systems will resume request processing using the updated infrastructure services package (step 835). In this way, the infrastructure services are updated with a very slight impact on the processing of the remote systems, and without having to “bring down” any systems.
  • Packages for business service implementations are created and propagated in similar manner. [0177]
  • Creation of deployment package in the system involves multiple steps. First, an administrator uses system tools to configure a virtual container for the business service. This container exists only in metadata and is platform-neutral. The administrator then provides unique property values for fine-tuning. Next, the administrator selects a specific underlying platform and generates code for the physical container (the web service). The code generators generate code for that specific container according to the pre-defined mappings of the virtual container to the physical container. This code is then built and packaged into platform-specific packages. As described, this package does not need to include the package for the business service implementation as well as the infrastructure services, since this information is already available in the metadata. [0178]
  • When the administrator attempts to deploy the service to a specific host, the agents first determine the supported platforms on that machine. If multiple platforms are supported on that machine, then the user is prompted for the choice. Once the platform has been determined, the agent on the local machine collaborates with the master agent to retrieve the correct deployment package, as well the package for business service implementation and packages for all the configured infrastructure services from the mater vault. The contents of these packages are then extracted and copied to a file structure that is specific to the underlying platform. After that, the underlying platform itself is configured, e.g., Microsoft's IIS requires creation of a virtual directory while the J2EE platforms require modification of server configuration files. [0179]
  • Once this configuration is complete, the web service is ready to receive request. [0180]
  • Self Configuration & Self Healing [0181]
  • The preferred embodiment operates on the principal of minimum configuration and self-healing. The system is able to detect its own errors and attempt to take necessary actions to correct itself. [0182]
  • Infrastructure Service Integration [0183]
  • One particular feature of the preferred embodiment is the ability to integrate one or more infrastructure services with a business service to provide the desired level of support required for the correct operation of the business service. [0184]
  • This support is provided in such a way so that the infrastructure is very flexible. This infrastructure can be continually enhanced by adding more infrastructure services, removing the outdated or deprecated services or by updating the existing services with new versions. [0185]
  • This kind of flexibility first of all allows a managed environment to take full advantage of the changing technologies and evolving standards and new products coming onto the marketplace. The strength of the architecture is in providing a framework for making 3rd party products play in the disclosed environment rather than having to custom write infrastructure services to do what commercially available products already might do. [0186]
  • The infrastructure service integration capability also allows the services to be updated. So for example, if the new version of a service becomes available and the plug for that service has to be updated, the architecture should allow that kind of update as well. [0187]
  • The metadata that describes an infrastructure service consists of information required to load a service plug, properties that it is interested in and information necessary to determine whether the plug has relevance to client-side, server-side or both. [0188]
  • The information necessary for loading the plug dynamically is somewhat specific to the platform environment. For example, .NET environment would require the assembly that the plug is in and the name of the class that implements the plug interface. [0189]
  • The most important metadata for an infrastructure service, according to the presently preferred embodiment, is in the form of a property sheet collection. A property sheet collection contains one or more named property sheets. Each property sheet contains a set of related properties that the plug needs to tune its behavior for a specific usage. Each plug by default has a property sheet named “General” that contains some basic properties. These properties indicate whether the plug processes incoming messages or outgoing messages or both and whether it participates in the code generation process. Default values are assigned to these properties. [0190]
  • Later, when a business service virtual container is configured to use this infrastructure service, the plug for this infrastructure service is invoked and it adds specific properties to the property sheet collection. [0191]
  • The following table is an exemplary property sheet for a possible security service: [0192]
    Sheet Name Property Name Property Value
    General Process Incoming Messages true
    Process Outgoing Messages true
    Generate Code false
    Authentication Authentication Required true
    Authentication Type Service Based
    Authentication
    Authentication Domain domain.com
    Authorization Authorization Required true
    Authorization Resource http://someresource.com
    Role Based Permission true
    Role Namespace corporate
    Role Property roles
    Operation Domain DemoOps
    Encryption Encrypt Messages false
    Properties
    Encryption Type Symmetric Encryption
    Encryption Method
    Signature Signature Required False
    Properties Signature Method
  • This collection has 5 sheets that provide sets of properties related to each other. This allows the plug to have multiple properties with the same name but in different sheets. Various parts of the plugs runtime can retrieve these properties and use them as needed. [0193]
  • The metadata also describes whether a particular infrastructure service acts only on the server side or the client side or both. It further indicates whether the infrastructure service need to participate in the code generation process to provide code that is specific to it. [0194]
  • Plug-and-Play Integration [0195]
  • Each infrastructure service is represented in the system environment through a system plug interface. This plug represents an infrastructure service in the environment. The preferred embodiment itself does not differentiate between a specific kind of infrastructure service (e.g. it does not differentiate a security service from the transaction service). To this system, all infrastructure services appear the same and it invokes them at the right points during the message processing. A message processing model, for example, makes it possible to write service implementations and client programs that have absolutely zero knowledge of what infrastructure services are executing, what inputs do they require and what kind of extra information needs to be inserted in the messages or extracted from them for the correct operation. The service plugs therefore perform all that logic themselves in a completely encapsulated manner. [0196]
  • If an infrastructure service is a simple service and is implemented in terms of a library, the plug would wrap that service and the service would be invoked inline. However, most sophisticated infrastructure services are standalone third-party services. For example, a security service may have a separate service process that may perform authentication and authorization. For those kinds of services, the plug actually acts on behalf of the remote service inside the tool-time or runtime environment. [0197]
  • The system runtime defines an abstract interface known as ServiceHandler interface. A plug for an infrastructure service first has to implement this interface. [0198]
  • Initializing for Use [0199]
  • In this environment, an infrastructure service has no significance or identity until it is selected to be integrated inside a business service virtual container, and the metadata for an infrastructure service is mostly undefined until this point. However, when a user uses the composer tool to drag and drop an infrastructure service on a business service virtual container, the plug for the service is loaded in at that time and this method is invoked on the plug and the empty metadata container is passed to it. [0200]
  • In response, the plug populates the metadata with a set of properties. The properties are represented generically and related properties are organized into sheets for easy organization, traverse-ability and presentation. The plugs then populate the metadata with only those properties that are required by it to provide the proper behavior at runtime when it is invoked. [0201]
  • There are a few general properties that all plugs have and the system provides some default values for those properties. For example, by default, a property is added to the property sheet marked “General” that indicates that this plug does not participate in the code generation process. A plug may also override such properties at this time. [0202]
  • In addition to manipulating this property sheets collection, the plugs may also modify other pieces of metadata. For example, by default all plugs are marked as service-side as well as client-side plugs. This means that these plugs will be loaded and invoked by the runtime, regardless of whether it is in the client-side or server-side. However, for some plugs, it does not make sense to do that on the client-side. For example, for collection of service metrics, the plug of the monitoring service only needs to be invoked on the service-side. Hence this plug does not need to be distributed, loaded and invoked on the client-side. The plug can again override these values at this time too. [0203]
  • Once this method has successfully modified the metadata, this metadata can then be saved in the metadata server. [0204]
  • Initialize For Runtime [0205]
  • This method is invoked by the runtime when it loads the plug into the runtime for business service virtual container. At this time the plug can initialize tits internal data structures, allocate any resources that it needs to, and cache the needed metadata. [0206]
  • For example, if the plug represents a remote service then it would need to establish a connection with that service in order to communicate with it. Instead of opening that connection every time, the plug may need to open the connection in this method upfront and use it whenever needed. [0207]
  • Invoke [0208]
  • When the business service virtual container receives a service request, it invokes all the loaded plugs by calling this method on them. Two of the arguments to this method are the parameters that were provided with the requests, or in case of a response the response values, and the direction of the request. The direction of the request indicates whether this request is incoming or outgoing. The third parameter is the context of the request and has many pieces of information. [0209]
  • Since the plug interface does not differentiate methods required for client-side vs. server side and incoming vs. outgoing, the direction parameter allows determination of the direction and the context can be type-casted to either a ServiceContext or ClientContext to determine whether the plug is being invoked on the server-side or client-side. [0210]
  • Generate Configuration Code [0211]
  • Code generation process is described explained in detail below and elsewhere in this application, to the extent necessary to enable one of skill in the art to replicate the claimed inventions. Simply put, there is a strong need to provide the plugs with the opportunity of getting involved in the code generation process. If a plug has indicated that it does want that participation then this method is invoked to let the plug modify the configuration code to be generated by possibly adding its own specific code. [0212]
  • Generate Server Code [0213]
  • This method allows the plug to insert the code that might be essential for its operation on the service-side. The programming code itself is represented in XML and the plug adds to that XML. Later, the code generator converts that XML back to the programming language specific code. [0214]
  • Generate Client Proxy Code [0215]
  • This is similar to the above method except that it augments the code that makes up the client proxy. This is invoked only for those plugs that are client-side plugs. [0216]
  • Service Packaging [0217]
  • An infrastructure plug has executable code associated with it. In addition to the actual implementation of the plug interface for this infrastructure service, the binaries associated with the remote service might also be required. All of these need to be in the appropriate directories on the machines where the business service is executing. [0218]
  • System administration tools allow creation of packages for these infrastructure services. These packages are then placed in the master vault so that they can be copied to any machine for correct deployment. [0219]
  • Business Service Virtual Container [0220]
  • One significant feature of the disclosed system environment is its ability to provide a very configurable and dynamic runtime execution environment that a) provides a host for the business service implementation and b) integrates it with one or more infrastructure level services that are needed for its correct operation. [0221]
  • The construct for accomplishing that is the Business Service Virtual Container. This container is called virtual because it exists only in metadata definition. Furthermore, this definition is independent of any underlying platform. [0222]
  • The system then defines mappings of this virtual container to the physical containers for all supported underlying platform environment. Once these mappings have been defined, code can be automatically generated to produce the physical container from the virtual container. [0223]
  • The code for the physical container produced by the code generators is then compiled and linked with all the related binaries for the business service implementation as well as all the binaries for required infrastructure services. This is the code that can actually be deployed to an underlying platform environment and has a physical address and receive requests. [0224]
  • Just like the physical container generated from this metadata provides the execution environment for the service itself, physical code can also be generated for the client side proxies that are smart enough to interpret the metadata properly and can load and execute service plugs for correct usage of the infrastructure services. These are explained in more detail below. [0225]
  • Runtime Framework [0226]
  • The runtime framework is a lightweight framework that provides the mechanisms hosting a business service implementation and allowing that hosted service to also leverage capabilities offered by one or more existing infrastructure services. [0227]
  • On the client-side, the framework processes the request through the plugs configured for the target service. In doing this, only those plugs are processed that have relevance to the client environment. Once this processing finishes, the request is then dispatched to the actual target service via its proxy. The response is again processed through the service plugs before it is returned back to the client implementation. [0228]
  • On the server-side, this framework transparently intercepts all incoming requests and processes those requests through the configured plugs for this virtual container. Once all those plugs have been processed, the service request is dispatched to the actual service implementation. Once that request finishes, the response is processed through all the necessary plugs and eventually forwarded back to the invoking client. [0229]
  • In addition to managing the invocation of the related service plugs, the framework also provides extensive logging capabilities. The properties related to logging levels can be modified on-the-fly without any need to stop and restart applications. [0230]
  • The client-side and the server-side components of the framework separate the client implementation and the service implementation from the infrastructure capabilities completely. This actually allows the framework to provide various levels of quality of service such as reliable delivery and asynchronous reliable delivery. These capabilities can be customized for each virtual container. [0231]
  • Deployment Domains [0232]
  • The preferred embodiment provides mechanisms to partition a large IT environment into smaller logical partitions so that they can be configured with a set of infrastructure capabilities. Business services are deployed in a deployment domain. Generally, a set of related applications would be deployed in the same deployment domain. This deployment domain would be configured with a set of infrastructure services necessary for the quality of service desired. [0233]
  • A deployment domain consists of one or more hosts. These hosts collectively define the logical boundary of the deployment domain. Any business services that are part of this domain can be deployed on any of the hosts in that are part of that domain. [0234]
  • A deployment domain also consists of one or more infrastructure services that in turn come from the list of globally available infrastructure services. The significance of this subset of infrastructures services is to control visibility of the infrastructure services further and provide easy configuration of the business service containers. [0235]
  • Lastly, a deployment domain consists of one or more business service containers created in that domain. These container can then be configured with one or more infrastructure services, those infrastructure services can be customized, code for physical container be generated and the services can be deployed. [0236]
  • Service Contexts [0237]
  • A service context carries with it the necessary information that is required to process a request as well as general information that is common the environment. Service context in initialized once and then cached. If the service receives notification of changed metadata, then the service context can be re-initialized. [0238]
  • Client Context [0239]
  • This context is initialized for the client's runtime. It initializes the metadata for the client, creates the pipeline for the required plugs for the client and also initializes the logging mechanism for the client. [0240]
  • Service Context [0241]
  • This context accomplishes the same for the server-side runtime environment. One of uses of these contexts are also to determine whether a particular piece of code is executing in the client environment or the server environment. While they both derive from the class Context they can be typecasted to either one of the derived class instances in order to decide. [0242]
  • Loading Service Plugs [0243]
  • When a service starts, its metadata is retrieved and processed. An important part of this processing is to load the plugs for all the infrastructure services that the business service is configured with. Once these plugs have been loaded dynamically, they are organized into a linear pipeline and all the incoming messages are processed through that pipeline. The order of the plugs in the pipeline is the same as the order in which they appear in the composition environment. This order is important because the messages need to be processed like that. For example, if a security service needs to decrypt an incoming message, it is important that this service is the first one in the pipeline because otherwise the parameters might not make any sense to other services. Similarly, if metrics may need to collected about this service, it is important that those are taken last in the pipeline so that processing time for the other service plugs is not accounted for in the metrics for the actual business processing of the request. [0244]
  • These plugs are loaded in such a way so that they can be unloaded and reloaded without bringing the application down. So for example, in .NET these plugs are loaded in separate application domains. This is important because the preferred system allows dynamic configuration and reconfiguration and software updates. This is evident from the following exemplary scenarios: [0245]
  • 1. A business service is configured with a new infrastructure service. The Composer tool modifies the metadata, copies the package contents for the new infrastructure service into the appropriate directories of the hosts that the business service is deployed on and then informs the business service container for the change. Business service container can then load the plug for the newly configured service and insert it in the appropriate place in the pipeline. [0246]
  • 2. An infrastructure service is removed from the configuration of a business service. The Composer tool removes the plug from the metadata and removes the binaries from the appropriate directories from the deployed hosts. The business service is then informed which then unloads the plug and removes it from the pipeline. [0247]
  • 3. A new version of the infrastructure service is made available. The Composer tool copies the new package to the appropriate hosts, the binaries are copied to the appropriate directories and the business service is informed, which then reloads the package for that service. [0248]
  • When a request now comes in, it is received by the business service container. This container invokes the plug for each infrastructure in the same order as they appear in the pipeline. The next plug is invoked if the previous plug is successful. The processing stops whenever a plug is unable to invoke successfully. [0249]
  • This kind of plug architecture allows the business service implementations to be completely devoid of any logic that relates to the infrastructure services thus making it possible to completely replace the infrastructure services and underlying products without effecting the service implementations or flow of business requests at all. [0250]
  • Managed Container Interface [0251]
  • The system container generates the shell skeleton of a business service implementation. These derive from the class ManagedContainer from the runtime framework. This managed container provides the implementation of many of the methods that are necessary entry points into the runtime framework. [0252]
  • When a service starts up, an instance of this class is created. This container initializes the appropriate context. Once the metadata has been initialized, the container caches it. Some of the important methods are discussed below. [0253]
  • Metadata Refresh [0254]
  • When a business service receives a request to re-initialize its metadata because it has changed, this method clears the metadata cache, unloads all the loaded plugs and then re-initializes the metadata, thus rebuilding the plug processing pipeline. By providing this method through the managed container, services can be reconfigured without the need to stop and restart them. [0255]
  • Logging Levels [0256]
  • Through these tools, the logging levels of the logging mechanism can be changed. This method changes the logging level on-the-fly. [0257]
  • Get and Set Application Data [0258]
  • Most underlying web services platforms allow the applications to execute in a multi-threaded environment, processing multiple calls at the same time in separate threads. ManagedContainer allows applications to store named sets of data in a thread-safe manner instead of saving the state information in local variables in un-safe manner. [0259]
  • Smart Proxies [0260]
  • Smart proxies provide an environment for the client-side code that performs the same kind of processing as performed by the runtime on the server-side in the virtual container. The smart proxies sit above the proxies that might be generated by tools such as Microsoft .NET platform, and uses those proxies. When a client application instantiates a smart proxy, the proxy retrieves the metadata for the target web service and for performance caches it. It then constructs a pipeline of plugs that the target service is configured with in the same manner that the server runtime does. However, only those handlers are configured that are relevant to the client. [0261]
  • Once this pipeline has been constructed, all requests are processed through this pipeline. This kind of processing completely separates the implementation of the actual client from the processing of the infrastructure service code. So for example, the plug for a security service may prompt the client for the necessary user credentials and package them appropriately for transmission to the server side. They may also encrypt messages or sign them as necessary. A replacement of this security with a different one would mean that their plugs are replaced and the new plug may prompt the user for different kind of information. Again, the client implementation would not rally care and know about all that. [0262]
  • Smart proxies may also be specialized by the intelligent code generation process. The plugs for a load-balancing service might insert code for making load-balancing decision in the smart proxy itself during the request processing. [0263]
  • Those skilled in the art will recognize that, for simplicity and clarity, the full structure and operation of all data processing systems suitable for use with the present invention is not being depicted or described herein. Instead, only so much of a data processing system as is unique to the present invention or necessary for an understanding of the present invention is depicted and described. The remainder of the construction and operation of data processing system may conform to any of the various current implementations and practices known in the art, and unless otherwise noted herein, those of skill in the art will recognize that any claimed features of a data processing system can be implemented using conventional data processing system and data processing system network hardware, configured and programmed to operate as claimed and described. In particular, any steps of described processes can be implemented using known data processing system means. [0264]
  • It is important to note that while the present invention has been described in the context of a fully functional system, those skilled in the art will appreciate that at least portions of the mechanism of the present invention are capable of being distributed in the form of instructions contained within a machine usable medium in any of a variety of forms, and that the present invention applies equally regardless of the particular type of instruction or signal bearing medium utilized to actually carry out the distribution. Examples of machine usable mediums include: nonvolatile, hard-coded type mediums such as read only memories (ROMs) or erasable, electrically programmable read only memories (EEPROMs), user-recordable type mediums such as floppy disks, hard disk drives and compact disk read only memories (CD-ROMs) or digital versatile disks (DVDs), and transmission type mediums such as digital and analog communication links. [0265]
  • Although an exemplary embodiment of the present invention has been described in detail, those skilled in the art will understand that various changes, substitutions, variations, and improvements of the invention disclosed herein may be made without departing from the spirit and scope of the invention in its broadest form. [0266]
  • None of the description in the present application should be read as implying that any particular element, step, or function is an essential element which must be included in the claim scope: THE SCOPE OF PATENTED SUBJECT MATTER IS DEFINED ONLY BY THE ALLOWED CLAIMS. Moreover, none of these claims are intended to invoke paragraph six of 35 USC §112 unless the exact words “means for” are followed by a participle. [0267]

Claims (22)

What is claimed is:
1. A method for managing services, comprising:
identifying at least one remote system;
sending a request to the remote system to pause processing of at least one system service;
sending an updated software package to the remote system; and
sending, to the remote system, a request to install the updated software package,
wherein the remote system thereafter resumes the processing of the system service, using the updated software package.
2. The method of claim 1, wherein the system service is an infrastructure service.
3. The method of claim 1, wherein the system service is a business service.
4. The method of claim 1, wherein the updated software package includes additional software services which are not already installed on the remote system.
5. The method of. Claim 1, wherein the remote system unloads an existing software package after pausing processing.
6. The method of claim 1, further comprising receiving an instruction from a user to update software packages on remote systems.
7. The method of claim 1, wherein updated software packages are sent to multiple remote systems simultaneously.
8. A data processing system having at least a processing and an accessible memory, comprising:
means for identifying at least one remote system;
means for sending a request to the remote system to pause processing of at least one system service;
means for sending an updated software package to the remote system; and
means for sending, to the remote system, a request to install the updated software package,
wherein the remote system thereafter resumes the processing of the system service, using the updated software package.
9. The data processing system of claim 8, wherein the system service is an infrastructure service.
10. The data processing system of claim 8, wherein the system service is a business service.
11. The data processing system of claim 8, wherein the updated software package includes additional software services which are not already installed on the remote system.
12. The data processing system of claim 8, wherein the remote system unloads an existing software package after pausing processing.
13. The data processing system of claim 8, further comprising means for receiving an instruction from a user to update software packages on remote systems.
14. The data processing system of claim 8, wherein updated software packages are sent to multiple remote systems simultaneously.
15. A computer program product tangibly embodied in a computer-readable medium, comprising:
instructions for identifying at least one remote system;
instructions for sending a request to the remote system to pause processing of at least one system service;
instructions for sending an updated software package to the remote system; and
instructions for sending, to the remote system, a request to install the updated software package,
wherein the remote system thereafter resumes the processing of the system service, using the updated software package.
16. The computer program product of claim 15, wherein the system service is an infrastructure service.
17. The computer program product of claim 15, wherein the system service is a business service.
18. The computer program product of claim 15, wherein the updated software package includes additional software services which are not already installed on the remote system.
19. The computer program product of claim 15, wherein the remote system unloads an existing software package after pausing processing.
20. The computer program product of claim 15, further comprising instructions for receiving an instruction from a user to update software packages on remote systems.
21. The computer program product of claim 15, wherein updated software packages are sent to multiple remote systems simultaneously.
22. A method for managing services, comprising:
identifying at least one remote system;
sending a software package to the remote system; and
sending, to the remote system, configuration information for the software package,
wherein the remote system thereafter installs and configures the software package, using the configuration information.
US10/407,872 2003-01-23 2003-04-04 System and method to manage the distribution of services software in a distributed network Abandoned US20040148184A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US10/407,872 US20040148184A1 (en) 2003-01-23 2003-04-04 System and method to manage the distribution of services software in a distributed network
CA002510676A CA2510676A1 (en) 2003-01-23 2004-01-23 Distribution of services software in a network
PCT/US2004/001980 WO2004066105A2 (en) 2003-01-23 2004-01-23 Distribution of services software in a network
MXPA05007573A MXPA05007573A (en) 2003-01-23 2004-01-23 Distribution of services software in a network.
EP04704941A EP1586033A4 (en) 2003-01-23 2004-01-23 System and method to manage the distribution of services software in a distributed network
AU2004206591A AU2004206591A1 (en) 2003-01-23 2004-01-23 Distribution of services software in a network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/350,164 US20040148370A1 (en) 2003-01-23 2003-01-23 System and method for composing, configuring, deploying, and managing services using a graphical user interface
US10/407,872 US20040148184A1 (en) 2003-01-23 2003-04-04 System and method to manage the distribution of services software in a distributed network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/350,164 Continuation-In-Part US20040148370A1 (en) 2003-01-23 2003-01-23 System and method for composing, configuring, deploying, and managing services using a graphical user interface

Publications (1)

Publication Number Publication Date
US20040148184A1 true US20040148184A1 (en) 2004-07-29

Family

ID=32735511

Family Applications (5)

Application Number Title Priority Date Filing Date
US10/350,164 Abandoned US20040148370A1 (en) 2003-01-23 2003-01-23 System and method for composing, configuring, deploying, and managing services using a graphical user interface
US10/407,812 Active 2027-02-27 US7657898B2 (en) 2003-01-23 2003-04-04 System and method for customizing infrastructure services for use in network services
US10/407,849 Expired - Lifetime US7263686B2 (en) 2003-01-23 2003-04-04 System and method for automated code generation using language neutral software code
US10/407,896 Abandoned US20040148185A1 (en) 2003-01-23 2003-04-04 System and method for providing a plug-and-play architecture for integrating infrastructure services with business service implementations
US10/407,872 Abandoned US20040148184A1 (en) 2003-01-23 2003-04-04 System and method to manage the distribution of services software in a distributed network

Family Applications Before (4)

Application Number Title Priority Date Filing Date
US10/350,164 Abandoned US20040148370A1 (en) 2003-01-23 2003-01-23 System and method for composing, configuring, deploying, and managing services using a graphical user interface
US10/407,812 Active 2027-02-27 US7657898B2 (en) 2003-01-23 2003-04-04 System and method for customizing infrastructure services for use in network services
US10/407,849 Expired - Lifetime US7263686B2 (en) 2003-01-23 2003-04-04 System and method for automated code generation using language neutral software code
US10/407,896 Abandoned US20040148185A1 (en) 2003-01-23 2003-04-04 System and method for providing a plug-and-play architecture for integrating infrastructure services with business service implementations

Country Status (5)

Country Link
US (5) US20040148370A1 (en)
EP (1) EP1586032A2 (en)
AU (1) AU2004206582A1 (en)
CA (1) CA2511093A1 (en)
WO (1) WO2004066099A2 (en)

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050289538A1 (en) * 2004-06-23 2005-12-29 International Business Machines Corporation Deploying an application software on a virtual deployment target
US20070074205A1 (en) * 2005-09-26 2007-03-29 Macrovision Corporation Method and system for managing and organizing software package installations
US20070239871A1 (en) * 2006-04-11 2007-10-11 Mike Kaskie System and method for transitioning to new data services
US20070277170A1 (en) * 2006-05-25 2007-11-29 International Business Machines Corporation Merger driven application installation
US20080134164A1 (en) * 2004-12-20 2008-06-05 Abb Research Ltd System and Method For Automatically Upgrading Functionalities in a Distributed Network
US20080195998A1 (en) * 2007-02-14 2008-08-14 Microsoft Corporation Enable top-down service design
US20080270411A1 (en) * 2007-04-26 2008-10-30 Microsoft Corporation Distributed behavior controlled execution of modeled applications
US20090006063A1 (en) * 2007-06-29 2009-01-01 Microsoft Corporation Tuning and optimizing distributed systems with declarative models
US20090037896A1 (en) * 2007-08-02 2009-02-05 Accenture Global Services Gmbh Legacy application decommissioning framework
US20090055751A1 (en) * 2007-08-24 2009-02-26 Microsoft Corporation Management System for Local and Remote Services
US20090083732A1 (en) * 2007-09-26 2009-03-26 Microsoft Corporation Creation and deployment of distributed, extensible applications
US20090089109A1 (en) * 2007-09-27 2009-04-02 Christian Rabetge Configuration of web services
US20090113379A1 (en) * 2007-10-26 2009-04-30 Microsoft Corporation Modeling and managing heterogeneous applications
US20090113292A1 (en) * 2007-10-26 2009-04-30 Microsoft Corporation Flexibly editing heterogeneous documents
US20090113407A1 (en) * 2007-10-26 2009-04-30 Microsoft Corporation Managing software lifecycle
US20090125612A1 (en) * 2007-11-08 2009-05-14 Christian Rabetge Configuration domains for the configuration of web services and consumer proxies
US20090183219A1 (en) * 2003-09-05 2009-07-16 Stephen L Maynard Technique for updating a resident application and associated parameters in a user terminal through a communications network
US20090193394A1 (en) * 2008-01-25 2009-07-30 Siemens Aktiengesellschaft Subsystem architecture for providing support services for software applications
US20100042986A1 (en) * 2008-08-18 2010-02-18 Software Ag SOA-registry, method and platform manager for automatic SOA application deployment
US20100058329A1 (en) * 2008-08-26 2010-03-04 Cisco Technology, Inc. Method and apparatus for dynamically instantiating services using a service insertion architecture
US20100122196A1 (en) * 2008-05-13 2010-05-13 Michael Wetzer Apparatus and methods for interacting with multiple information forms across multiple types of computing devices
US7814198B2 (en) 2007-10-26 2010-10-12 Microsoft Corporation Model-driven, repository-based application monitoring system
US20110029964A1 (en) * 2009-07-31 2011-02-03 Fujitsu Limited Method and system for updating programs in a multi-cluster system
US7926070B2 (en) 2007-10-26 2011-04-12 Microsoft Corporation Performing requested commands for model-based applications
US7974939B2 (en) 2007-10-26 2011-07-05 Microsoft Corporation Processing model-based commands for distributed applications
US20110219146A1 (en) * 2010-03-08 2011-09-08 Neil Jacobson Virtual software application deployment configurations
US20110231837A1 (en) * 2010-03-17 2011-09-22 Microsoft Corporation Virtual application package reconstitution
US8099720B2 (en) 2007-10-26 2012-01-17 Microsoft Corporation Translating declarative models
US8171474B2 (en) 2004-10-01 2012-05-01 Serguei Mankovski System and method for managing, scheduling, controlling and monitoring execution of jobs by a job scheduler utilizing a publish/subscription interface
US8230386B2 (en) 2007-08-23 2012-07-24 Microsoft Corporation Monitoring distributed applications
US8239505B2 (en) 2007-06-29 2012-08-07 Microsoft Corporation Progressively implementing declarative models in distributed systems
US8266477B2 (en) 2009-01-09 2012-09-11 Ca, Inc. System and method for modifying execution of scripts for a job scheduler using deontic logic
US20140115184A1 (en) * 2007-02-26 2014-04-24 Service Bureau Intetel S.A. Remotely managing enterprise resources
US8751948B2 (en) 2008-05-13 2014-06-10 Cyandia, Inc. Methods, apparatus and systems for providing and monitoring secure information via multiple authorized channels and generating alerts relating to same
US8819726B2 (en) 2010-10-14 2014-08-26 Cyandia, Inc. Methods, apparatus, and systems for presenting television programming and related information
US20140344802A1 (en) * 2013-05-16 2014-11-20 Sap Ag Shared application binary storage
US9047157B1 (en) * 2012-01-27 2015-06-02 Intuit Inc. Method and apparatus for using unspecialized software micro-containers for building complex dynamic business processes
US9170852B2 (en) 2012-02-02 2015-10-27 Microsoft Technology Licensing, Llc Self-updating functionality in a distributed system
US20150347123A1 (en) * 2013-08-13 2015-12-03 Huawei Technologies Co., Ltd. Application upgrade method and apparatus
US9262148B2 (en) 2011-09-12 2016-02-16 Microsoft Technology Licensing, Llc Modular architecture for distributed system management
US10613846B2 (en) * 2018-04-13 2020-04-07 International Business Machines Corporation Binary restoration in a container orchestration system
US10860335B1 (en) * 2016-09-29 2020-12-08 Cisco Technology, Inc. Network configuration interface system and method

Families Citing this family (152)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7516103B1 (en) * 2001-03-09 2009-04-07 Whitefence, Inc. Method and apparatus for facilitating electronic acquisition and maintenance of goods and services via the internet
US6996781B1 (en) * 2001-10-31 2006-02-07 Qcorps Residential, Inc. System and method for generating XSL transformation documents
KR20040099462A (en) * 2002-04-19 2004-11-26 컴퓨터 어소시에이츠 싱크, 인코포레이티드 System and method for client-side locale specific numeric format handling in a web environment
US20030227481A1 (en) * 2002-06-05 2003-12-11 Udo Arend Creating user interfaces using generic tasks
US7424702B1 (en) 2002-08-19 2008-09-09 Sprint Communications Company L.P. Data integration techniques for use in enterprise architecture modeling
US7451403B1 (en) * 2002-12-20 2008-11-11 Rage Frameworks, Inc. System and method for developing user interfaces purely by modeling as meta data in software application
WO2004091138A1 (en) * 2003-04-04 2004-10-21 Computer Associates Think, Inc. Method and system of alert notification
US7284054B2 (en) * 2003-04-11 2007-10-16 Sun Microsystems, Inc. Systems, methods, and articles of manufacture for aligning service containers
JP2004341623A (en) * 2003-05-13 2004-12-02 Hitachi Ltd Security specification creation support device and security specification creation support method
US7693973B2 (en) * 2003-08-28 2010-04-06 International Business Machines Corporation Pluggable state meta-data processors based on meta information modeling in a service oriented architecture
US7483973B2 (en) * 2003-08-28 2009-01-27 International Business Machines Corporation Gateway for service oriented state
US8312045B2 (en) * 2003-12-30 2012-11-13 Sap Ag Configuration data content for a clustered system having multiple instances
US7694140B1 (en) * 2003-12-30 2010-04-06 Sap Ag Web service client extensions
US7519600B1 (en) * 2003-12-30 2009-04-14 Sap Aktiengesellschaft System and method for managing multiple application server clusters using a hierarchical data object and a multi-parameter representation for each configuration property
US8601099B1 (en) 2003-12-30 2013-12-03 Sap Ag System and method for managing multiple sever node clusters using a hierarchical configuration data structure
US8190780B2 (en) * 2003-12-30 2012-05-29 Sap Ag Cluster architecture having a star topology with centralized services
US7533163B1 (en) 2003-12-30 2009-05-12 Sap Ag Startup framework and method for enterprise computing systems
US7526479B2 (en) * 2003-12-30 2009-04-28 Sap Ag Configuration manager in enterprise computing system
US7650590B2 (en) * 2004-01-13 2010-01-19 Sap Ag Flexible code generation
US8082520B2 (en) * 2004-02-26 2011-12-20 International Business Machines Corporation System and method for database management
US20050198628A1 (en) * 2004-03-04 2005-09-08 Graham Christoph J. Creating a platform specific software image
US8230085B2 (en) * 2004-04-12 2012-07-24 Netapp, Inc. System and method for supporting block-based protocols on a virtual storage appliance executing within a physical storage appliance
US7721283B2 (en) * 2004-05-24 2010-05-18 Sap Ag Deploying a variety of containers in a Java 2 enterprise edition-based architecture
US7735097B2 (en) * 2004-05-24 2010-06-08 Sap Ag Method and system to implement a deploy service to perform deployment services to extend and enhance functionalities of deployed applications
US8762981B2 (en) * 2004-05-24 2014-06-24 Sap Ag Application loading and visualization
US7562341B2 (en) * 2004-05-24 2009-07-14 Sap Ag Deploy callback system with bidirectional containers
US7877735B2 (en) * 2004-05-25 2011-01-25 Sap Ag Application cloning
US7882502B2 (en) * 2004-05-25 2011-02-01 Sap Ag Single file update
US7747698B2 (en) * 2004-05-25 2010-06-29 Sap Ag Transaction model for deployment operations
US7849438B1 (en) 2004-05-27 2010-12-07 Sprint Communications Company L.P. Enterprise software development process for outsourced developers
US7500227B1 (en) * 2004-06-22 2009-03-03 Unisys Corporation Process and system for intercepting a .NET method at runtime
US9552599B1 (en) 2004-09-10 2017-01-24 Deem, Inc. Platform for multi-service procurement
KR100683853B1 (en) * 2005-02-04 2007-02-16 삼성전기주식회사 Pre-compiling device
US7643907B2 (en) 2005-02-10 2010-01-05 Abb Research Ltd. Method and apparatus for developing a metadata-infused software program for controlling a robot
US8499028B2 (en) * 2005-02-23 2013-07-30 International Business Machines Corporation Dynamic extensible lightweight access to web services for pervasive devices
US20060248121A1 (en) * 2005-04-15 2006-11-02 Michael Cacenco System and method for supporting packaging, publishing and republishing of wireless component applications
US20060236308A1 (en) * 2005-04-18 2006-10-19 Lamb James A Configurable functionality chaining
US7984119B2 (en) * 2005-04-21 2011-07-19 Sap Ag Template configuration tool for application servers
US9317259B2 (en) * 2005-05-12 2016-04-19 International Business Machines Corporation Apparatus, system, and method for automatically generating a reusable software component for interfacing with a web service
US20090307099A1 (en) * 2005-07-08 2009-12-10 Tanik Murat M Drag-and-Drop Communication of Data Via a Computer Network
US8484065B1 (en) 2005-07-14 2013-07-09 Sprint Communications Company L.P. Small enhancement process workflow manager
US8090818B2 (en) * 2005-09-19 2012-01-03 Sap Ag Generation of customized client proxies
US20070067384A1 (en) * 2005-09-21 2007-03-22 Angelov Dimitar V System and method for web services configuration creation and validation
US7716360B2 (en) 2005-09-21 2010-05-11 Sap Ag Transport binding for a web services message processing runtime framework
US7716279B2 (en) * 2005-09-21 2010-05-11 Sap Ag WS addressing protocol for web services message processing runtime framework
FR2891077B1 (en) * 2005-09-22 2008-12-12 Xcalia Sa SYSTEM FOR IMPLEMENTING A BUSINESS APPLICATION.
US7571208B2 (en) * 2005-11-30 2009-08-04 Microsoft Corporation Creating proxies from service description metadata at runtime
US20100011280A1 (en) * 2006-01-30 2010-01-14 Lakshmi Kutty Cheeniyil Forms Management System
US20070220035A1 (en) * 2006-03-17 2007-09-20 Filip Misovski Generating user interface using metadata
US7770146B2 (en) * 2006-05-19 2010-08-03 Sap Ag Computer software development incorporating core and compound services
US7676816B2 (en) * 2006-06-30 2010-03-09 Sap Ag Systems and methods for integrating services
US7814460B2 (en) * 2006-07-13 2010-10-12 Scriptlogic Corporation Hierarchical modular software packages and associated development tool
US9251498B2 (en) * 2006-10-23 2016-02-02 Oracle International Corporation Facilitating deployment of customizations of enterprise applications
US7979840B2 (en) * 2006-10-31 2011-07-12 International Business Machines Corporation Method and apparatus for service-oriented architecture process decomposition and service modeling
US20080127162A1 (en) * 2006-11-29 2008-05-29 Sap Ag Method and apparatus for configuring application software
US8578334B2 (en) * 2006-12-04 2013-11-05 Microsoft Corporation Dynamic language-based integrated development environment
US7761484B2 (en) * 2007-02-09 2010-07-20 Microsoft Corporation Complete mapping between the XML infoset and dynamic language data expressions
US8904341B2 (en) * 2007-04-30 2014-12-02 Hewlett-Packard Development Company, L.P. Deriving grounded model of business process suitable for automatic deployment
US7856517B2 (en) 2007-05-25 2010-12-21 Red Hat, Inc. Data management interface with configurable plugins that determines whether to monitor for configuration data
US7716399B2 (en) * 2007-05-25 2010-05-11 Red Hat, Inc. Method and system for data management interface with intelligent plugins that determine whether to perform the requested data operation received from an application
US20080307211A1 (en) * 2007-06-11 2008-12-11 Lianjun An Method and apparatus for dynamic configuration of an on-demand operating environment
US8769291B2 (en) 2007-07-23 2014-07-01 Red Hat, Inc. Certificate generation for a network appliance
US7908610B2 (en) * 2007-07-31 2011-03-15 Microsoft Corporation Multi-threaded business programming library
US8719335B2 (en) * 2007-08-21 2014-05-06 Microsoft Corporation Framework for development of integration adapters that surface non-static, type-safe service contracts to LOB systems
US8560938B2 (en) * 2008-02-12 2013-10-15 Oracle International Corporation Multi-layer XML customization
US8146099B2 (en) * 2007-09-27 2012-03-27 Microsoft Corporation Service-oriented pipeline based architecture
US8621027B2 (en) 2007-11-16 2013-12-31 Red Hat, Inc. Automatically providing identity information for a network appliance
US8191122B2 (en) * 2007-11-27 2012-05-29 Red Hat, Inc. Provisioning a network appliance
US8191123B2 (en) * 2007-11-27 2012-05-29 Red Hat, Inc. Provisioning a network appliance
US8464270B2 (en) 2007-11-29 2013-06-11 Red Hat, Inc. Dependency management with atomic decay
US8832255B2 (en) 2007-11-30 2014-09-09 Red Hat, Inc. Using status inquiry and status response messages to exchange management information
CN101946258B (en) * 2007-12-20 2013-05-29 惠普开发有限公司 Model based deployment of computer based business process on dedicated hardware
EP2223281A4 (en) * 2007-12-20 2011-05-25 Hewlett Packard Development Co Modelling computer based business process for customisation and delivery
CN101946261A (en) * 2007-12-20 2011-01-12 惠普开发有限公司 Automated model generation for computer based business process
US8893141B2 (en) * 2008-01-28 2014-11-18 Microsoft Corporation System and method for describing applications for manageability and efficient scale-up deployment
US8875306B2 (en) * 2008-02-12 2014-10-28 Oracle International Corporation Customization restrictions for multi-layer XML customization
US8538998B2 (en) * 2008-02-12 2013-09-17 Oracle International Corporation Caching and memory optimizations for multi-layer XML customization
US8788542B2 (en) 2008-02-12 2014-07-22 Oracle International Corporation Customization syntax for multi-layer XML customization
US8966465B2 (en) 2008-02-12 2015-02-24 Oracle International Corporation Customization creation and update for multi-layer XML customization
US20090254881A1 (en) * 2008-04-04 2009-10-08 Microsoft Corporation Code generation techniques for administrative tasks
US8782604B2 (en) * 2008-04-11 2014-07-15 Oracle International Corporation Sandbox support for metadata in running applications
US8667031B2 (en) * 2008-06-13 2014-03-04 Oracle International Corporation Reuse of shared metadata across applications via URL protocol
US9817680B1 (en) 2008-08-04 2017-11-14 Open Invention Network, Llc Application configuration tool
US8667404B2 (en) * 2008-08-06 2014-03-04 Autodesk, Inc. Predictive material editor
US8886571B2 (en) * 2008-08-19 2014-11-11 Oracle America, Inc. System and method for service virtualization in a service governance framework
US8799319B2 (en) 2008-09-19 2014-08-05 Oracle International Corporation System and method for meta-data driven, semi-automated generation of web services based on existing applications
US8996658B2 (en) 2008-09-03 2015-03-31 Oracle International Corporation System and method for integration of browser-based thin client applications within desktop rich client architecture
US9122520B2 (en) 2008-09-17 2015-09-01 Oracle International Corporation Generic wait service: pausing a BPEL process
US9300532B2 (en) * 2008-10-24 2016-03-29 Microsoft Technology Licensing, Llc Automating deployment of service applications by exposing hosting environment constraints
US8312419B2 (en) * 2008-10-30 2012-11-13 Hewlett-Packard Development Company, L.P. Automated lifecycle management of a computer implemented service
US8584084B2 (en) * 2008-11-12 2013-11-12 Autodesk, Inc. System for library content creation
US8645837B2 (en) * 2008-11-26 2014-02-04 Red Hat, Inc. Graphical user interface for managing services in a distributed computing system
US8332654B2 (en) * 2008-12-08 2012-12-11 Oracle International Corporation Secure framework for invoking server-side APIs using AJAX
US20100161524A1 (en) * 2008-12-19 2010-06-24 International Business Machines Corporation Method and system for identifying graphical model semantics
US20100162208A1 (en) * 2008-12-19 2010-06-24 International Business Machines Corporation Modeling tool builder - graphical editor construction
US8407667B2 (en) * 2009-03-20 2013-03-26 Microsoft Corporation Inferring missing type information for reflection
US8239823B2 (en) * 2009-03-20 2012-08-07 Microsoft Corporation Generating libraries for reflection without project compilation
US20100299362A1 (en) * 2009-05-24 2010-11-25 Roger Frederick Osmond Method for controlling access to data containers in a computer system
US9015198B2 (en) * 2009-05-26 2015-04-21 Pi-Coral, Inc. Method and apparatus for large scale data storage
US9600341B2 (en) * 2009-09-14 2017-03-21 Red Hat, Inc. Transaction sticky load balance policies
US8856737B2 (en) * 2009-11-18 2014-10-07 Oracle International Corporation Techniques for displaying customizations for composite applications
US9182981B2 (en) * 2009-11-23 2015-11-10 University Of Washington Systems and methods for implementing pixel-based reverse engineering of interface structure
US9274848B2 (en) * 2009-12-03 2016-03-01 International Business Machines Corporation Optimizing cloud service delivery within a cloud computing environment
US9395965B2 (en) * 2009-12-29 2016-07-19 Oracle International Corporation Techniques for automated generation of service artifacts
US8909781B2 (en) * 2010-05-24 2014-12-09 Pi-Coral, Inc. Virtual access to network services
US9244706B2 (en) 2010-05-27 2016-01-26 Microsoft Technology Licensing, Llc Command line shell command generation based on schema
US8806475B2 (en) 2010-09-13 2014-08-12 Oracle International Corporation Techniques for conditional deployment of application artifacts
US20120110558A1 (en) * 2010-10-29 2012-05-03 Microsoft Corporation Customized binaries on-the-fly
US20130055294A1 (en) * 2011-08-29 2013-02-28 Christopher Diebner Extensible framework which enables the management of disparately located heterogeneous systems requiring command and control, situational awareness, operations management and other specific capabilities
US8954942B2 (en) 2011-09-30 2015-02-10 Oracle International Corporation Optimizations using a BPEL compiler
US8959477B2 (en) * 2011-10-21 2015-02-17 Sap Se Scripting language for business applications
US8938520B2 (en) * 2012-04-03 2015-01-20 Salesforce.Com, Inc. Methods and systems for smart adapters in a social media content analytics environment
GB2509723A (en) * 2013-01-10 2014-07-16 Ibm Invoking web services that are determined at the time of execution
IN2013MU01231A (en) 2013-03-28 2015-04-10 Tata Consultancy Services Ltd
US9794379B2 (en) 2013-04-26 2017-10-17 Cisco Technology, Inc. High-efficiency service chaining with agentless service nodes
US9473356B2 (en) * 2013-09-30 2016-10-18 Oracle International Corporation Automatic configuration of applications based on host metadata using application-specific templates
US20150220327A1 (en) * 2014-01-31 2015-08-06 Dell Products L.P. Extensible data model and service for infrastructure management
US10417025B2 (en) 2014-11-18 2019-09-17 Cisco Technology, Inc. System and method to chain distributed applications in a network environment
USRE48131E1 (en) 2014-12-11 2020-07-28 Cisco Technology, Inc. Metadata augmentation in a service function chain
US9660909B2 (en) * 2014-12-11 2017-05-23 Cisco Technology, Inc. Network service header metadata for load balancing
US10007515B2 (en) * 2015-01-30 2018-06-26 Oracle International Corporation System and method for automatic porting of software applications into a cloud computing environment
US10909186B2 (en) * 2015-09-30 2021-02-02 Oracle International Corporation Multi-tenant customizable composites
CN105893010A (en) * 2015-11-17 2016-08-24 乐视云计算有限公司 Host scheduling method and system used for container deployment
US10187306B2 (en) 2016-03-24 2019-01-22 Cisco Technology, Inc. System and method for improved service chaining
US10931793B2 (en) 2016-04-26 2021-02-23 Cisco Technology, Inc. System and method for automated rendering of service chaining
US10419550B2 (en) 2016-07-06 2019-09-17 Cisco Technology, Inc. Automatic service function validation in a virtual network environment
US10320664B2 (en) 2016-07-21 2019-06-11 Cisco Technology, Inc. Cloud overlay for operations administration and management
US10218616B2 (en) 2016-07-21 2019-02-26 Cisco Technology, Inc. Link selection for communication with a service function cluster
US10225270B2 (en) 2016-08-02 2019-03-05 Cisco Technology, Inc. Steering of cloned traffic in a service function chain
US10218593B2 (en) 2016-08-23 2019-02-26 Cisco Technology, Inc. Identifying sources of packet drops in a service function chain environment
US10225187B2 (en) 2017-03-22 2019-03-05 Cisco Technology, Inc. System and method for providing a bit indexed service chain
US10333855B2 (en) 2017-04-19 2019-06-25 Cisco Technology, Inc. Latency reduction in service function paths
US10554689B2 (en) 2017-04-28 2020-02-04 Cisco Technology, Inc. Secure communication session resumption in a service function chain
US10735275B2 (en) 2017-06-16 2020-08-04 Cisco Technology, Inc. Releasing and retaining resources for use in a NFV environment
US10798187B2 (en) 2017-06-19 2020-10-06 Cisco Technology, Inc. Secure service chaining
US20200201613A1 (en) * 2017-06-23 2020-06-25 Flux7 Labs Inc Method, System, and Platform for Implementing an Enterprise DevOps Framework (EDF)
US10397271B2 (en) 2017-07-11 2019-08-27 Cisco Technology, Inc. Distributed denial of service mitigation for web conferencing
US10673698B2 (en) 2017-07-21 2020-06-02 Cisco Technology, Inc. Service function chain optimization using live testing
US11063856B2 (en) 2017-08-24 2021-07-13 Cisco Technology, Inc. Virtual network function monitoring in a network function virtualization deployment
CN110945476B (en) * 2017-09-13 2023-08-11 赫尔实验室有限公司 High-guarantee network gateway generator
US10791065B2 (en) 2017-09-19 2020-09-29 Cisco Technology, Inc. Systems and methods for providing container attributes as part of OAM techniques
WO2019067747A1 (en) 2017-09-29 2019-04-04 Qloudable, Inc. Device communication and management in computer data networks
US11018981B2 (en) 2017-10-13 2021-05-25 Cisco Technology, Inc. System and method for replication container performance and policy validation using real time network traffic
US10541893B2 (en) 2017-10-25 2020-01-21 Cisco Technology, Inc. System and method for obtaining micro-service telemetry data
US11392393B2 (en) * 2018-02-08 2022-07-19 Sap Se Application runtime configuration using design time artifacts
US10666612B2 (en) 2018-06-06 2020-05-26 Cisco Technology, Inc. Service chains for inter-cloud traffic
US10872029B1 (en) * 2018-11-21 2020-12-22 Candid Partners, LLC System, apparatus and method for deploying infrastructure to the cloud
US10430179B1 (en) * 2019-03-07 2019-10-01 Capital One Services, Llc Methods and systems for managing application configurations
CN111061464B (en) * 2019-11-24 2022-04-22 济南浪潮数据技术有限公司 Analysis code generation method, device, equipment and storage medium
US11397569B2 (en) * 2020-12-21 2022-07-26 Sap Se Deploying micro frontends to different clusters from a single repository
US11550925B2 (en) 2021-03-24 2023-01-10 Bank Of America Corporation Information security system for identifying potential security threats in software package deployment
CN115277817A (en) * 2022-07-23 2022-11-01 江苏南大先腾信息产业股份有限公司 Method for realizing visualized data processing by establishing API gateway through flow service arrangement

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742829A (en) * 1995-03-10 1998-04-21 Microsoft Corporation Automatic software installation on heterogeneous networked client computer systems
US5870611A (en) * 1995-04-05 1999-02-09 International Business Machines Corporation Install plan object for network installation of application programs
US5881236A (en) * 1996-04-26 1999-03-09 Hewlett-Packard Company System for installation of software on a remote computer system over a network using checksums and password protection
US6094679A (en) * 1998-01-16 2000-07-25 Microsoft Corporation Distribution of software in a computer network environment
US6324580B1 (en) * 1998-09-03 2001-11-27 Sun Microsystems, Inc. Load balancing for replicated services
US20030154323A1 (en) * 2002-02-14 2003-08-14 Canon Kabushiki Kaisha Information processing apparatus, method for controlling information processing apparatus, and storage medium storing program for realizing the method
US6681392B1 (en) * 1999-12-15 2004-01-20 Lexmark International, Inc. Method and apparatus for remote peripheral software installation

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5386568A (en) * 1992-12-01 1995-01-31 Yamaha Corporation Apparatus and method for linking software modules
JPH09506191A (en) * 1993-10-29 1997-06-17 オブジェクト テクノロジー ライセンシング コーポレイション Graphic editor framework system
US5546519A (en) * 1994-02-28 1996-08-13 International Business Machines Corporation System and method for visually programming iteration
US5742286A (en) * 1995-11-20 1998-04-21 International Business Machines Corporation Graphical user interface system and method for multiple simultaneous targets
US5933638A (en) * 1996-04-04 1999-08-03 Cencik; Peter Method and apparatus for creating application computer programs using an objects evaluation matrix
US6061740A (en) * 1996-12-09 2000-05-09 Novell, Inc. Method and apparatus for heterogeneous network management
US5953532A (en) * 1997-01-03 1999-09-14 Ncr Corporation Installation and deinstallation of application programs
US6006279A (en) * 1997-01-21 1999-12-21 Canon Information Systems, Inc. Plug-in module host framework
US6141686A (en) * 1998-03-13 2000-10-31 Deterministic Networks, Inc. Client-side application-classifier gathering network-traffic statistics and application and user names using extensible-service provider plugin for policy-based network control
US6205476B1 (en) * 1998-05-05 2001-03-20 International Business Machines Corporation Client—server system with central application management allowing an administrator to configure end user applications by executing them in the context of users and groups
US6259448B1 (en) * 1998-06-03 2001-07-10 International Business Machines Corporation Resource model configuration and deployment in a distributed computer network
US6654953B1 (en) 1998-10-09 2003-11-25 Microsoft Corporation Extending program languages with source-program attribute tags
US6446110B1 (en) * 1999-04-05 2002-09-03 International Business Machines Corporation Method and apparatus for representing host datastream screen image information using markup languages
US6742176B1 (en) * 1999-06-14 2004-05-25 Lycos, Inc. Secure flexible plugin software architecture
US7152228B2 (en) 1999-07-08 2006-12-19 Science Applications International Corporation Automatically generated objects within extensible object frameworks and links to enterprise resources
JP2004527805A (en) 1999-08-23 2004-09-09 アセラ,インコーポレイティド Method and apparatus for providing a custom configurable business application from a standardized set of parts
US6643652B2 (en) * 2000-01-14 2003-11-04 Saba Software, Inc. Method and apparatus for managing data exchange among systems in a network
US6684385B1 (en) * 2000-01-14 2004-01-27 Softwire Technology, Llc Program object for use in generating application programs
WO2001059662A2 (en) * 2000-02-08 2001-08-16 Appschannel, Inc. Object oriented system, method and article of manufacture for developing and integrating computer application processes
WO2002015438A1 (en) * 2000-08-15 2002-02-21 Lockheed Martin Corporation Infrared data communication system
US7644120B2 (en) * 2000-09-15 2010-01-05 Invensys Systems, Inc. Industrial process control data access server supporting multiple client data exchange protocols
ATE379807T1 (en) 2000-12-11 2007-12-15 Microsoft Corp METHOD AND SYSTEM FOR MANAGING MULTIPLE NETWORK EQUIPMENT
WO2002069086A2 (en) 2001-02-22 2002-09-06 Accenture Global Services Gmbh Distributed development environment for building internet applications by developers at remote locations
US7861252B2 (en) * 2001-03-21 2010-12-28 Andrzej Uszok Intelligent software agent system architecture
US6892361B2 (en) * 2001-07-06 2005-05-10 International Business Machines Corporation Task composition method for computer applications
US20030163570A1 (en) * 2002-02-26 2003-08-28 Sun Microsystems, Inc. Command line interface session tool
US7424717B2 (en) * 2002-05-01 2008-09-09 Bea Systems, Inc. Systems and methods for business process plug-in development

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5742829A (en) * 1995-03-10 1998-04-21 Microsoft Corporation Automatic software installation on heterogeneous networked client computer systems
US5870611A (en) * 1995-04-05 1999-02-09 International Business Machines Corporation Install plan object for network installation of application programs
US5881236A (en) * 1996-04-26 1999-03-09 Hewlett-Packard Company System for installation of software on a remote computer system over a network using checksums and password protection
US6094679A (en) * 1998-01-16 2000-07-25 Microsoft Corporation Distribution of software in a computer network environment
US6324580B1 (en) * 1998-09-03 2001-11-27 Sun Microsystems, Inc. Load balancing for replicated services
US6681392B1 (en) * 1999-12-15 2004-01-20 Lexmark International, Inc. Method and apparatus for remote peripheral software installation
US20030154323A1 (en) * 2002-02-14 2003-08-14 Canon Kabushiki Kaisha Information processing apparatus, method for controlling information processing apparatus, and storage medium storing program for realizing the method

Cited By (80)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8930934B2 (en) * 2003-09-05 2015-01-06 Time Warner Cable Enterprises Llc Technique for updating a resident application and associated parameters in a user terminal through a communications network
US20090183219A1 (en) * 2003-09-05 2009-07-16 Stephen L Maynard Technique for updating a resident application and associated parameters in a user terminal through a communications network
US20050289538A1 (en) * 2004-06-23 2005-12-29 International Business Machines Corporation Deploying an application software on a virtual deployment target
US8171474B2 (en) 2004-10-01 2012-05-01 Serguei Mankovski System and method for managing, scheduling, controlling and monitoring execution of jobs by a job scheduler utilizing a publish/subscription interface
US20080134164A1 (en) * 2004-12-20 2008-06-05 Abb Research Ltd System and Method For Automatically Upgrading Functionalities in a Distributed Network
US8527980B2 (en) * 2004-12-20 2013-09-03 Abb Research Ltd System and method for automatically upgrading functionalities in a distributed network
US20070074205A1 (en) * 2005-09-26 2007-03-29 Macrovision Corporation Method and system for managing and organizing software package installations
WO2007038257A2 (en) * 2005-09-26 2007-04-05 Macrovision Corporation A method and system for managing and organizing software package installations
WO2007038257A3 (en) * 2005-09-26 2009-05-07 Macrovision Corp A method and system for managing and organizing software package installations
US7774771B2 (en) 2005-09-26 2010-08-10 InstallShield, Inc. Method and system for managing and organizing software package installations
US20070239871A1 (en) * 2006-04-11 2007-10-11 Mike Kaskie System and method for transitioning to new data services
US20070277170A1 (en) * 2006-05-25 2007-11-29 International Business Machines Corporation Merger driven application installation
US8086992B2 (en) * 2007-02-14 2011-12-27 Microsoft Corporation Enable top-down service design
US20080195998A1 (en) * 2007-02-14 2008-08-14 Microsoft Corporation Enable top-down service design
US20140115184A1 (en) * 2007-02-26 2014-04-24 Service Bureau Intetel S.A. Remotely managing enterprise resources
US9026637B2 (en) * 2007-02-26 2015-05-05 Service Bureau Intetel S.A. Remotely managing enterprise resources
US8024396B2 (en) 2007-04-26 2011-09-20 Microsoft Corporation Distributed behavior controlled execution of modeled applications
US20080270411A1 (en) * 2007-04-26 2008-10-30 Microsoft Corporation Distributed behavior controlled execution of modeled applications
US8099494B2 (en) 2007-06-29 2012-01-17 Microsoft Corporation Tuning and optimizing distributed systems with declarative models
US8239505B2 (en) 2007-06-29 2012-08-07 Microsoft Corporation Progressively implementing declarative models in distributed systems
US7970892B2 (en) 2007-06-29 2011-06-28 Microsoft Corporation Tuning and optimizing distributed systems with declarative models
US20090006063A1 (en) * 2007-06-29 2009-01-01 Microsoft Corporation Tuning and optimizing distributed systems with declarative models
US8122444B2 (en) * 2007-08-02 2012-02-21 Accenture Global Services Limited Legacy application decommissioning framework
US20090037896A1 (en) * 2007-08-02 2009-02-05 Accenture Global Services Gmbh Legacy application decommissioning framework
US8230386B2 (en) 2007-08-23 2012-07-24 Microsoft Corporation Monitoring distributed applications
US20090055751A1 (en) * 2007-08-24 2009-02-26 Microsoft Corporation Management System for Local and Remote Services
US20090083732A1 (en) * 2007-09-26 2009-03-26 Microsoft Corporation Creation and deployment of distributed, extensible applications
US8892454B2 (en) * 2007-09-27 2014-11-18 Sap Se Configuration of web services
US20090089109A1 (en) * 2007-09-27 2009-04-02 Christian Rabetge Configuration of web services
US20090113379A1 (en) * 2007-10-26 2009-04-30 Microsoft Corporation Modeling and managing heterogeneous applications
US8181151B2 (en) 2007-10-26 2012-05-15 Microsoft Corporation Modeling and managing heterogeneous applications
US7814198B2 (en) 2007-10-26 2010-10-12 Microsoft Corporation Model-driven, repository-based application monitoring system
US8443347B2 (en) 2007-10-26 2013-05-14 Microsoft Corporation Translating declarative models
US8306996B2 (en) 2007-10-26 2012-11-06 Microsoft Corporation Processing model-based commands for distributed applications
US7926070B2 (en) 2007-10-26 2011-04-12 Microsoft Corporation Performing requested commands for model-based applications
US20090113292A1 (en) * 2007-10-26 2009-04-30 Microsoft Corporation Flexibly editing heterogeneous documents
US8099720B2 (en) 2007-10-26 2012-01-17 Microsoft Corporation Translating declarative models
US8225308B2 (en) 2007-10-26 2012-07-17 Microsoft Corporation Managing software lifecycle
US7974939B2 (en) 2007-10-26 2011-07-05 Microsoft Corporation Processing model-based commands for distributed applications
US20090113407A1 (en) * 2007-10-26 2009-04-30 Microsoft Corporation Managing software lifecycle
US20090125612A1 (en) * 2007-11-08 2009-05-14 Christian Rabetge Configuration domains for the configuration of web services and consumer proxies
US9148488B2 (en) * 2007-11-08 2015-09-29 Sap Ag Configuration domains for the configuration of web services and consumer proxies
US8875097B2 (en) * 2008-01-25 2014-10-28 Siemens Aktiengesellschaft Subsystem architecture for providing support services for software applications
US20090193394A1 (en) * 2008-01-25 2009-07-30 Siemens Aktiengesellschaft Subsystem architecture for providing support services for software applications
US20110252461A1 (en) * 2008-05-13 2011-10-13 Monterey Group One, Llc Methods, apparatus and systems for providing secure information via multiple authorized channels to authenticated users and user devices
US8832576B2 (en) * 2008-05-13 2014-09-09 Cyandia, Inc. Methods, apparatus and systems for authenticating users and user devices to receive secure information via multiple authorized channels
US20110258573A1 (en) * 2008-05-13 2011-10-20 Monterey Group One, Llc Methods, Apparatus and Systems for Displaying and/or Facilitating Interaction with Secure Information via a Channel Grid Framework
US20110252460A1 (en) * 2008-05-13 2011-10-13 Monterey Group One, Llc Methods, apparatus and systems for authenticating users and user devices to receive secure information via multiple authorized channels
US8751948B2 (en) 2008-05-13 2014-06-10 Cyandia, Inc. Methods, apparatus and systems for providing and monitoring secure information via multiple authorized channels and generating alerts relating to same
US8499250B2 (en) 2008-05-13 2013-07-30 Cyandia, Inc. Apparatus and methods for interacting with multiple information forms across multiple types of computing devices
US20100122196A1 (en) * 2008-05-13 2010-05-13 Michael Wetzer Apparatus and methods for interacting with multiple information forms across multiple types of computing devices
US8578285B2 (en) * 2008-05-13 2013-11-05 Cyandia, Inc. Methods, apparatus and systems for providing secure information via multiple authorized channels to authenticated users and user devices
US8595641B2 (en) * 2008-05-13 2013-11-26 Cyandia, Inc. Methods, apparatus and systems for displaying and/or facilitating interaction with secure information via channel grid framework
US20100042986A1 (en) * 2008-08-18 2010-02-18 Software Ag SOA-registry, method and platform manager for automatic SOA application deployment
US8448164B2 (en) * 2008-08-18 2013-05-21 Software Ag SOA-registry, method and platform manager for automatic SOA application deployment
US20100058329A1 (en) * 2008-08-26 2010-03-04 Cisco Technology, Inc. Method and apparatus for dynamically instantiating services using a service insertion architecture
US8281302B2 (en) * 2008-08-26 2012-10-02 Cisco Technology, Inc. Method and apparatus for dynamically instantiating services using a service insertion architecture
US8266477B2 (en) 2009-01-09 2012-09-11 Ca, Inc. System and method for modifying execution of scripts for a job scheduler using deontic logic
US20110029964A1 (en) * 2009-07-31 2011-02-03 Fujitsu Limited Method and system for updating programs in a multi-cluster system
US10318263B2 (en) 2010-03-08 2019-06-11 Microsoft Technology Licensing, Llc Virtual software application deployment configurations
US8826268B2 (en) * 2010-03-08 2014-09-02 Microsoft Corporation Virtual software application deployment configurations
US20140337828A1 (en) * 2010-03-08 2014-11-13 Microsoft Corporation Virtual software application deployment configurations
US9152403B2 (en) * 2010-03-08 2015-10-06 Microsoft Technology Licensing, Llc Virtual software application deployment configurations
US20110219146A1 (en) * 2010-03-08 2011-09-08 Neil Jacobson Virtual software application deployment configurations
US20110231837A1 (en) * 2010-03-17 2011-09-22 Microsoft Corporation Virtual application package reconstitution
US10514940B2 (en) * 2010-03-17 2019-12-24 Microsoft Technology Licensing, Llc Virtual application package reconstruction
US8819726B2 (en) 2010-10-14 2014-08-26 Cyandia, Inc. Methods, apparatus, and systems for presenting television programming and related information
US20160054993A1 (en) * 2011-09-12 2016-02-25 Microsoft Technology Licensing, Llc Modular architecture for distributed system management
US9529582B2 (en) * 2011-09-12 2016-12-27 Microsoft Technology Licensing, Llc Modular architecture for distributed system management
US9262148B2 (en) 2011-09-12 2016-02-16 Microsoft Technology Licensing, Llc Modular architecture for distributed system management
US9047157B1 (en) * 2012-01-27 2015-06-02 Intuit Inc. Method and apparatus for using unspecialized software micro-containers for building complex dynamic business processes
US9170852B2 (en) 2012-02-02 2015-10-27 Microsoft Technology Licensing, Llc Self-updating functionality in a distributed system
US9092292B2 (en) * 2013-05-16 2015-07-28 Sap Se Shared application binary storage
US20140344802A1 (en) * 2013-05-16 2014-11-20 Sap Ag Shared application binary storage
US20150347123A1 (en) * 2013-08-13 2015-12-03 Huawei Technologies Co., Ltd. Application upgrade method and apparatus
US9696984B2 (en) * 2013-08-13 2017-07-04 Huawei Technologies Co., Ltd. Application upgrade method and apparatus
US10191730B2 (en) 2013-08-13 2019-01-29 Huawei Technologies Co., Ltd. Application upgrade method and apparatus
US10649761B2 (en) 2013-08-13 2020-05-12 Huawei Technologies Co., Ltd. Application upgrade method and apparatus
US10860335B1 (en) * 2016-09-29 2020-12-08 Cisco Technology, Inc. Network configuration interface system and method
US10613846B2 (en) * 2018-04-13 2020-04-07 International Business Machines Corporation Binary restoration in a container orchestration system

Also Published As

Publication number Publication date
US7657898B2 (en) 2010-02-02
US20040148370A1 (en) 2004-07-29
WO2004066099A3 (en) 2005-01-27
AU2004206582A1 (en) 2004-08-05
WO2004066099A2 (en) 2004-08-05
EP1586032A2 (en) 2005-10-19
US20040148185A1 (en) 2004-07-29
US20040148588A1 (en) 2004-07-29
US7263686B2 (en) 2007-08-28
US20040148183A1 (en) 2004-07-29
CA2511093A1 (en) 2004-08-05

Similar Documents

Publication Publication Date Title
US7657898B2 (en) System and method for customizing infrastructure services for use in network services
US11244261B2 (en) Catalog service platform for deploying applications and services
US9823900B2 (en) Automated enterprise software development
US7093247B2 (en) Installation of a data processing solution
CN101387956B (en) Method and apparatus for expandably implementing non functional logic
US8332459B2 (en) Federation of composite applications
US20180225095A1 (en) Application analyzer for cloud computing
US20020144256A1 (en) Method of deployment for concurrent execution of multiple versions of an integration model on an integration server
Munteanu et al. Multi-cloud resource management: cloud service interfacing
US20030140126A1 (en) Method of deployment for concurrent execution of multiple versions of an integration model
Gjørven et al. Cross-layer self-adaptation of service-oriented architectures
Buchanan et al. Ci/cd with azure kubernetes service
AU2004206591A1 (en) Distribution of services software in a network
AU2004206358A1 (en) System and method for automated code generation using language neutral software code
Odun-Ayo et al. Cloud and application programming interface–Issues and developments
AU2004206357A1 (en) Plug and play architecture for composing configuring deploying and managing services
AU2004206581A1 (en) System and method for customizing infrastructure services for use in network services
Holliday et al. Professional SharePoint 2007 development
Boyer et al. Deploying with JRules
Doganata et al. 11 Software Architectures for Enterprise Applications
Čecháček Integrating Apiman gateway with OpenShift
Ragusa Business Grids, Infrastructuring the Future of ICT

Legal Events

Date Code Title Description
AS Assignment

Owner name: ELECTRONICS DATA SYSTEMS CORPORATION, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SADIQ, WAQAR;REEL/FRAME:014346/0320

Effective date: 20030716

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION