WO2008118548A1 - It automation appliance imaging system and method - Google Patents
It automation appliance imaging system and method Download PDFInfo
- Publication number
- WO2008118548A1 WO2008118548A1 PCT/US2008/053539 US2008053539W WO2008118548A1 WO 2008118548 A1 WO2008118548 A1 WO 2008118548A1 US 2008053539 W US2008053539 W US 2008053539W WO 2008118548 A1 WO2008118548 A1 WO 2008118548A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- image
- endpoint
- library
- local disk
- disk
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4416—Network booting; Remote initial program loading [RIPL]
Definitions
- This invention relates generally to information technology (IT) systems, and more specifically to systems and methods for automating and deploying IT solutions in an enterprise environment.
- IT information technology
- One management task is to copy and store in a library the contents of local disks of multiple managed machines, also referred to as managed endpoints, within the enterprise. This is also referred to as harvesting images of managed machines.
- An image of a managed machine is a copy of the data stored on the local disk of the machine. If the data stored on the local disk are arranged in files, the image can be a collection of the files.
- These harvested images can be deployed to other managed machines, possibly after modifying the image. Images are deployed to clone a machine, repair a machine, or reconfigure a machine. The images should be stored efficiently and in a way that they can be easily analyzed and modified.
- the above tasks may need to be performed remotely, without a human user physically interacting with the managed machine.
- the tasks may need to be performed in difficult circumstances, such as when the local disk is corrupted and the managed machine is unable to boot from it or when a program is running from the local disk that interferes with the ability to read or write to the disk.
- What is needed are systems and methods for efficiently, remotely, and non-intrusively harvesting and deploying images to disks of managed machines in an enterprise.
- a system, method, and computer program product for harvesting an image from a local disk of a managed endpoint to an image library and for deploying an image to a local disk of a managed endpoint from an image library.
- a managed endpoint is provided with a boot image that causes the endpoint to instantiate a RAM disk and execute the boot image from the RAM disk.
- the boot image is used to harvest an image by determining data on a local disk of the managed endpoint to be included in the image that are not already stored in the image library. In one embodiment, this is done by comparing hashes calculated on the data on the local disk to hashes of data in the image library. The data not already stored in the image library are then copied to the image library.
- FIG. 1 is a high-level diagram illustrating an enterprise environment in which an
- IT automation system can be used to carry out IT tasks according to an embodiment of the invention.
- FIG. 2 is a block diagram illustrating a computer that can serve as an embodiment of an IT automation appliance, administrator client, appliance server, DHCP server, or managed endpoint in accordance with an embodiment of the invention.
- FIG. 3 illustrates the contents of a file-based image library in accordance with an embodiment of the invention.
- FIG. 4 is a flowchart illustrating a method of booting a managed endpoint in accordance with an embodiment of the invention.
- FIG. 5 is a flowchart illustrating a method of harvesting a file -based image from the local disk of an endpoint in accordance with an embodiment of the invention.
- FIG. 6 is a flowchart illustrating a method of deploying a file-based image to the local disk of an endpoint in accordance with an embodiment of the invention.
- the figures depict embodiments of the invention for purposes of illustration only. One skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the invention described herein.
- FIG. 1 is a high-level diagram illustrating an enterprise environment 100 that includes an information technology (IT) automation appliance 102 (the "appliance") that can be used to carry out various IT processes.
- the environment 100 also includes an administrator client 106, an appliance server 108, a Dynamic Host Configuration Protocol (DHCP) server 114, and several managed endpoints 112, all connected by a network 104.
- FIG. 1 shows only a single appliance 102 but embodiments can have multiple appliances.
- FIG. 1 shows only three managed endpoints 112 even though some embodiments may have hundreds or thousands of such endpoints.
- IT information technology
- DHCP Dynamic Host Configuration Protocol
- the appliance 102 includes a boot image library 126, an image library 116, and a software library 110.
- the boot image library 126 stores one or more boot images for use in booting the managed endpoints 112.
- the boot image contains machine instructions that, when executed on an endpoint 112, causes the endpoint to instantiate a RAM disk (i.e., a virtual disk drive stored in random access memory), store the boot image on the RAM disk, and boot the endpoint from the image on the RAM disk.
- the boot image may contain an operating system such as LINUX and various application programs that run in this operating system.
- the boot image may also contain device drivers that enable it to run on managed endpoints with various hardware configurations.
- the image library 116 stores images of the local disks 122 (i.e., copies of the contents of the disks) of endpoints 112.
- the image library 116 can be used for various administrative tasks performed by the IT automation appliance 102.
- An administrator can use the appliance 102 to view the images to better understand the configurations of the various endpoints 112 in the environment 100.
- the contents of the image library 116 can be summarized as desired and presented to the administrator. For example, the administrator can view the percentage of space taken on the local disks 112 of all endpoints 112 by certain operating system files.
- the administrator can also view files that are common or different between various endpoints 112.
- the types of endpoint images stored in the image library in various embodiments include partition-based images, sector-based images, cluster-based images, and file-based images.
- a partition-based image the separate partitions of the local disk 122 are stored in the image library 116.
- a sector-based image sectors of the local disk 122 are stored in the image library 116.
- files from the local disk 122 are stored in the image library 116.
- the image library also contains information that links the partitions, sectors, or files together to form images.
- the partition-based, sector-based, or file -based images can be optimized to a particular type of file system such as NTFS, FAT, EXT2, or EXT3.
- the optimization can result in smaller images, faster copying, or easier editing, for example.
- data compression algorithms can be applied to the images in the image library 116 to compress them.
- An embodiment of the software library 110 stores device drivers and/or other types of software to enable the support of endpoints 112 with varying hardware configurations.
- the appliance 102 includes certain device drivers from the library 110 with the boot image 126 when sending it to an endpoint 112 so that the endpoint can properly run the image.
- the boot image 126 can also download software from the library 110 to perform required tasks on the endpoint 112, such as harvesting an image of the local disk 122.
- This software can communicate with the appliance 102 and receive user input through the appliance so that a user does not need to be at the endpoint 112.
- the endpoint 112 mounts a drive exported by the appliance 102 containing the software library 110 to access the library.
- the appliance 102 is controlled by an administrator via an administrator client 106.
- the administrator client 106 communicates with the appliance 102 over the network 104 to provide commands to the appliance from the administrator and to receive output from the appliance.
- this description refers to the administrator interacting directly with the appliance 102, but it is implied that the user can interact with the appliance via the administrator client 106.
- the appliance 102 communicates with an appliance server 108 that in turn communicates with the endpoints 112.
- the server 108 can be configured to efficiently send and receive large amounts of data and can have a large data storage capacity.
- one or more of the boot image library 126, the image library 116, and the software library 116 can be stored on and served by the appliance server 108.
- the description below refers to the appliance 102 communicating with the endpoints 112, but it is implied that the server 108 under control of the appliance 102 can communicate with the endpoints 112 instead.
- the DHCP server 114 assists in the boot process of the endpoints 112.
- an endpoint 112 when an endpoint 112 initially boots, it communicates with the DHCP server 114 to request and obtain a unique Internet Protocol (IP) address or other network address for communicating on the network 104.
- IP Internet Protocol
- An embodiment of the DHCP server 114 also provides the endpoint 112 with boot instructions causing the endpoint to obtain, and boot from, a boot image stored in the boot image library 126.
- the DHCP server functionality is integrated into the appliance server 108 or the automation appliance 102.
- Managed endpoints 112 are machines running in the enterprise environment 100 and include, for example, desktop and notebook computer systems, switches and routers, printers, mobile telephones, personal digital assistants, and/or other networked electronic devices found in the enterprise environment 100.
- at least one of the managed endpoints includes a local disk 122 and a random access memory (RAM) disk 120.
- the local disk 122 is a persistent storage device and in one embodiment is a hard drive.
- the RAM disk 120 is a virtual storage device that emulated in a volatile memory (e.g., RAM) of the endpoint 112.
- the RAM disk 120 acts like a physical disk; files can be read from or written to the RAM disk 120 in a manner similar to files on the local disk 122.
- the RAM disk 120 provides the managed endpoint 112 with a local file system from which to run programs and perform other tasks without requiring use of the physical local disk 122.
- the endpoint 112 supports the PXE (Preboot execution Environment) boot protocol. This protocol causes the endpoint 112 to seek a PXE redirection service at the initial stage of the boot sequence.
- the PXE redirection service is provided by the DHCP server 114 and provides the endpoint 112 with a network address and file path to an appropriate boot image in the library 126.
- the endpoint 112 then requests the boot image from the appliance 102, and the appliance sends a copy of a boot image in response.
- the boot image when executed by the endpoint 112, initially causes the endpoint to instantiate the RAM disk 120 and store the boot image there.
- the endpoint 112 then boots from the boot image in the RAM disk 120.
- the managed endpoint 112 is booted up based on boot image 126 provided by the appliance 102, and is booted in a manner that does use the local disk 122.
- Booting from the RAM disk 120 in this manner is advantageous for a variety of reasons. For example, this technique allows booting of the endpoint 112 even if the local disk 122 is corrupted and cannot be used for booting.
- booting from the RAM disk 120 allows the endpoint 112 to perform its normal operations while providing unfettered access to the local disk 122.
- a recovery console can be launched on the managed endpoint 112.
- the recovery console can be launched by a boot image from the appliance 102 that runs on a RAM disk 120 of the managed endpoint 112.
- the recovery console allows an administrator to view the contents of a local disk 122 of the managed endpoint 112 and make changes to the contents of the local disk.
- the boot image contains an operating system from which the recovery console runs.
- the operating system can be customized to run on a particular managed endpoint 112 and the boot image can include device drivers to enable the operating system to run on the endpoint.
- the boot image After the boot image is loaded on the RAM disk 120, it starts this operating system and optionally starts other application programs that enable an administrator to perform functions on the local disk 122 of the managed endpoint.
- These applications may include various graphical user interfaces, file editors, and disk analyzers.
- the recovery console may enable an administrator to access further application programs from the appliance 102 by mounting a filesystem of the appliance as described above.
- the recovery console can also automatically detect various device drivers and application programs that would be useful to run on the endpoint and download those drivers and programs from the appliance 102.
- the network 104 represents the communication pathways among the other entities illustrated in FIG. 1.
- the network 104 is a local area network (LAN) maintained by an enterprise.
- the network 114 can also utilize public communications links such as the Internet.
- the network 114 uses standard communications technologies and/or protocols.
- the network 114 can include links using technologies such as Ethernet, 802.11, integrated services digital network (ISDN), digital subscriber line (DSL), asynchronous transfer mode (ATM), etc.
- the networking protocols used on the network 114 can include the transmission control protocol/Internet protocol (TCP/IP), the hypertext transport protocol (HTTP), the simple mail transfer protocol (SMTP), the file transfer protocol (FTP), the trivial file transfer protocol (TFTP), etc.
- TCP/IP transmission control protocol/Internet protocol
- HTTP hypertext transport protocol
- SMTP simple mail transfer protocol
- FTP file transfer protocol
- TFTP trivial file transfer protocol
- a memory 206 Also coupled to the bus are a memory 206, a storage device 208, a keyboard 210, a graphics adapter 212, a pointing device 214, and a network adapter 216.
- a display 218 is coupled to the graphics adapter 212.
- the storage device 208 is a device such as a hard drive, CD or DVD drive, or flash memory device, and holds files containing executable code and/or data utilized during the operation of the computer 200.
- the memory 206 in one embodiment, is a random access memory (RAM) and holds instructions and data loaded from the storage device 208, generated during processing, and/or from other sources.
- RAM random access memory
- a computer 200 acting as the appliance server 108 may have greater processing power and a larger storage device than a computer acting as a managed endpoint 112.
- a computer 200 acting as the appliance server 108 may lack devices such as a display 218 and/or keyboard 210 that are not necessarily required to operate it.
- the computer 200 executes one or more operating systems such as a variant of MICROSOFT WINDOWS or LINUX.
- the operating system executes one or more application programs.
- the operating system and application programs executed by the computer are formed of one or more processes.
- FIG. 3 illustrates the contents of a file-based image library 116, in one embodiment.
- a file-based image library 116 the files from various endpoints 112 are stored individually. This allows an administrator to easily analyze and edit the individual files from the endpoints 112. Also, as discussed below, certain optimizations enable the file-based image library 116 to have decreased storage needs on the appliance 102 and to copy less data over the network 104 during image harvesting and deployment.
- the file-based image library 116 includes a global file store 312 that includes files 306 from all endpoints 112 that have been harvested. Files that exist identically on the local disks 122 of multiple endpoints 112 will be contained only once in the global file store 312.
- endpoints 112 contain similar files. For example, if several endpoints 112 are workstations running the same MICROSOFT WINDOWS operating system, the workstations will all contain several common operating system files, but the global file store 312 will contain only a single copy of these common files.
- the file-based image library 116 includes an endpoint manifest 302 for each harvested endpoint 112.
- the endpoint manifest 302 contains a file information block 304 for each file harvested from the local disk 122 of the endpoint 112.
- An endpoint manifest 302 and files 306 pointed to by the manifest can be considered a file-based image of a particular endpoint 112.
- a file information block 304 includes the name of a file 306, the size of the file, and access control list (ACL) information about the file that can specify file ownership and read/write permissions.
- the file information block 304 also includes a hash, also referred to as a digest or fingerprint, of the file 306 that serves to uniquely identify the file.
- the hash is a value produced by applying a hash function to the file data.
- the hash function is chosen so that it is highly unlikely that two different files will produce the same hash.
- An example hash function is the Message-Digest 5 (MD5) algorithm that takes a file as an input and produces a 128-bit hash as an output.
- MD5 Message-Digest 5
- the file information block 304 includes a pointer to the actual file stored in the global file store 312. Since multiple endpoints 112 may have the same file that is stored only once in the global file store 312, multiple file information blocks 304 may point to the same file 306. For example, in FIG. 3, file information blocks 304B and 304C both point to file 306B. It is possible for file information blocks 304B and 304C to have different names and ACL information for the same file 306B depending on how the file was stored on the two endpoints 112 corresponding to manifests 302 A and 302B.
- the endpoint manifest 302 also includes the directory structure 310 on the local disk 122 of the endpoint 112.
- the directory structure 310 can be used in an image deployment to create the required directories on the endpoint 112 and to place the files 306 in the correct directories.
- the file database 314 contains file identifiers 308 for each file 306 in the global file store 312. Each file identifier 308 contains links to all file information blocks 304 corresponding to that file identifier. As a result, the file database 314 can be used to produce a list of all unique files 306 currently in the file-based image library 116 along with information about each file, such as the endpoints 112 where it is located, and its filename on each such endpoint. Such a list may be useful for IT administration purposes. Additionally, the file database 314 can be used to search for a file matching certain criteria, such as a particular filename or file size. Each file identifier 308 also contains a reference count for the corresponding file.
- the reference count is the number of file information blocks 304 that point to the file 306 corresponding to the file identifier 308. When a new pointer is added, the reference count is increased, and when a pointer is removed, the reference count is decreased. When the reference count decreases to zero, the file 306 and file identifier 308 can be deleted from the image library 116.
- FIG. 4 is a flowchart illustrating a method of booting a managed endpoint 112, in one embodiment. Some embodiments may perform additional and/or different parts of the method than those shown in FIG. 4. In addition, the method parts may be performed in different orders.
- an embodiment of the endpoint 112 performs a PXE boot. Initially, the managed endpoint 112 requests and receives 402 an IP address from the DHCP server 114. In addition, the endpoint receives the location of a boot image from the DHCP server. The endpoint 112 retrieves 404 the boot image, loads it into memory and runs 406 it. In one embodiment, the boot image causes the endpoint 112 to run the boot image from a RAM disk 120. The boot image 126 then starts 408 an administrative task such as harvesting an image or deploying an image. The running boot image will optionally display a menu to the user, allowing the user to choose what action to perform on the endpoint 112. [0044] FIG.
- the files to be harvested from the local disk 122 are identified 502.
- the files to be harvested can be based on a list provided by an administrator or can be all the files on the disk 122. Hashes are calculated 504 for each of the identified files.
- the file database 314 is checked 506 for hash matches.
- a match indicates that the file is already in the global file store 312 and that the file does not need to be copied.
- non-matched files are copied from the endpoint 112 over the network 104 and stored 508 in the global file store 312.
- a manifest 302 for the endpoint 112 is created containing file information blocks 304 for identified files from the endpoint and a directory structure 310 for the endpoint.
- the manifest 302 is stored 510 in the image library 116 and pointers from the file information blocks 304 to files 306 in the global store 312 are constructed.
- the file database 314 is updated 512 to contain file identifiers 308 for newly added files 306.
- FIG. 6 is a flowchart illustrating a method of deploying a file-based image to the local disk 122 of an endpoint 112. Some embodiments may perform additional and/or different parts of the method than those shown in FIG. 6. In addition, the parts of the method may be performed in different orders.
- the contents of the local disk 122 are modified so that the local disk contains the files 306 and directory structure 310 specified in a particular manifest 302 in the image library 116.
- hashes of files on the local disk 122 are calculated 602. These hashes are compared 604 with hashes in the file information blocks 304 stored in the manifest 302 to determine files that are common to both the local disk and the manifest.
- Files on the local disk 122 that are not in the manifest 302 are deleted 606 from the local disk.
- Files in the manifest 302 that are not on the local disk 122 are copied 608 from the global store 312 to the local disk.
- File attributes on the local disk 122 are set 610 according to the attributes stored in the file information block 304.
- Hashes are used when comparing files, since filenames or other file attributes can vary for the same file.
- Files can be transmitted over the network 104 in a compressed format to further decrease network resources used.
- the methods also reduce the storage required by the image library 116 by storing only unique files in the global file store 312.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2008231291A AU2008231291B2 (en) | 2007-03-23 | 2008-02-11 | IT automation appliance imaging system and method |
CN2008800155255A CN101681256B (en) | 2007-03-23 | 2008-02-11 | IT automation appliance imaging system and method |
EP08729492A EP2130117A4 (en) | 2007-03-23 | 2008-02-11 | It automation appliance imaging system and method |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US89685707P | 2007-03-23 | 2007-03-23 | |
US60/896,857 | 2007-03-23 | ||
US12/021,143 | 2008-01-28 | ||
US12/021,143 US7941599B2 (en) | 2007-03-23 | 2008-01-28 | IT automation appliance imaging system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2008118548A1 true WO2008118548A1 (en) | 2008-10-02 |
Family
ID=39775871
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2008/053539 WO2008118548A1 (en) | 2007-03-23 | 2008-02-11 | It automation appliance imaging system and method |
Country Status (6)
Country | Link |
---|---|
US (2) | US7941599B2 (en) |
EP (1) | EP2130117A4 (en) |
CN (1) | CN101681256B (en) |
AU (1) | AU2008231291B2 (en) |
MY (1) | MY149947A (en) |
WO (1) | WO2008118548A1 (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7941599B2 (en) * | 2007-03-23 | 2011-05-10 | Kace Networks, Inc. | IT automation appliance imaging system and method |
US8140637B2 (en) | 2007-10-25 | 2012-03-20 | Hewlett-Packard Development Company, L.P. | Communicating chunks between devices |
DE112007003645B4 (en) * | 2007-10-25 | 2011-06-16 | Hewlett-Packard Development Co., L.P., Houston | Data processing device and method for data processing |
DE112007003693B4 (en) * | 2007-10-25 | 2014-05-15 | Hewlett-Packard Development Co., L.P. | Data processing device and method for data processing |
GB2466581B (en) * | 2007-10-25 | 2013-01-09 | Hewlett Packard Development Co | Data processing apparatus and method of deduplicating data |
US9116715B2 (en) * | 2008-02-04 | 2015-08-25 | Rightscale, Inc. | Systems and methods for efficiently booting and configuring virtual servers |
US8489995B2 (en) * | 2008-03-18 | 2013-07-16 | Rightscale, Inc. | Systems and methods for efficiently managing and configuring virtual servers |
GB2472520B (en) * | 2008-04-25 | 2012-11-21 | Hewlett Packard Development Co | Data processing apparatus and method of deduplicating data for data backup |
US8856486B2 (en) * | 2011-02-23 | 2014-10-07 | Citrix Systems, Inc. | Deploying a copy of a disk image from source storage to target storage |
US9396311B2 (en) | 2011-07-13 | 2016-07-19 | Dell Products L.P. | Mini appliance ensuring software license compliance |
US9430622B2 (en) | 2011-07-13 | 2016-08-30 | Dell Products L.P. | Mini appliance |
US9015224B2 (en) | 2011-10-09 | 2015-04-21 | LabTech, LLC | Interactive response of a remote monitoring and management system |
US9055091B2 (en) | 2011-11-16 | 2015-06-09 | LabTech, LLC | Adaptive timing of distributed device response to maximize channel capacity utilization |
US9240971B2 (en) | 2011-11-16 | 2016-01-19 | LabTech, LLC | Automated management of generalized central name services by distributed remote devices |
US9983960B2 (en) | 2012-01-23 | 2018-05-29 | International Business Machines Corporation | Offline initialization for a remote mirror storage facility |
US8914785B2 (en) | 2012-07-30 | 2014-12-16 | International Business Machines Corporation | Providing virtual appliance system firmware images |
US9245249B2 (en) | 2013-03-12 | 2016-01-26 | Labtech Llc | General, flexible, resilent ticketing interface between a device management system and ticketing systems |
US10372463B1 (en) * | 2013-11-27 | 2019-08-06 | EMC IP Holding Company LLC | Provisioning a computerized device with an operating system |
US10223294B2 (en) * | 2015-09-01 | 2019-03-05 | Nxp Usa, Inc. | Fast secure boot from embedded flash memory |
US10102008B2 (en) * | 2015-09-02 | 2018-10-16 | Dell Products L.P. | Managed boot process system |
US11847028B2 (en) | 2020-07-03 | 2023-12-19 | Vmware, Inc. | Efficient export of snapshot changes in a storage system |
US11494334B2 (en) * | 2020-12-11 | 2022-11-08 | Vmware Inc. | Embedded reference counts for file clones |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030083355A1 (en) | 2001-08-06 | 2003-05-01 | Recordati Ireland Limited | Novel crude and crystalline forms of lercanidipine hydrochloride |
US6625623B1 (en) * | 1999-12-16 | 2003-09-23 | Livevault Corporation | Systems and methods for backing up data files |
US20050010835A1 (en) | 2003-07-11 | 2005-01-13 | International Business Machines Corporation | Autonomic non-invasive backup and storage appliance |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2334354B (en) * | 1998-02-13 | 2003-04-16 | Ibm | Booting a computer system from a network |
WO2002025438A1 (en) * | 2000-09-22 | 2002-03-28 | Patchlink.Com Corporation | Non-invasive automatic offsite patch fingerprinting and updating system and method |
US6813708B2 (en) * | 2002-10-29 | 2004-11-02 | Electronic Data Systems Corporation | System and method for searching a BIOS for a type of computer network drive to boot and an operating system for migrating an operating system to a computer |
US7814126B2 (en) * | 2003-06-25 | 2010-10-12 | Microsoft Corporation | Using task sequences to manage devices |
US7243224B2 (en) * | 2003-12-31 | 2007-07-10 | Intel Corporation | Preboot execution bootloading |
KR100777446B1 (en) * | 2005-05-25 | 2007-11-21 | 삼성전자주식회사 | Electronic device and booting method thereof |
US7818427B2 (en) * | 2006-03-21 | 2010-10-19 | Kace Networks, Inc. | IT automation scripting module and appliance |
US7814190B2 (en) * | 2006-03-21 | 2010-10-12 | Kace Networks, Inc. | IT automation filtering and labeling system and appliance |
US20080109396A1 (en) * | 2006-03-21 | 2008-05-08 | Martin Kacin | IT Automation Appliance And User Portal |
US7673131B2 (en) * | 2006-05-05 | 2010-03-02 | Microsoft Corporation | Booting an operating system in discrete stages |
US7941599B2 (en) * | 2007-03-23 | 2011-05-10 | Kace Networks, Inc. | IT automation appliance imaging system and method |
-
2008
- 2008-01-28 US US12/021,143 patent/US7941599B2/en active Active
- 2008-02-11 AU AU2008231291A patent/AU2008231291B2/en not_active Ceased
- 2008-02-11 WO PCT/US2008/053539 patent/WO2008118548A1/en active Application Filing
- 2008-02-11 EP EP08729492A patent/EP2130117A4/en not_active Ceased
- 2008-02-11 MY MYPI20093955A patent/MY149947A/en unknown
- 2008-02-11 CN CN2008800155255A patent/CN101681256B/en not_active Expired - Fee Related
-
2011
- 2011-03-29 US US13/074,194 patent/US8140748B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6625623B1 (en) * | 1999-12-16 | 2003-09-23 | Livevault Corporation | Systems and methods for backing up data files |
US20030083355A1 (en) | 2001-08-06 | 2003-05-01 | Recordati Ireland Limited | Novel crude and crystalline forms of lercanidipine hydrochloride |
US20050010835A1 (en) | 2003-07-11 | 2005-01-13 | International Business Machines Corporation | Autonomic non-invasive backup and storage appliance |
Also Published As
Publication number | Publication date |
---|---|
US20110173430A1 (en) | 2011-07-14 |
US8140748B2 (en) | 2012-03-20 |
CN101681256A (en) | 2010-03-24 |
EP2130117A4 (en) | 2010-07-07 |
CN101681256B (en) | 2012-05-23 |
US20080235445A1 (en) | 2008-09-25 |
EP2130117A1 (en) | 2009-12-09 |
AU2008231291A1 (en) | 2008-10-02 |
AU2008231291B2 (en) | 2012-03-29 |
US7941599B2 (en) | 2011-05-10 |
MY149947A (en) | 2013-11-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2008231291B2 (en) | IT automation appliance imaging system and method | |
AU2007254474B9 (en) | Updating virtual machine with patch or the like | |
US9940330B2 (en) | System and method for converting a physical disk to a virtual disk | |
US8219592B2 (en) | Method and system for using overlay manifests to encode differences between virtual machine images | |
US20140172783A1 (en) | System and method for providing computing environment delivery service with offline operations | |
US9087076B2 (en) | Automated filer technique for use in virtualized appliances and applications | |
US7669021B2 (en) | File system based offline disk management | |
US7856440B2 (en) | Method and system for separating content identifiers from content reconstitution information in virtual machine images | |
US7996414B2 (en) | Method and system for separating file system metadata from other metadata in virtual machine image format | |
US6408434B1 (en) | System and method for using a substitute directory to automatically install an update program | |
US7856439B2 (en) | Method and system for using semantic information to improve virtual machine image management | |
US8347284B2 (en) | Method and system for creation of operating system partition table | |
US8176482B1 (en) | Methods and systems for inserting software applications into images | |
EP2226722A1 (en) | Methods and systems for merging virtualization sublayers | |
US10331427B2 (en) | Capturing and deploying an operation system in a computer environment | |
US20180225105A1 (en) | Mechanism for customizing multiple computing devices | |
US20220350584A1 (en) | Universal return to factory image process |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200880015525.5 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08729492 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1790/MUMNP/2009 Country of ref document: IN Ref document number: 2008729492 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008231291 Country of ref document: AU |
|
ENP | Entry into the national phase |
Ref document number: 2008231291 Country of ref document: AU Date of ref document: 20080211 Kind code of ref document: A |