WO2013049426A1 - Fault tolerant external application server - Google Patents

Fault tolerant external application server Download PDF

Info

Publication number
WO2013049426A1
WO2013049426A1 PCT/US2012/057677 US2012057677W WO2013049426A1 WO 2013049426 A1 WO2013049426 A1 WO 2013049426A1 US 2012057677 W US2012057677 W US 2012057677W WO 2013049426 A1 WO2013049426 A1 WO 2013049426A1
Authority
WO
WIPO (PCT)
Prior art keywords
agent
farm
external application
application server
running
Prior art date
Application number
PCT/US2012/057677
Other languages
French (fr)
Inventor
Nicholas Michael SIMONS
Corey David SHAW
Dong MING
Sugandha Sudeshkumar Kapoor
Christopher BROUSSARD
Richard Alan MARENO
Matthew James Ruhlen
Tara Kraft
Original Assignee
Microsoft Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corporation filed Critical Microsoft Corporation
Priority to EP12834670.7A priority Critical patent/EP2761486A4/en
Priority to KR1020147008020A priority patent/KR101951066B1/en
Priority to JP2014532124A priority patent/JP6220338B2/en
Publication of WO2013049426A1 publication Critical patent/WO2013049426A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Definitions

  • Enterprises often maintain various types of documents that are stored in different places for different purposes.
  • documents are created and stored according to a variety of different software applications and storage systems.
  • documents may be generated using word processing applications, spreadsheet applications, presentation applications, note applications, graphic design applications, photographic applications, and the like.
  • Generated documents may be stored via a variety of storage systems, including one or more content servers used for storing documents of various types, servers for storing documents as attachments to electronic mail items (e- mail), storage systems for storing documents as attachments to meetings, customer relationship management (CRM) systems for storing documents as attachments to leads or customer data, general purpose document stores for storing documents for routine use, and/or specialized document stores (e.g., Documentum® from Documentum, Inc.) for storing documents for specific, highly regulated needs.
  • content servers used for storing documents of various types
  • storage systems for storing documents as attachments to meetings
  • CRM customer relationship management
  • general purpose document stores for storing documents for routine use
  • specialized document stores e.g., Documentum® from Documentum, Inc.
  • a typical server farm In a typical server farm, proper operation requires all members of the farm to share an up-to-date and perfect understanding of the farm topology and configuration in order to avoid a loss of functionality. In order to provide an up-to-date understanding, a typical server farm relies on a state configuration database; however, the use of a state configuration database generally adds complexity to the management, requirements, administration, and cost of the server farm.
  • the external application server farm includes a fault tolerant farm (FTF) system.
  • FTF fault tolerant farm
  • the external application server farm achieves a low administrative burden, minimal supporting software requirements, and excellent robustness, reliability, and scalability as the result of the FTF system.
  • the major components of the FTF system include the farm management component, the fungible server component, and the health monitoring component.
  • the FTF system manages the farm state, which describes the current state of the external application server farm without the cost and complexity of a state management database.
  • the FTF system includes a variety of agents that run on each member of the external application server farm.
  • An agent is a system service that provides a distinct piece of functionality for the farm member running the agent.
  • the farm management component includes the farm state manager and the farm state replicator.
  • the primary functions of the farm management component are managing configuration changes to the farm state and distributing the farm state to the farm members.
  • the farm state manager is an agent running on each farm member. Although each farm member runs the farm state manager only one instance of the farm state manager is designated as the master farm state manager at any given time. Any instances of the farm state manager that are not designated as the master (i.e., the secondary instances) generally continue to run but have no responsibilities (i.e., they do not do anything).
  • the master farm state manager maintains the "official" (i.e., true) version of the farm state for the entire external application server farm.
  • the FTF system stores the official farm state in the central configuration store. Each farm member caches a local copy of the farm state in a local configuration store.
  • the FTF system allows the external application server farm to continue to function even if the active master farm state manager fails. In that event, the administrator manually designates another farm state manager as the master. Because of the fluid design of the farm state handling by the FTF system, it is not necessary to promote another farm state manager. Until a new master farm state manager is specified, each separate instance of the farm state manager continues to operate independently using the last known farm state cached in the local configuration store of that particular computing device.
  • the farm state replicator is an agent that makes sure each farm member has a reasonably current copy of the official version of the farm state.
  • Each computing device runs an instance of the farm state replicator. To keep the locally cached version of the farm state reasonably current, the farm state replicator periodically contacts the master farm state manager and copies the official farm state to the computing device's local configuration store.
  • the amount of time between updates to the local configuration store represents an inherent latency in the farm management component. Because of the latency involved in the propagation of the official farm state to the farm members introduced by the farm management component, the overall farm state is presumed to be incoherent (i.e., the farm state known to individual farm members can differ from the official farm state and/or the farm state known to other farm members). As the latency period passes without any configuration changes, the overall farm state becomes coherent (i.e., the external application server operates as the administrator intends) once each farm member gets the official farm state from central configuration store. It is not necessary that the latency period be short for the external application server farm to remain functional. An extended latency period simply increases the amount of time required before all farm members operate as intended by the administrator.
  • the external application server exhibits a high degree of fault tolerance due to the fungible server component.
  • the fungible server component allows the external application server farm to operate with an incoherent farm state without a loss of functionality.
  • a first aspect of the fungible server component is the intended role component.
  • the members of the farm and the role of each farm member are specified in the farm configuration; however, the external application server roles are intended roles that describe the primary focus of that particular member without restricting the functionality of the member.
  • the fungible server component requires all farm members to run all agents, or at least all agents specific to the functionality of the external application server, at all times. Thus, each member is capable of performing any action normally handled by the external application server. Moreover, each farm member will perform any action that is requested of it regardless of the intended role assigned to that member.
  • a second aspect of the fungible server component is the fallback behavior component.
  • the external application server receives requests from outside sources and those requests are distributed to a farm member based on the configuration of the external application server. Additionally, intra-farm requests can be made between the farm members. If a request made to a farm member but the request is not filled for any reason within the control of the external application server, the request will be made to other farm members, including the requestor, until the request is fulfilled.
  • the fallback behavior component handles the response of the external application server farm to configuration problems in the farm state. If a setting is insolubly misconfigured by the administrator or not understood by the external application server, the external application server reverts to default values for the setting or ignores the setting, as appropriate.
  • the combination of the intended role component and the fallback behavior component, the fungible server system makes the external application server extremely fault tolerant of individual farm members failing or otherwise not behaving.
  • the intended role subsystem and the fallback behavior subsystem ensure that all requests made to the external application server are handled without any outwardly apparent (i.e., apparent to the user) loss of functionality.
  • the health monitoring component monitors the health of each farm member and the various agents running on each member.
  • Each farm member runs a number of watchdog agents and a health assessment agent.
  • Each watchdog agent is responsible for monitoring the status of a non- watchdog agent running on the farm member. If there is a problem with the non-watchdog agent being monitored, the responsible watchdog agent will take an appropriate action. In various embodiments, appropriate actions include, but are not limited to, attempting to restart the associated non-watchdog agent that is not running and reporting a problem with the associated non-watchdog agent to the health assessment agent.
  • the health assessment agent determines whether or not a farm member is healthy based on reports from the watchdog agents and reports the health determination (i.e., the member health report) to the master farm state manager. In turn, the master farm state manager records each member health report as part of the farm state.
  • Figure 1 illustrates a block diagram of an enterprise network employing one embodiment of the host agnostic document access system
  • Figure 2 illustrates a block diagram of one embodiment of the architecture of the external application server
  • FIG. 3 illustrates a block diagram of an external application server showing one embodiment of the components of the fault tolerant farm (FTF) system;
  • FTF fault tolerant farm
  • Figure 4 is a simplified block diagram of a computing device with which embodiments of the present invention may be practiced
  • Figures 5A and 5B are simplified block diagrams of a mobile computing device with which embodiments of the present invention may be practiced; and [0020] Figure 6 is a simplified block diagram of a distributed computing system in which embodiments of the present invention may be practiced.
  • a fault tolerant external application server is described herein and illustrated in the accompanying figures.
  • the external application server is a web based system that allows a user of a client computing device to work with a file over a network via a general client application communicating with a host.
  • the host brokers the functionality of and provides a platform for interacting with the external application server.
  • the external application server is implemented as a server farm.
  • a fault tolerant farm system combines latent configuration replication between farm members, interchangeable farm members, and optional health monitoring to allow the external application server farm to provide on- the-fly configuration while maintaining full functionality without requiring a real time state management database.
  • FIG. 1 illustrates one embodiment of an exemplary enterprise network 100 including one or more hosts 102 and one or more external application servers 104.
  • a user 106 accesses the host 102 using a web browser 108 from a client computing device 110.
  • the host 102 is, most generally, a content server that stores documents in a document storage system 126 and manages permissions for the user 106.
  • the host 102 runs a host application 112 providing a host user interface 114 that handles the normal functions of the host 102. At least some of the normal functions of the host 102 involve providing the user 106 with access to stored documents 116 contained in a content store 126 and intended to be viewed and/or edited using a supporting application.
  • the host 102 also provides a generic platform to make the services of the external application server 104 available to user 106.
  • the external application server 104 provides browser based web applications that allow the user 106 to interact with documents available through the host.
  • the open platform interface defines and directs document operations between the host 102 and the external application server 104.
  • the host 102 also implements an endpoint 120 to receive communications from the external application server 104.
  • the host 102 initiates scenarios involving the services of the external application server 104, the host 102 does not make calls to the external application server 104. Instead, the external application server 104 exposes supported functionality to operate on supported document types using callbacks.
  • the external application server 104 runs one or more web based service applications 118 enabling the user 106 to access, view, edit, and, optionally, perform other operations on content (i.e., a file or document) and perform folder (i.e., directory) management over the network from the client computing device 110 without requiring a local installation of the appropriate application(s) needed to work with a particular document type.
  • the operation and output of the external application server 104 is not specific to the host 102 that invokes the functionality of the external application server 104.
  • Each service application 118 generally runs as a service on the external application server 104.
  • the external application server 104 uses the open platform interface and the set of open platform interface conventions to integrate with the host 102.
  • the external application server 104 provides the necessary operations and functionality to work with a document of a selected file type.
  • the external application server 104 is host agnostic. In other words, the operation and/or output of the external application server 104 are not specific to the host 102 that facilitates access to the services of the external application server 104.
  • Examples of the service applications 118 to handle various document types include the online (i.e., web based) companions to the standard (i.e., locally installed) applications for working with word processing documents, spreadsheets, presentations, and notes.
  • each service application 118 are typically specific to a selected file type or related to folder management.
  • the core operations provided by the external application server 104 are viewing and editing documents.
  • the service application 118 provides one or more additional operations including, but not limited to, reformatting a document for viewing on a mobile device, creating a new document, converting a document, embedding a document, and broadcasting a document. From the perspective of the external application server 104, broadcasting and embedding are particular interactive user flows.
  • the external application server 104 displays the document on multiple client computing devices 110, and in one embodiment, and keeps track of the current page being view at each multiple client computing devices.
  • the host 102 manages the document upload, broadcast initiation, and the rich client entry points. In another embodiment of the broadcasting operation, page tracking is handled by the host 102.
  • each service application entry URL serves as an entry point to the external application server 104 for a particular operation on a particular document type.
  • each service application entry URL includes the address of the external application server 104 and specifies both the task (e.g., embedded edit using the spreadsheet application) and the required data to accomplish the requested task, namely the metadata URL for the document and the access token authorizing access.
  • the host 102 When the user 106 selects an operation for a document, the host 102 generates a service application entry URL for that operation against the selected document for the user. More specifically, the external application host page 122 generates the URL parameters used with the service application 118.
  • the parameters generated by external application host page 122 include, but are not limited to, the access token and the source URL.
  • the source URL is the URL that the service application 118 uses to access the host endpoint 120 and the document.
  • the access token is a token that is unique to the user/object pair that the host endpoint 120 uses to authenticate the user 106 and authorize access to the document and/or the service application 118.
  • the access token is calculated based on a hash of one or more of the user identifier, the time stamp, and the document identifier and is encrypted with a secret known to the host 102 (e.g., stored in the host configuration database).
  • the service application entry points are handled through the wrapper provided by the host 102.
  • the wrapper provided by the host 102 is a framework or environment that displays the output of the external application server 104 and accepts input from the client computing device 110 allowing a user 106 to interact with a document using the functionality provided by the service application 118.
  • the wrapper includes the external application host page 122 and/or an application frame 124.
  • the external application host page 122 generated by the host 102 is a single page that hosts all service application pages generated by the application server 104 in a web page container such as an inline frame (iFrame) with an edge-to-edge layout.
  • the external application host page 122 has no user interface of its own. Alternate implementations of the external application host page 122 may include a user interface or substitute other web page containers and layouts for those described above.
  • the external application server 104 provides the necessary functionality to access, edit, view, and otherwise manipulate or work with various document types.
  • the external application server 104 does not include the complexity and overhead associated with network access, user authentication, file storage, network and file security, and other administrative tasks normally handled by other servers within a network and often specific to a particular enterprise. Omitting such features and focusing the external application server 104 on handling document operations through the open platform interface allows the external application server 104 to be used in a wide range of enterprise network scenarios. It should be appreciated that an external application server 104 performing as described herein and assuming additional roles and responsibilities normally handled by other servers on the enterprise network falls within the scope and spirit of the present invention.
  • the host is an online server application capable of being accessed over a network using a general client application, such as a web browser.
  • the services provided by the external application server 104 are consumed by the host and made available to a client computing device.
  • the host When attached to an external application server 104, the host becomes aware of the service application and functionality supported by the external application server 104.
  • the open platform interface is both extensible and provides support for cross- version interface communication.
  • the basic data transport mechanism of the open platform interface facilitates cross-platform communication.
  • the basic data is transferred in a JavaScript Object Notation (JSON) body, although it should be recognized that other human and/or machine readable data interchange formats fall within the scope and spirit of the present invention.
  • JSON JavaScript Object Notation
  • the open platform interface also follows the service oriented architecture principles of "ignore what you did't expecting” and “use default values for data you were expecting but didn't get” used by some application programming interfaces such as the Windows Communication Foundation (WCF).
  • WCF Windows Communication Foundation
  • FIG. 2 illustrates one embodiment of the topology of the external application server 104 implemented as a multi-server farm. It is not necessary for the external application server 104 to include multiple servers.
  • One embodiment of the external application server 104 is implemented using a single computing device, which effectively operates as a single server "farm".
  • each member 202, 204a, 204b, 204c of the external application server farm 200 is assigned a role as a front end server 202 or a back end server 204a, 204b, 204c.
  • a front end server 202 is responsible for routing document handling requests to the back end server 204a, 204b, 204c associated with the selected document type.
  • each back end server 204a, 204b, 204c provides document handling services for a specific document type.
  • the farm state 208 of the external application server 104 is stored in one or more files contained in the central configuration store 210.
  • the information contained in the farm state 208 includes, but is not limited to, one or more of the following items: farm topology (i.e., identification of the members of the farm), farm member roles, configuration settings for the farm members, external application server configuration settings, service application configuration settings, and farm member health.
  • farm topology i.e., identification of the members of the farm
  • farm member roles i.e., configuration of the farm members
  • configuration settings for the farm members i.e., external application server configuration settings, service application configuration settings, and farm member health.
  • Each farm member 202, 204a, 204b, 204c must have read access to the central configuration store 210.
  • the central configuration store 210 is a shared folder readable by each computing device that makes up the external application server.
  • the files storing the farm state 208 are machine readable and, optionally, human readable.
  • the external application server 104 is accessible through standard network resource addressing schemes. Suitable network addressing schemes include, but are not limited to, uniform naming convention (UNC) paths, drive mappings, and uniform resource indicators (URI), such as uniform resource names (URN) and uniform resource locators (URL).
  • UNC uniform naming convention
  • URI uniform resource indicators
  • the externally visible addresses either face the internet or an intranet and are commonly accessed using a URL.
  • the internal addresses of the external application server 104, such as the configuration folder path, are commonly accessed using a UNC path.
  • intra-farm communications are secure to ensure that only members of the farm make requests against the cache and the back end servers. This is accomplished by checking the identity of the requesting machine. Intra-farm communication is optionally encrypted for enhanced security.
  • FIG. 3 illustrates an external application server farm 200 with one embodiment of the fault tolerant farm (FTF) system 300.
  • the external application server farm 200 achieves a low administrative burden, minimal supporting software requirements, and excellent robustness, reliability, and scalability as the result of the FTF system 300.
  • the major components of the FTF system 300 include the farm management component 302, the fungible server component 304, and the health monitoring component 306.
  • the FTF system 300 manages the farm state 208, which describes the current state of the external application server farm 200, without the cost and complexity of a state management database.
  • the FTF system 300 includes a variety of agents that run on each member of the external application server farm 200.
  • An agent is a system service that provides a distinct piece of functionality for the farm member running the agent.
  • the external application server farm 200 shows a variable set of farm members 308a-308n.
  • the farm management component 302 includes the farm state manager 310a, 310b and the farm state replicator 312.
  • the primary functions of the farm management component 302 are managing configuration changes to the farm state and distributing the farm state to the farm members 308a-308n.
  • the farm state manager 310a, 310b is an agent running on each farm member 308a-308n. Although each farm member 308a-308n runs the farm state manager 310a, 310b only one instance of the farm state manager is designated as the master farm state manager 310a at any given time. Any instances of the farm state manager 310b that are not designated as the master (i.e., the secondary instances) generally continue to run but have no responsibilities (i.e., they do not do anything). In an alternate embodiment, the secondary instances of the farm state manager 310b are stopped when a master farm state manager 310a is found and only start if no master farm state manager 310a is available or at the manual request of the administrator.
  • the master farm state manager 310a maintains the "official" (i.e., true) version of the farm state 208 for the entire external application server farm 200.
  • the FTF system 300 stores the official farm state 208 in the central configuration store 210.
  • Each farm member caches a local copy of the farm state in a local configuration store 314.
  • the master farm state manager 310a accepts configuration changes made from any farm member and updates the official version of the configuration state in the central configuration store 210. In order to prevent conflicts from arising when multiple configuration changes are contemporaneously attempted, the master farm state exercises access control over the central configuration store 210. In one embodiment, the master farm state manager 310a writes the configuration state change to the configuration files in the central configuration store 210 and controls conflicts by locking the configuration files when a configuration change is received. In one embodiment, the central configuration store 210 is the local configuration store 314 on the farm member running the master farm state manager 310a. The master farm state manager 310a also accepts requests for a current copy of the farm state from any farm member 308a-308n. In some embodiments, the master farm state manager 310a only accepts of configuration changes and requests from selected farm members and/or selected computing devices which are not members of the external application server farm 200.
  • the FTF system 300 allows the external application server farm 200 to continue to function even if the active master farm state manager 310a fails. In that event, the administrator manually designates another farm state manager 310b as the master. Because of the fluid design of the farm state handling by the FTF system 300, it is not necessary to promote another farm state manager 310b. Until a new master farm state manager 310a is specified, each separate instance of the farm state manager 310b continues to operate independently using the last known farm state cached in the local configuration store 314 of that particular computing device. In an alternate embodiment, the external application server automatically promotes another farm state manager to master. In the various embodiments, the automatic decision to automatically promote one instance of the farm state manager is entirely arbitrary or is based on selection criteria (e.g., considering the role, load, and/or resources of the computing device and/or the time of the last farm state replication operation).
  • the farm state replicator 312 is an agent that makes sure each farm member 308a-308n has a reasonably current copy of the official version of the farm state.
  • Each computing device runs an instance of the farm state replicator 312; however, unlike the farm state manager, there is no master farm state replicator.
  • the farm state replicator 312 periodically contacts the master farm state manager 310a and copies the official farm state to the computing device's local configuration store 314.
  • the farm state replicator 312 updates the local farm state of the farm member on a schedule (e.g., every 30 seconds).
  • each individual farm state replicator 312 operates on an independent schedule.
  • each individual farm state replicator 312 operates on a common schedule based on a master clock (e.g., at the start of each minute of a synchronized clock). In certain embodiment, the farm state replicator 312 updates the local configuration state in response to an event or other similar trigger.
  • the amount of time between updates to the local configuration store represents an inherent latency in the farm management component 302. Because of the latency involved in the propagation of the official farm state to the farm members 308a-308n introduced by the farm management component 302, the overall farm state is presumed to be incoherent (i.e., the farm state known to individual farm members can differ from the official farm state and/or the farm state known to other farm members). As the latency period passes without any configuration changes, the overall farm state becomes coherent (i.e., the external application server operates as the administrator intends) once each farm member 308a-308n gets the official farm state from central configuration store 210. It is not necessary that the latency period be short for the external application server farm 200 to remain functional. An extended latency period simply increases the amount of time required before all farm members operate as intended by the administrator.
  • the external application server 104 exhibits a high degree of fault tolerance due to the fungible server component 304.
  • the fungible server component 304 allows the external application server farm 200 to operate with an incoherent farm state without a loss of functionality.
  • a first aspect of the fungible server component 304 is the intended role component.
  • the members of the farm and the role of each farm member 308a-308n are specified in the farm configuration; however, the external application server roles are intended roles rather than strict roles commonly used with conventional servers.
  • a strict role defines the services that are run on a particular server. Assigning a strict role to a server is often done to optimize the performance of the server or tailor the functions handled by a particular server to that server's resources.
  • the intended role describes the primary focus of that particular member without restricting the functionality of the member. Although an intended role does not directly impact the functionality of the member, the use of an intended role provides other benefits, such as performance improvements as a result of load balancing between the farm members.
  • the fungible server component 304 requires all farm members 308a-308n to run all agents, or at least all agents specific to the functionality of the external application server 104, at all times.
  • farm management agents e.g., the farm state manager 310 and the farm state replicator 312
  • document handling agents 316a-316d e.g., word processing viewer agents, spreadsheet editor agents, and presentation broadcast agents
  • monitoring agents e.g., watchdog agents and health assessment agents.
  • each member is capable of performing any action normally handled by the external application server.
  • each farm member 308a-308n will perform any action that is requested of it regardless of the intended role assigned to that member.
  • a second aspect of the fungible server component 304 is the fallback behavior component.
  • the external application server 104 receives requests from outside sources and those requests are distributed to a farm member based on the configuration of the external application server. Additionally, intra-farm requests can be made between the farm members 308a-308n. If a request made to a farm member but the request is not filled for any reason within the control of the external application server, the request will be made to other farm members, including the requestor, until the request is fulfilled.
  • the fungible server system allows a member (i.e., the requestor) to handle its own request.
  • the fallback behavior component handles the response of the external application server farm 200 to configuration problems in the farm state. If a setting is insolubly misconfigured by the administrator or not understood by the external application server 104, the external application server 104 reverts to default values for the setting or ignores the setting, as appropriate.
  • the combination of the intended role component and the fallback behavior component, the fungible server system makes the external application server extremely fault tolerant of individual farm members failing or otherwise not behaving.
  • the intended role subsystem and the fallback behavior subsystem ensure that all requests made to the external application server are handled without any outwardly apparent (i.e., apparent to the user) loss of functionality.
  • the health monitoring component 306 monitors the health of each farm member and the various agents running on each member.
  • Each farm member runs a number of watchdog agents 318a-318f and a health assessment agent 320.
  • Each watchdog agent 318a-318f is responsible for monitoring the status of a non-watchdog agent (e.g., the farm management agents 310a, 310b, 312 and the document handling agents 316a-316d) running on the farm member 308a-308n.
  • a non-watchdog agent e.g., the farm management agents 310a, 310b, 312 and the document handling agents 316a-316d
  • each watchdog agent is uniquely paired (i.e., associated) with one of the non-watchdog agents. If there is a problem with the non-watchdog agent being monitored, the responsible watchdog agent will take an appropriate action.
  • appropriate actions include, but are not limited to, attempting to restart the associated non-watchdog agent that is not running and reporting a problem with the associated non- watchdog agent to the health assessment agent 320.
  • the watchdog agent will report a problem with the associated non-watchdog agent directly to the master farm state manager 310a.
  • the responsible watchdog agent periodically reports the status of the associated non- watchdog agent regardless of whether or not a problem is detected.
  • the health assessment agent 320 determines whether or not a farm member is healthy based on reports from the watchdog agents and reports the health determination (i.e., the member health report) to the master farm state manager 310a.
  • the master farm state manager 310a records each member health report as part of the farm state.
  • a farm member is considered healthy if all agents on that member are running properly.
  • a farm member is considered healthy if all agents specific to the functionality of the external application server are running properly.
  • a farm member is considered healthy if selected agents on that member are running properly.
  • the health assessment agent 320 includes the watchdog agents when determining whether the farm member is healthy. In such embodiments, the health assessment agent 320 is aware of the watchdog agents running on the farm member and determines that a watchdog agent has failed when that watchdog agent does not make a report. In one embodiment, the health assessment agent 320 only reports to the master farm state manager 310a if the farm member is unhealthy.
  • the FTF system 300 provides additional advantages to the administrator of the external application server farm 200.
  • the FTF system 300 provides robust fault tolerance in a low cost, easily administered system by leveraging some of the efficiency provided by a highly regulated state management system.
  • the farm state becomes incoherent, whether as a result of the latency introduced by the FTF system 300 or a result of a farm member failing, the external application system continues to operate, albeit with a potential loss of efficiency due to a lack of load balancing or having to make multiple fallback requests.
  • the FTF system 300 allows the external application server to continue to function (although likely inefficiently) with each farm member operating autonomously based on the cached farm state in the member's local configuration store.
  • the farm state becomes coherent, the external application server farm 200 settles down and operates as intended by the administrator.
  • the embodiments and functionalities described herein may operate via a multitude of computing systems such as the host 102, and the external application server 104, and the client device 110 described above with reference to Figure 1, including wired and wireless computing systems, mobile computing systems (e.g., mobile telephones, tablet or slate type computers, laptop computers, etc.).
  • the embodiments and functionalities described herein may operate over distributed systems (e.g., cloud-based computing systems), where application functionality, memory, data storage and retrieval and various processing functions may be operated remotely from each other over a distributed computing network, such as the Internet or an intranet.
  • User interfaces and information of various types may be displayed via on-board computing device displays or via remote display units associated with one or more computing devices.
  • FIG. 4 through 6 and the associated descriptions provide a discussion of a variety of operating environments in which embodiments of the invention may be practiced.
  • the devices and systems illustrated and discussed with respect to Figures 4 through 6 are for purposes of example and illustration and are not limiting of a vast number of computing device configurations that may be utilized for practicing embodiments of the invention, described herein.
  • FIG. 4 is a block diagram illustrating example physical components of a computing device 400 with which embodiments of the invention may be practiced.
  • the computing device components described below may be suitable for the computing devices described above, for example, the host 102, the external application server 104, and the client computing device 110.
  • computing device 400 may include at least one processing unit 402 and a system memory 404.
  • system memory 404 may comprise, but is not limited to, volatile (e.g. random access memory (RAM)), non-volatile (e.g. read-only memory (ROM)), flash memory, or any combination.
  • System memory 404 may include operating system 405, one or more programming modules 406, which are suitable for running applications 420 such as client applications (e.g., the user agent/web browser 108) or server applications (e.g., the host application 112 or the service applications 118).
  • Operating system 405, for example, may be suitable for controlling the operation of computing device 400.
  • embodiments of the invention may be practiced in conjunction with a graphics library, other operating systems, or any other application program and is not limited to any particular application or system. This basic configuration is illustrated in Figure 4 by those components within a dashed line 408.
  • Computing device 400 may have additional features or functionality.
  • computing device 400 may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape.
  • additional storage is illustrated in Figure 4 by a removable storage 409 and a non-removable storage 410.
  • program modules 406 may perform processes including, for example, one or more of the stages of the methods of the fault tolerant farm system 300.
  • processing unit 402 may perform other processes.
  • Other programming modules that may be used in accordance with embodiments of the present invention may include electronic mail and contacts applications, word processing applications, spreadsheet applications, database applications, slide presentation applications, drawing or computer-aided application programs, etc.
  • program modules may include routines, programs, components, data structures, and other types of structures that may perform particular tasks or that may implement particular abstract data types.
  • embodiments of the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor- based or programmable consumer electronics, minicomputers, mainframe computers, and the like.
  • Embodiments of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
  • program modules may be located in both local and remote memory storage devices.
  • embodiments of the invention may be practiced in an electrical circuit comprising discrete electronic elements, packaged or integrated electronic chips containing logic gates, a circuit utilizing a microprocessor, or on a single chip containing electronic elements or microprocessors.
  • embodiments of the invention may be practiced via a system-on-a-chip (SOC) where each or many of the components illustrated in Figure 4 may be integrated onto a single integrated circuit.
  • SOC system-on-a-chip
  • Such an SOC device may include one or more processing units, graphics units, communications units, system virtualization units and various application functionality all of which are integrated (or "burned") onto the chip substrate as a single integrated circuit.
  • the functionality of the various client and/or server applications may be implemented via application-specific logic integrated with other components of the computing device 400 on the single integrated circuit (chip).
  • Embodiments of the invention may also be practiced using other technologies capable of performing logical operations such as, for example, AND, OR, and NOT, including but not limited to mechanical, optical, fluidic, and quantum technologies.
  • embodiments of the invention may be practiced within a general purpose computer or in any other circuits or systems.
  • Embodiments of the invention may be implemented as a computer process (method), a computing system, or as an article of manufacture, such as a computer program product or computer readable media.
  • the computer program product may be a computer storage media readable by a computer system and encoding a computer program of instructions for executing a computer process.
  • Computer readable media may include computer storage media.
  • Computer storage media may include volatile and nonvolatile, removable and non- removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
  • System memory 404, removable storage 409, and non-removable storage 410 are all computer storage media examples (i.e., memory storage.)
  • Computer storage media may include, but is not limited to, RAM, ROM, electrically erasable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store information and which can be accessed by computing device 400. Any such computer storage media may be part of device 400.
  • Computing device 400 may also have input device(s) 412 such as a keyboard, a mouse, a pen, a sound input device, a touch input device, etc.
  • Output device(s) 414 such as a display, speakers, a printer, etc. may also be included. The aforementioned devices are examples and others may be used.
  • Computer readable media may also include communication media.
  • Communication media may be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media.
  • modulated data signal may describe a signal that has one or more characteristics set or changed in such a manner as to encode information in the signal.
  • communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), infrared, and other wireless media.
  • Computing device 400 may include communication connections 16 allowing communications with other computing devices 418. Examples of suitable communication connections 416 include, but are not limited to, RF transmitter, receiver, and/or transceiver circuitry; universal serial bus (USB), parallel, or serial ports, and other connections appropriate for use with the applicable computer readable media.
  • FIGS 5A and 5B illustrate a suitable mobile computing environment, for example, a mobile telephone 500, a smart phone, a tablet personal computer, a laptop computer, and the like, with which embodiments of the invention may be practiced.
  • a mobile computing device 500 for implementing the embodiments is illustrated.
  • mobile computing device 500 is a handheld computer having both input elements and output elements.
  • Input elements may include touch screen display 505 and input buttons 510 that allow the user to enter information into mobile computing device 500.
  • Mobile computing device 500 may also incorporate an optional side input element 515 allowing further user input.
  • Optional side input element 515 may be a rotary switch, a button, or any other type of manual input element.
  • mobile computing device 500 may incorporate more or less input elements.
  • display 505 may not be a touch screen in some embodiments.
  • the mobile computing device is a portable phone system, such as a cellular phone having display 505 and input buttons 510.
  • Mobile computing device 500 may also include an optional keypad 535.
  • Optional keypad 535 may be a physical keypad or a "soft" keypad generated on the touch screen display.
  • Mobile computing device 500 incorporates output elements, such as display 505, which can display a graphical user interface (GUI). Other output elements include speaker 525 and LED light 520.
  • mobile computing device 500 may incorporate a vibration module (not shown), which causes mobile computing device 500 to vibrate to notify the user of an event.
  • mobile computing device 500 may incorporate a headphone jack (not shown) for providing another means of providing output signals.
  • the invention is used in combination with any number of computer systems, such as in desktop environments, laptop or notebook computer systems, multiprocessor systems, micro-processor based or programmable consumer electronics, network PCs, mini computers, main frame computers and the like.
  • Embodiments of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network in a distributed computing environment; programs may be located in both local and remote memory storage devices.
  • any computer system having a plurality of environment sensors, a plurality of output elements to provide notifications to a user and a plurality of notification event types may incorporate embodiments of the present invention.
  • FIG. 5B is a block diagram illustrating components of a mobile computing device used in one embodiment, such as the computing device shown in Figure 5A. That is, mobile computing device 500 can incorporate system 502 to implement some embodiments.
  • system 502 can be used in implementing a "smart phone" that can run one or more applications similar to those of a desktop or notebook computer such as, for example, browser, e-mail, scheduling, instant messaging, and media player applications.
  • system 502 is integrated as a computing device, such as an integrated personal digital assistant (PDA) and wireless phone.
  • PDA personal digital assistant
  • One or more application programs 566 may be loaded into memory 562 and run on or in association with operating system 564. Examples of application programs include phone dialer programs, e-mail programs, personal information management (PIM) programs, word processing programs, spreadsheet programs, Internet browser programs, messaging programs, and so forth.
  • System 502 also includes non-volatile storage 568 within memory 562. Non- volatile storage 568 may be used to store persistent information that should not be lost if system 502 is powered down.
  • Applications 566 may use and store information in non-volatile storage 568, such as e-mail or other messages used by an e- mail application, and the like.
  • a synchronization application (not shown) also resides on system 502 and is programmed to interact with a corresponding synchronization application resident on a host computer to keep the information stored in non-volatile storage 568 synchronized with corresponding information stored at the host computer.
  • other applications may be loaded into memory 562 and run on the device 500, including the various client and server applications described herein.
  • System 502 has a power supply 570, which may be implemented as one or more batteries.
  • Power supply 570 might further include an external power source, such as an AC adapter or a powered docking cradle that supplements or recharges the batteries.
  • System 502 may also include a radio 572 that performs the function of transmitting and receiving radio frequency communications.
  • Radio 572 facilitates wireless connectivity between system 502 and the "outside world", via a communications carrier or service provider. Transmissions to and from radio 572 are conducted under control of the operating system 564. In other words, communications received by radio 572 may be disseminated to application programs 566 via operating system 564, and vice versa.
  • Radio 572 allows system 502 to communicate with other computing devices, such as over a network.
  • Radio 572 is one example of communication media.
  • Communication media may typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media.
  • modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media.
  • the term computer readable media as used herein includes both storage media and communication media.
  • This embodiment of system 502 is shown with two types of notification output devices; light emitting diode (LED) 520 that can be used to provide visual notifications and an audio interface 574 that can be used with speaker 525 to provide audio notifications.
  • LED light emitting diode
  • audio interface 574 is used to provide audible signals to and receive audible signals from the user.
  • audio interface 574 may also be coupled to a microphone to receive audible input, such as to facilitate a telephone conversation.
  • the microphone may also serve as an audio sensor to facilitate control of notifications, as will be described below.
  • System 502 may further include video interface 576 that enables an operation of on-board camera 530 to record still images, video stream, and the like.
  • a mobile computing device implementing system 502 may have additional features or functionality.
  • the device may also include additional data storage devices (removable and/or non-removable) such as, magnetic disks, optical disks, or tape.
  • additional storage is illustrated in Figure 5B by storage 568.
  • Computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
  • Data/information generated or captured by the device 500 and stored via the system 502 may be stored locally on the device 500, as described above, or the data may be stored on any number of storage media that may be accessed by the device via the radio 572 or via a wired connection between the device 500 and a separate computing device associated with the device 500, for example, a server computer in a distributed computing network, such as the Internet.
  • a separate computing device associated with the device 500 for example, a server computer in a distributed computing network, such as the Internet.
  • data/information may be accessed via the device 500 via the radio 572 or via a distributed computing network.
  • data/information may be readily transferred between computing devices for storage and use according to well-known data/information transfer and storage means, including electronic mail and collaborative data/information sharing systems.
  • Figure 6 illustrates a system architecture for providing the browser application 108, the host application 112, and/or the service applications 118 to one or more client devices, as described above.
  • Content developed, interacted with or edited in association with the host application 112, and/or the service applications 118 may be stored in different communication channels or other storage types.
  • various documents may be stored using directory services 622, web portals 624, mailbox services 626, instant messaging stores 628 and social networking sites 630.
  • the host application 112 and/or the service applications 118 may use any of these types of systems or the like for enabling data utilization, as described herein.
  • a server 620 may provide the host application 112 and/or the service applications 118 to clients.
  • server 620 may be a web server providing the host application 112, and/or the service applications 118 over the web.
  • Server 620 may provide the host application 112 and/or the service applications 118 over the web to clients through a network 615.
  • clients that may access the host agnostic document access system 100 include computing device 400, which may include any general purpose personal computer 110a, a tablet computing device 110b and/or mobile computing device 110c such as smart phones. Any of these devices may obtain content from the store 616.
  • Embodiments of the present invention are described above with reference to block diagrams and/or operational illustrations of methods, systems, and computer program products according to embodiments of the invention.
  • the functions/acts noted in the blocks may occur out of the order as shown in any flowchart.
  • two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
  • the types of networks used for communication between the computing devices that make up the present invention include, but are not limited to, an internet, an intranet, wide area networks (WAN), local area networks (LAN), and virtual private networks (VPN).
  • the networks include the enterprise network and the network through which the client computing device accesses the enterprise network (i.e., the client network).
  • the client network is part of the enterprise network.
  • the client network is a separate network accessing the enterprise network through externally available entry points, such as a gateway, a remote access protocol, or a public or private internet address.

Abstract

A fault tolerant external application server. The external application server is a web based system that allows a user of a client computing device to work with a file over a network via a general client application communicating with a host. The host brokers the functionality and provides a platform for interacting with the external application server. The external application server is implemented as a server farm. A fault tolerant farm system combines latent configuration replication between farm members, interchangeable farm members, and optional health monitoring to allow the external application server farm to provide on-the-fly configuration while maintaining full functionality without requiring a real time state management database.

Description

FAULT TOLERANT EXTERNAL APPLICATION SERVER
BACKGROUND
[0001] Enterprises often maintain various types of documents that are stored in different places for different purposes. In many cases, such documents are created and stored according to a variety of different software applications and storage systems. For example, documents may be generated using word processing applications, spreadsheet applications, presentation applications, note applications, graphic design applications, photographic applications, and the like. Generated documents may be stored via a variety of storage systems, including one or more content servers used for storing documents of various types, servers for storing documents as attachments to electronic mail items (e- mail), storage systems for storing documents as attachments to meetings, customer relationship management (CRM) systems for storing documents as attachments to leads or customer data, general purpose document stores for storing documents for routine use, and/or specialized document stores (e.g., Documentum® from Documentum, Inc.) for storing documents for specific, highly regulated needs.
[0002] In a typical server farm, proper operation requires all members of the farm to share an up-to-date and perfect understanding of the farm topology and configuration in order to avoid a loss of functionality. In order to provide an up-to-date understanding, a typical server farm relies on a state configuration database; however, the use of a state configuration database generally adds complexity to the management, requirements, administration, and cost of the server farm.
[0003] It is with respect to these and other considerations that the present invention has been made.
BRIEF SUMMARY
[0004] The following Brief Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Brief Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
[0005] According to the embodiments, the external application server farm includes a fault tolerant farm (FTF) system. The external application server farm achieves a low administrative burden, minimal supporting software requirements, and excellent robustness, reliability, and scalability as the result of the FTF system. The major components of the FTF system include the farm management component, the fungible server component, and the health monitoring component. In general, the FTF system manages the farm state, which describes the current state of the external application server farm without the cost and complexity of a state management database. To accomplish this, the FTF system includes a variety of agents that run on each member of the external application server farm. An agent is a system service that provides a distinct piece of functionality for the farm member running the agent.
[0006] The farm management component includes the farm state manager and the farm state replicator. The primary functions of the farm management component are managing configuration changes to the farm state and distributing the farm state to the farm members. The farm state manager is an agent running on each farm member. Although each farm member runs the farm state manager only one instance of the farm state manager is designated as the master farm state manager at any given time. Any instances of the farm state manager that are not designated as the master (i.e., the secondary instances) generally continue to run but have no responsibilities (i.e., they do not do anything). The master farm state manager maintains the "official" (i.e., true) version of the farm state for the entire external application server farm. The FTF system stores the official farm state in the central configuration store. Each farm member caches a local copy of the farm state in a local configuration store.
[0007] The FTF system allows the external application server farm to continue to function even if the active master farm state manager fails. In that event, the administrator manually designates another farm state manager as the master. Because of the fluid design of the farm state handling by the FTF system, it is not necessary to promote another farm state manager. Until a new master farm state manager is specified, each separate instance of the farm state manager continues to operate independently using the last known farm state cached in the local configuration store of that particular computing device.
[0008] The farm state replicator is an agent that makes sure each farm member has a reasonably current copy of the official version of the farm state. Each computing device runs an instance of the farm state replicator. To keep the locally cached version of the farm state reasonably current, the farm state replicator periodically contacts the master farm state manager and copies the official farm state to the computing device's local configuration store.
[0009] The amount of time between updates to the local configuration store represents an inherent latency in the farm management component. Because of the latency involved in the propagation of the official farm state to the farm members introduced by the farm management component, the overall farm state is presumed to be incoherent (i.e., the farm state known to individual farm members can differ from the official farm state and/or the farm state known to other farm members). As the latency period passes without any configuration changes, the overall farm state becomes coherent (i.e., the external application server operates as the administrator intends) once each farm member gets the official farm state from central configuration store. It is not necessary that the latency period be short for the external application server farm to remain functional. An extended latency period simply increases the amount of time required before all farm members operate as intended by the administrator.
[0010] The external application server exhibits a high degree of fault tolerance due to the fungible server component. Among other benefits, the fungible server component allows the external application server farm to operate with an incoherent farm state without a loss of functionality. A first aspect of the fungible server component is the intended role component. The members of the farm and the role of each farm member are specified in the farm configuration; however, the external application server roles are intended roles that describe the primary focus of that particular member without restricting the functionality of the member. The fungible server component requires all farm members to run all agents, or at least all agents specific to the functionality of the external application server, at all times. Thus, each member is capable of performing any action normally handled by the external application server. Moreover, each farm member will perform any action that is requested of it regardless of the intended role assigned to that member.
[0011] A second aspect of the fungible server component is the fallback behavior component. The external application server receives requests from outside sources and those requests are distributed to a farm member based on the configuration of the external application server. Additionally, intra-farm requests can be made between the farm members. If a request made to a farm member but the request is not filled for any reason within the control of the external application server, the request will be made to other farm members, including the requestor, until the request is fulfilled. The fallback behavior component handles the response of the external application server farm to configuration problems in the farm state. If a setting is insolubly misconfigured by the administrator or not understood by the external application server, the external application server reverts to default values for the setting or ignores the setting, as appropriate. [0012] The combination of the intended role component and the fallback behavior component, the fungible server system makes the external application server extremely fault tolerant of individual farm members failing or otherwise not behaving. The intended role subsystem and the fallback behavior subsystem ensure that all requests made to the external application server are handled without any outwardly apparent (i.e., apparent to the user) loss of functionality.
[0013] The health monitoring component monitors the health of each farm member and the various agents running on each member. Each farm member runs a number of watchdog agents and a health assessment agent. Each watchdog agent is responsible for monitoring the status of a non- watchdog agent running on the farm member. If there is a problem with the non-watchdog agent being monitored, the responsible watchdog agent will take an appropriate action. In various embodiments, appropriate actions include, but are not limited to, attempting to restart the associated non-watchdog agent that is not running and reporting a problem with the associated non-watchdog agent to the health assessment agent. The health assessment agent determines whether or not a farm member is healthy based on reports from the watchdog agents and reports the health determination (i.e., the member health report) to the master farm state manager. In turn, the master farm state manager records each member health report as part of the farm state.
BRIEF DESCRIPTION OF THE DRAWINGS
[0014] Further features, aspects, and advantages of the present disclosure will become better understood by reference to the following detailed description, appended claims, and accompanying figures, wherein elements are not to scale so as to more clearly show the details, wherein like reference numbers indicate like elements throughout the several views, and wherein:
[0015] Figure 1 illustrates a block diagram of an enterprise network employing one embodiment of the host agnostic document access system;
[0016] Figure 2 illustrates a block diagram of one embodiment of the architecture of the external application server;
[0017] Figure 3 illustrates a block diagram of an external application server showing one embodiment of the components of the fault tolerant farm (FTF) system;
[0018] Figure 4 is a simplified block diagram of a computing device with which embodiments of the present invention may be practiced;
[0019] Figures 5A and 5B are simplified block diagrams of a mobile computing device with which embodiments of the present invention may be practiced; and [0020] Figure 6 is a simplified block diagram of a distributed computing system in which embodiments of the present invention may be practiced.
DETAILED DESCRIPTION
[0021] A fault tolerant external application server is described herein and illustrated in the accompanying figures. The external application server is a web based system that allows a user of a client computing device to work with a file over a network via a general client application communicating with a host. The host brokers the functionality of and provides a platform for interacting with the external application server. The external application server is implemented as a server farm. A fault tolerant farm system combines latent configuration replication between farm members, interchangeable farm members, and optional health monitoring to allow the external application server farm to provide on- the-fly configuration while maintaining full functionality without requiring a real time state management database.
[0022] Figure 1 illustrates one embodiment of an exemplary enterprise network 100 including one or more hosts 102 and one or more external application servers 104. A user 106 accesses the host 102 using a web browser 108 from a client computing device 110. The host 102 is, most generally, a content server that stores documents in a document storage system 126 and manages permissions for the user 106. Generally, the host 102 runs a host application 112 providing a host user interface 114 that handles the normal functions of the host 102. At least some of the normal functions of the host 102 involve providing the user 106 with access to stored documents 116 contained in a content store 126 and intended to be viewed and/or edited using a supporting application. The host 102 also provides a generic platform to make the services of the external application server 104 available to user 106. The external application server 104 provides browser based web applications that allow the user 106 to interact with documents available through the host. The open platform interface defines and directs document operations between the host 102 and the external application server 104. The host 102 also implements an endpoint 120 to receive communications from the external application server 104. Although the host 102 initiates scenarios involving the services of the external application server 104, the host 102 does not make calls to the external application server 104. Instead, the external application server 104 exposes supported functionality to operate on supported document types using callbacks.
[0023] The external application server 104 runs one or more web based service applications 118 enabling the user 106 to access, view, edit, and, optionally, perform other operations on content (i.e., a file or document) and perform folder (i.e., directory) management over the network from the client computing device 110 without requiring a local installation of the appropriate application(s) needed to work with a particular document type. The operation and output of the external application server 104 is not specific to the host 102 that invokes the functionality of the external application server 104. Each service application 118 generally runs as a service on the external application server 104. The external application server 104 uses the open platform interface and the set of open platform interface conventions to integrate with the host 102. The external application server 104 provides the necessary operations and functionality to work with a document of a selected file type. The external application server 104 is host agnostic. In other words, the operation and/or output of the external application server 104 are not specific to the host 102 that facilitates access to the services of the external application server 104. Examples of the service applications 118 to handle various document types include the online (i.e., web based) companions to the standard (i.e., locally installed) applications for working with word processing documents, spreadsheets, presentations, and notes.
[0024] The operations provided by each service application 118 are typically specific to a selected file type or related to folder management. The core operations provided by the external application server 104 are viewing and editing documents. In various embodiments, the service application 118 provides one or more additional operations including, but not limited to, reformatting a document for viewing on a mobile device, creating a new document, converting a document, embedding a document, and broadcasting a document. From the perspective of the external application server 104, broadcasting and embedding are particular interactive user flows. In the case of broadcasting, the external application server 104 displays the document on multiple client computing devices 110, and in one embodiment, and keeps track of the current page being view at each multiple client computing devices. The host 102 manages the document upload, broadcast initiation, and the rich client entry points. In another embodiment of the broadcasting operation, page tracking is handled by the host 102.
[0025] The supported operations for each service application 118 are accessed through one or more service application entry URLs. Each service application entry URL serves as an entry point to the external application server 104 for a particular operation on a particular document type. Generally, each service application entry URL includes the address of the external application server 104 and specifies both the task (e.g., embedded edit using the spreadsheet application) and the required data to accomplish the requested task, namely the metadata URL for the document and the access token authorizing access.
[0026] When the user 106 selects an operation for a document, the host 102 generates a service application entry URL for that operation against the selected document for the user. More specifically, the external application host page 122 generates the URL parameters used with the service application 118. The parameters generated by external application host page 122 include, but are not limited to, the access token and the source URL. The source URL is the URL that the service application 118 uses to access the host endpoint 120 and the document. The access token is a token that is unique to the user/object pair that the host endpoint 120 uses to authenticate the user 106 and authorize access to the document and/or the service application 118. In various embodiments, the access token is calculated based on a hash of one or more of the user identifier, the time stamp, and the document identifier and is encrypted with a secret known to the host 102 (e.g., stored in the host configuration database).
[0027] The service application entry points are handled through the wrapper provided by the host 102. The wrapper provided by the host 102 is a framework or environment that displays the output of the external application server 104 and accepts input from the client computing device 110 allowing a user 106 to interact with a document using the functionality provided by the service application 118. In one embodiment, the wrapper includes the external application host page 122 and/or an application frame 124. By way of example, one embodiment of the external application host page 122 generated by the host 102 is a single page that hosts all service application pages generated by the application server 104 in a web page container such as an inline frame (iFrame) with an edge-to-edge layout. The external application host page 122 has no user interface of its own. Alternate implementations of the external application host page 122 may include a user interface or substitute other web page containers and layouts for those described above.
[0028] The external application server 104 provides the necessary functionality to access, edit, view, and otherwise manipulate or work with various document types. In the described embodiment, the external application server 104 does not include the complexity and overhead associated with network access, user authentication, file storage, network and file security, and other administrative tasks normally handled by other servers within a network and often specific to a particular enterprise. Omitting such features and focusing the external application server 104 on handling document operations through the open platform interface allows the external application server 104 to be used in a wide range of enterprise network scenarios. It should be appreciated that an external application server 104 performing as described herein and assuming additional roles and responsibilities normally handled by other servers on the enterprise network falls within the scope and spirit of the present invention.
[0029] The host is an online server application capable of being accessed over a network using a general client application, such as a web browser. The services provided by the external application server 104 are consumed by the host and made available to a client computing device. When attached to an external application server 104, the host becomes aware of the service application and functionality supported by the external application server 104. The open platform interface is both extensible and provides support for cross- version interface communication. The basic data transport mechanism of the open platform interface facilitates cross-platform communication. In various embodiments, the basic data is transferred in a JavaScript Object Notation (JSON) body, although it should be recognized that other human and/or machine readable data interchange formats fall within the scope and spirit of the present invention. The open platform interface also follows the service oriented architecture principles of "ignore what you weren't expecting" and "use default values for data you were expecting but didn't get" used by some application programming interfaces such as the Windows Communication Foundation (WCF). The semantic of "default values must result in acceptable behavior" used by the open platform interface helps maintain functionality in a highly cross-versioned world.
[0030] Figure 2 illustrates one embodiment of the topology of the external application server 104 implemented as a multi-server farm. It is not necessary for the external application server 104 to include multiple servers. One embodiment of the external application server 104 is implemented using a single computing device, which effectively operates as a single server "farm". In one embodiment, each member 202, 204a, 204b, 204c of the external application server farm 200 is assigned a role as a front end server 202 or a back end server 204a, 204b, 204c. A front end server 202 is responsible for routing document handling requests to the back end server 204a, 204b, 204c associated with the selected document type. When more than one front end server 202 is used, improved performance is achieved by using an optional load balancer 206 to distribute traffic between the front end servers 202. The back end servers 204a, 204b, 204c provide the document handling services for supported documents. In the illustrated embodiment, each back end server 204a, 204b, 204c provides document handling services for a specific document type.
[0031] In the illustrated embodiment, the farm state 208 of the external application server 104 is stored in one or more files contained in the central configuration store 210. The information contained in the farm state 208 includes, but is not limited to, one or more of the following items: farm topology (i.e., identification of the members of the farm), farm member roles, configuration settings for the farm members, external application server configuration settings, service application configuration settings, and farm member health. Each farm member 202, 204a, 204b, 204c must have read access to the central configuration store 210. In the illustrated embodiment, the central configuration store 210 is a shared folder readable by each computing device that makes up the external application server. In the various embodiments, the files storing the farm state 208 are machine readable and, optionally, human readable.
[0032] The external application server 104 is accessible through standard network resource addressing schemes. Suitable network addressing schemes include, but are not limited to, uniform naming convention (UNC) paths, drive mappings, and uniform resource indicators (URI), such as uniform resource names (URN) and uniform resource locators (URL). The externally visible addresses either face the internet or an intranet and are commonly accessed using a URL. The internal addresses of the external application server 104, such as the configuration folder path, are commonly accessed using a UNC path.
[0033] In one embodiment, intra-farm communications are secure to ensure that only members of the farm make requests against the cache and the back end servers. This is accomplished by checking the identity of the requesting machine. Intra-farm communication is optionally encrypted for enhanced security.
[0034] Figure 3 illustrates an external application server farm 200 with one embodiment of the fault tolerant farm (FTF) system 300. The external application server farm 200 achieves a low administrative burden, minimal supporting software requirements, and excellent robustness, reliability, and scalability as the result of the FTF system 300. The major components of the FTF system 300 include the farm management component 302, the fungible server component 304, and the health monitoring component 306. In general, the FTF system 300 manages the farm state 208, which describes the current state of the external application server farm 200, without the cost and complexity of a state management database. To accomplish this, the FTF system 300 includes a variety of agents that run on each member of the external application server farm 200. An agent is a system service that provides a distinct piece of functionality for the farm member running the agent. In the illustrated embodiment, the external application server farm 200 shows a variable set of farm members 308a-308n.
[0035] The farm management component 302 includes the farm state manager 310a, 310b and the farm state replicator 312. The primary functions of the farm management component 302 are managing configuration changes to the farm state and distributing the farm state to the farm members 308a-308n.
[0036] The farm state manager 310a, 310b is an agent running on each farm member 308a-308n. Although each farm member 308a-308n runs the farm state manager 310a, 310b only one instance of the farm state manager is designated as the master farm state manager 310a at any given time. Any instances of the farm state manager 310b that are not designated as the master (i.e., the secondary instances) generally continue to run but have no responsibilities (i.e., they do not do anything). In an alternate embodiment, the secondary instances of the farm state manager 310b are stopped when a master farm state manager 310a is found and only start if no master farm state manager 310a is available or at the manual request of the administrator.
[0037] The master farm state manager 310a maintains the "official" (i.e., true) version of the farm state 208 for the entire external application server farm 200. The FTF system 300 stores the official farm state 208 in the central configuration store 210. Each farm member caches a local copy of the farm state in a local configuration store 314.
[0038] The master farm state manager 310a accepts configuration changes made from any farm member and updates the official version of the configuration state in the central configuration store 210. In order to prevent conflicts from arising when multiple configuration changes are contemporaneously attempted, the master farm state exercises access control over the central configuration store 210. In one embodiment, the master farm state manager 310a writes the configuration state change to the configuration files in the central configuration store 210 and controls conflicts by locking the configuration files when a configuration change is received. In one embodiment, the central configuration store 210 is the local configuration store 314 on the farm member running the master farm state manager 310a. The master farm state manager 310a also accepts requests for a current copy of the farm state from any farm member 308a-308n. In some embodiments, the master farm state manager 310a only accepts of configuration changes and requests from selected farm members and/or selected computing devices which are not members of the external application server farm 200.
[0039] The FTF system 300 allows the external application server farm 200 to continue to function even if the active master farm state manager 310a fails. In that event, the administrator manually designates another farm state manager 310b as the master. Because of the fluid design of the farm state handling by the FTF system 300, it is not necessary to promote another farm state manager 310b. Until a new master farm state manager 310a is specified, each separate instance of the farm state manager 310b continues to operate independently using the last known farm state cached in the local configuration store 314 of that particular computing device. In an alternate embodiment, the external application server automatically promotes another farm state manager to master. In the various embodiments, the automatic decision to automatically promote one instance of the farm state manager is entirely arbitrary or is based on selection criteria (e.g., considering the role, load, and/or resources of the computing device and/or the time of the last farm state replication operation).
[0040] The farm state replicator 312 is an agent that makes sure each farm member 308a-308n has a reasonably current copy of the official version of the farm state. Each computing device runs an instance of the farm state replicator 312; however, unlike the farm state manager, there is no master farm state replicator. To keep the locally cached version of the farm state reasonably current, the farm state replicator 312 periodically contacts the master farm state manager 310a and copies the official farm state to the computing device's local configuration store 314. In one embodiment, the farm state replicator 312 updates the local farm state of the farm member on a schedule (e.g., every 30 seconds). In some embodiments, each individual farm state replicator 312 operates on an independent schedule. In other embodiments, each individual farm state replicator 312 operates on a common schedule based on a master clock (e.g., at the start of each minute of a synchronized clock). In certain embodiment, the farm state replicator 312 updates the local configuration state in response to an event or other similar trigger.
[0041] The amount of time between updates to the local configuration store represents an inherent latency in the farm management component 302. Because of the latency involved in the propagation of the official farm state to the farm members 308a-308n introduced by the farm management component 302, the overall farm state is presumed to be incoherent (i.e., the farm state known to individual farm members can differ from the official farm state and/or the farm state known to other farm members). As the latency period passes without any configuration changes, the overall farm state becomes coherent (i.e., the external application server operates as the administrator intends) once each farm member 308a-308n gets the official farm state from central configuration store 210. It is not necessary that the latency period be short for the external application server farm 200 to remain functional. An extended latency period simply increases the amount of time required before all farm members operate as intended by the administrator.
[0042] The external application server 104 exhibits a high degree of fault tolerance due to the fungible server component 304. Among other benefits, the fungible server component 304 allows the external application server farm 200 to operate with an incoherent farm state without a loss of functionality. A first aspect of the fungible server component 304 is the intended role component. The members of the farm and the role of each farm member 308a-308n are specified in the farm configuration; however, the external application server roles are intended roles rather than strict roles commonly used with conventional servers. A strict role defines the services that are run on a particular server. Assigning a strict role to a server is often done to optimize the performance of the server or tailor the functions handled by a particular server to that server's resources. In contrast, the intended role describes the primary focus of that particular member without restricting the functionality of the member. Although an intended role does not directly impact the functionality of the member, the use of an intended role provides other benefits, such as performance improvements as a result of load balancing between the farm members.
[0043] The fungible server component 304 requires all farm members 308a-308n to run all agents, or at least all agents specific to the functionality of the external application server 104, at all times. This includes, but is not limited to, farm management agents (e.g., the farm state manager 310 and the farm state replicator 312), document handling agents 316a-316d (e.g., word processing viewer agents, spreadsheet editor agents, and presentation broadcast agents), and monitoring agents (e.g., watchdog agents and health assessment agents). Thus, each member is capable of performing any action normally handled by the external application server. Moreover, each farm member 308a-308n will perform any action that is requested of it regardless of the intended role assigned to that member. In other words, the members of the external application server farm 200 are fungible. Even if a request is sent to the wrong farm member 308a-308n because the farm state known by the requester is out of date, that "wrong" member will handle the request. [0044] A second aspect of the fungible server component 304 is the fallback behavior component. The external application server 104 receives requests from outside sources and those requests are distributed to a farm member based on the configuration of the external application server. Additionally, intra-farm requests can be made between the farm members 308a-308n. If a request made to a farm member but the request is not filled for any reason within the control of the external application server, the request will be made to other farm members, including the requestor, until the request is fulfilled. In an extreme case, the fungible server system allows a member (i.e., the requestor) to handle its own request. The fallback behavior component handles the response of the external application server farm 200 to configuration problems in the farm state. If a setting is insolubly misconfigured by the administrator or not understood by the external application server 104, the external application server 104 reverts to default values for the setting or ignores the setting, as appropriate.
[0045] The combination of the intended role component and the fallback behavior component, the fungible server system makes the external application server extremely fault tolerant of individual farm members failing or otherwise not behaving. The intended role subsystem and the fallback behavior subsystem ensure that all requests made to the external application server are handled without any outwardly apparent (i.e., apparent to the user) loss of functionality.
[0046] The health monitoring component 306 monitors the health of each farm member and the various agents running on each member. Each farm member runs a number of watchdog agents 318a-318f and a health assessment agent 320. Each watchdog agent 318a-318f is responsible for monitoring the status of a non-watchdog agent (e.g., the farm management agents 310a, 310b, 312 and the document handling agents 316a-316d) running on the farm member 308a-308n. In one embodiment, each watchdog agent is uniquely paired (i.e., associated) with one of the non-watchdog agents. If there is a problem with the non-watchdog agent being monitored, the responsible watchdog agent will take an appropriate action. In various embodiments, appropriate actions include, but are not limited to, attempting to restart the associated non-watchdog agent that is not running and reporting a problem with the associated non- watchdog agent to the health assessment agent 320. In some embodiments, the watchdog agent will report a problem with the associated non-watchdog agent directly to the master farm state manager 310a. In other embodiments, the responsible watchdog agent periodically reports the status of the associated non- watchdog agent regardless of whether or not a problem is detected. [0047] The health assessment agent 320 determines whether or not a farm member is healthy based on reports from the watchdog agents and reports the health determination (i.e., the member health report) to the master farm state manager 310a. In turn, the master farm state manager 310a records each member health report as part of the farm state. In one embodiment, a farm member is considered healthy if all agents on that member are running properly. In another embodiment, a farm member is considered healthy if all agents specific to the functionality of the external application server are running properly. In a still further embodiment, a farm member is considered healthy if selected agents on that member are running properly. In various embodiments, the health assessment agent 320 includes the watchdog agents when determining whether the farm member is healthy. In such embodiments, the health assessment agent 320 is aware of the watchdog agents running on the farm member and determines that a watchdog agent has failed when that watchdog agent does not make a report. In one embodiment, the health assessment agent 320 only reports to the master farm state manager 310a if the farm member is unhealthy.
[0048] Aside from the reliability benefits, the FTF system 300 provides additional advantages to the administrator of the external application server farm 200. First, by aggregating the health reports from each farm member in the farm state, the administrative burden is simplified because there is a single place to look to check the health of the farm. It is not necessary to check the health at each farm member individually. Second, the aggregated health data is easily monitored by separate monitoring tools. For example, the health data can be incorporated into an event log or a separate monitoring tool (e.g., a comprehensive enterprise or network monitoring system) and an alert sent to the external application server administrator in the event of a problem. Third, because the farm state is cached by all farm members, a true copy or, at least a reasonably recent copy, of the official farm state is available even in the event that the central configuration store is lost. This includes valuable health data that may be useful when investigating the cause of failure.
[0049] The FTF system 300 provides robust fault tolerance in a low cost, easily administered system by leveraging some of the efficiency provided by a highly regulated state management system. When the farm state becomes incoherent, whether as a result of the latency introduced by the FTF system 300 or a result of a farm member failing, the external application system continues to operate, albeit with a potential loss of efficiency due to a lack of load balancing or having to make multiple fallback requests. In an extreme case where no master farm state manager 310a is available, the FTF system 300 allows the external application server to continue to function (although likely inefficiently) with each farm member operating autonomously based on the cached farm state in the member's local configuration store. As the farm state becomes coherent, the external application server farm 200 settles down and operates as intended by the administrator.
[0050] The embodiments and functionalities described herein may operate via a multitude of computing systems such as the host 102, and the external application server 104, and the client device 110 described above with reference to Figure 1, including wired and wireless computing systems, mobile computing systems (e.g., mobile telephones, tablet or slate type computers, laptop computers, etc.). In addition, the embodiments and functionalities described herein may operate over distributed systems (e.g., cloud-based computing systems), where application functionality, memory, data storage and retrieval and various processing functions may be operated remotely from each other over a distributed computing network, such as the Internet or an intranet. User interfaces and information of various types may be displayed via on-board computing device displays or via remote display units associated with one or more computing devices. For example user interfaces and information of various types may be displayed and interacted with on a wall surface onto which user interfaces and information of various types are projected. Interaction with the multitude of computing systems with which embodiments of the invention may be practiced include, keystroke entry, touch screen entry, voice or other audio entry, gesture entry where an associated computing device is equipped with detection (e.g., camera) functionality for capturing and interpreting user gestures for controlling the functionality of the computing device, and the like. Figures 4 through 6 and the associated descriptions provide a discussion of a variety of operating environments in which embodiments of the invention may be practiced. However, the devices and systems illustrated and discussed with respect to Figures 4 through 6 are for purposes of example and illustration and are not limiting of a vast number of computing device configurations that may be utilized for practicing embodiments of the invention, described herein.
[0051] Figure 4 is a block diagram illustrating example physical components of a computing device 400 with which embodiments of the invention may be practiced. The computing device components described below may be suitable for the computing devices described above, for example, the host 102, the external application server 104, and the client computing device 110. In a basic configuration, computing device 400 may include at least one processing unit 402 and a system memory 404. Depending on the configuration and type of computing device, system memory 404 may comprise, but is not limited to, volatile (e.g. random access memory (RAM)), non-volatile (e.g. read-only memory (ROM)), flash memory, or any combination. System memory 404 may include operating system 405, one or more programming modules 406, which are suitable for running applications 420 such as client applications (e.g., the user agent/web browser 108) or server applications (e.g., the host application 112 or the service applications 118). Operating system 405, for example, may be suitable for controlling the operation of computing device 400. Furthermore, embodiments of the invention may be practiced in conjunction with a graphics library, other operating systems, or any other application program and is not limited to any particular application or system. This basic configuration is illustrated in Figure 4 by those components within a dashed line 408.
[0052] Computing device 400 may have additional features or functionality. For example, computing device 400 may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape. Such additional storage is illustrated in Figure 4 by a removable storage 409 and a non-removable storage 410.
[0053] As stated above, a number of program modules and data files may be stored in system memory 404, including operating system 405. While executing on processing unit 402, programming modules 406 may perform processes including, for example, one or more of the stages of the methods of the fault tolerant farm system 300. The aforementioned process is an example, and processing unit 402 may perform other processes. Other programming modules that may be used in accordance with embodiments of the present invention may include electronic mail and contacts applications, word processing applications, spreadsheet applications, database applications, slide presentation applications, drawing or computer-aided application programs, etc.
[0054] Generally, consistent with embodiments of the invention, program modules may include routines, programs, components, data structures, and other types of structures that may perform particular tasks or that may implement particular abstract data types. Moreover, embodiments of the invention may be practiced with other computer system configurations, including hand-held devices, multiprocessor systems, microprocessor- based or programmable consumer electronics, minicomputers, mainframe computers, and the like. Embodiments of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices. [0055] Furthermore, embodiments of the invention may be practiced in an electrical circuit comprising discrete electronic elements, packaged or integrated electronic chips containing logic gates, a circuit utilizing a microprocessor, or on a single chip containing electronic elements or microprocessors. For example, embodiments of the invention may be practiced via a system-on-a-chip (SOC) where each or many of the components illustrated in Figure 4 may be integrated onto a single integrated circuit. Such an SOC device may include one or more processing units, graphics units, communications units, system virtualization units and various application functionality all of which are integrated (or "burned") onto the chip substrate as a single integrated circuit. When operating via an SOC, the functionality of the various client and/or server applications may be implemented via application-specific logic integrated with other components of the computing device 400 on the single integrated circuit (chip). Embodiments of the invention may also be practiced using other technologies capable of performing logical operations such as, for example, AND, OR, and NOT, including but not limited to mechanical, optical, fluidic, and quantum technologies. In addition, embodiments of the invention may be practiced within a general purpose computer or in any other circuits or systems.
[0056] Embodiments of the invention, for example, may be implemented as a computer process (method), a computing system, or as an article of manufacture, such as a computer program product or computer readable media. The computer program product may be a computer storage media readable by a computer system and encoding a computer program of instructions for executing a computer process.
[0057] The term computer readable media as used herein may include computer storage media. Computer storage media may include volatile and nonvolatile, removable and non- removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. System memory 404, removable storage 409, and non-removable storage 410 are all computer storage media examples (i.e., memory storage.) Computer storage media may include, but is not limited to, RAM, ROM, electrically erasable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store information and which can be accessed by computing device 400. Any such computer storage media may be part of device 400. Computing device 400 may also have input device(s) 412 such as a keyboard, a mouse, a pen, a sound input device, a touch input device, etc. Output device(s) 414 such as a display, speakers, a printer, etc. may also be included. The aforementioned devices are examples and others may be used.
[0058] The term computer readable media as used herein may also include communication media. Communication media may be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term "modulated data signal" may describe a signal that has one or more characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), infrared, and other wireless media. Computing device 400 may include communication connections 16 allowing communications with other computing devices 418. Examples of suitable communication connections 416 include, but are not limited to, RF transmitter, receiver, and/or transceiver circuitry; universal serial bus (USB), parallel, or serial ports, and other connections appropriate for use with the applicable computer readable media.
[0059] Figures 5A and 5B illustrate a suitable mobile computing environment, for example, a mobile telephone 500, a smart phone, a tablet personal computer, a laptop computer, and the like, with which embodiments of the invention may be practiced. With reference to Figure 5A, an example mobile computing device 500 for implementing the embodiments is illustrated. In a basic configuration, mobile computing device 500 is a handheld computer having both input elements and output elements. Input elements may include touch screen display 505 and input buttons 510 that allow the user to enter information into mobile computing device 500. Mobile computing device 500 may also incorporate an optional side input element 515 allowing further user input. Optional side input element 515 may be a rotary switch, a button, or any other type of manual input element. In alternative embodiments, mobile computing device 500 may incorporate more or less input elements. For example, display 505 may not be a touch screen in some embodiments. In yet another alternative embodiment, the mobile computing device is a portable phone system, such as a cellular phone having display 505 and input buttons 510. Mobile computing device 500 may also include an optional keypad 535. Optional keypad 535 may be a physical keypad or a "soft" keypad generated on the touch screen display. [0060] Mobile computing device 500 incorporates output elements, such as display 505, which can display a graphical user interface (GUI). Other output elements include speaker 525 and LED light 520. Additionally, mobile computing device 500 may incorporate a vibration module (not shown), which causes mobile computing device 500 to vibrate to notify the user of an event. In yet another embodiment, mobile computing device 500 may incorporate a headphone jack (not shown) for providing another means of providing output signals.
[0061] Although described herein in combination with mobile computing device 500, in alternative embodiments the invention is used in combination with any number of computer systems, such as in desktop environments, laptop or notebook computer systems, multiprocessor systems, micro-processor based or programmable consumer electronics, network PCs, mini computers, main frame computers and the like. Embodiments of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network in a distributed computing environment; programs may be located in both local and remote memory storage devices. To summarize, any computer system having a plurality of environment sensors, a plurality of output elements to provide notifications to a user and a plurality of notification event types may incorporate embodiments of the present invention.
[0062] Figure 5B is a block diagram illustrating components of a mobile computing device used in one embodiment, such as the computing device shown in Figure 5A. That is, mobile computing device 500 can incorporate system 502 to implement some embodiments. For example, system 502 can be used in implementing a "smart phone" that can run one or more applications similar to those of a desktop or notebook computer such as, for example, browser, e-mail, scheduling, instant messaging, and media player applications. In some embodiments, system 502 is integrated as a computing device, such as an integrated personal digital assistant (PDA) and wireless phone.
[0063] One or more application programs 566 may be loaded into memory 562 and run on or in association with operating system 564. Examples of application programs include phone dialer programs, e-mail programs, personal information management (PIM) programs, word processing programs, spreadsheet programs, Internet browser programs, messaging programs, and so forth. System 502 also includes non-volatile storage 568 within memory 562. Non- volatile storage 568 may be used to store persistent information that should not be lost if system 502 is powered down. Applications 566 may use and store information in non-volatile storage 568, such as e-mail or other messages used by an e- mail application, and the like. A synchronization application (not shown) also resides on system 502 and is programmed to interact with a corresponding synchronization application resident on a host computer to keep the information stored in non-volatile storage 568 synchronized with corresponding information stored at the host computer. As should be appreciated, other applications may be loaded into memory 562 and run on the device 500, including the various client and server applications described herein.
[0064] System 502 has a power supply 570, which may be implemented as one or more batteries. Power supply 570 might further include an external power source, such as an AC adapter or a powered docking cradle that supplements or recharges the batteries.
[0065] System 502 may also include a radio 572 that performs the function of transmitting and receiving radio frequency communications. Radio 572 facilitates wireless connectivity between system 502 and the "outside world", via a communications carrier or service provider. Transmissions to and from radio 572 are conducted under control of the operating system 564. In other words, communications received by radio 572 may be disseminated to application programs 566 via operating system 564, and vice versa.
[0066] Radio 572 allows system 502 to communicate with other computing devices, such as over a network. Radio 572 is one example of communication media. Communication media may typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. The term computer readable media as used herein includes both storage media and communication media.
[0067] This embodiment of system 502 is shown with two types of notification output devices; light emitting diode (LED) 520 that can be used to provide visual notifications and an audio interface 574 that can be used with speaker 525 to provide audio notifications. These devices may be directly coupled to power supply 570 so that when activated, they remain on for a duration dictated by the notification mechanism even though processor 560 and other components might shut down for conserving battery power. LED 520 may be programmed to remain on indefinitely until the user takes action to indicate the powered-on status of the device. Audio interface 574 is used to provide audible signals to and receive audible signals from the user. For example, in addition to being coupled to speaker 525, audio interface 574 may also be coupled to a microphone to receive audible input, such as to facilitate a telephone conversation. In accordance with embodiments of the present invention, the microphone may also serve as an audio sensor to facilitate control of notifications, as will be described below. System 502 may further include video interface 576 that enables an operation of on-board camera 530 to record still images, video stream, and the like.
[0068] A mobile computing device implementing system 502 may have additional features or functionality. For example, the device may also include additional data storage devices (removable and/or non-removable) such as, magnetic disks, optical disks, or tape. Such additional storage is illustrated in Figure 5B by storage 568. Computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data.
[0069] Data/information generated or captured by the device 500 and stored via the system 502 may be stored locally on the device 500, as described above, or the data may be stored on any number of storage media that may be accessed by the device via the radio 572 or via a wired connection between the device 500 and a separate computing device associated with the device 500, for example, a server computer in a distributed computing network, such as the Internet. As should be appreciated such data/information may be accessed via the device 500 via the radio 572 or via a distributed computing network. Similarly, such data/information may be readily transferred between computing devices for storage and use according to well-known data/information transfer and storage means, including electronic mail and collaborative data/information sharing systems.
[0070] Figure 6 illustrates a system architecture for providing the browser application 108, the host application 112, and/or the service applications 118 to one or more client devices, as described above. Content developed, interacted with or edited in association with the host application 112, and/or the service applications 118 may be stored in different communication channels or other storage types. For example, various documents may be stored using directory services 622, web portals 624, mailbox services 626, instant messaging stores 628 and social networking sites 630. The host application 112 and/or the service applications 118 may use any of these types of systems or the like for enabling data utilization, as described herein. A server 620 may provide the host application 112 and/or the service applications 118 to clients. As one example, server 620 may be a web server providing the host application 112, and/or the service applications 118 over the web. Server 620 may provide the host application 112 and/or the service applications 118 over the web to clients through a network 615. Examples of clients that may access the host agnostic document access system 100 include computing device 400, which may include any general purpose personal computer 110a, a tablet computing device 110b and/or mobile computing device 110c such as smart phones. Any of these devices may obtain content from the store 616.
[0071] Embodiments of the present invention, for example, are described above with reference to block diagrams and/or operational illustrations of methods, systems, and computer program products according to embodiments of the invention. The functions/acts noted in the blocks may occur out of the order as shown in any flowchart. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
[0072] While certain embodiments of the invention have been described, other embodiments may exist. Furthermore, although embodiments of the present invention have been described as being associated with data stored in memory and other storage mediums, data can also be stored on or read from other types of computer-readable media, such as secondary storage devices, like hard disks, floppy disks, or a CD-ROM, a carrier wave from the Internet, or other forms of RAM or ROM. Further, the disclosed methods' stages may be modified in any manner, including by reordering stages and/or inserting or deleting stages, without departing from the invention.
[0073] In various embodiments, the types of networks used for communication between the computing devices that make up the present invention include, but are not limited to, an internet, an intranet, wide area networks (WAN), local area networks (LAN), and virtual private networks (VPN). In the present application, the networks include the enterprise network and the network through which the client computing device accesses the enterprise network (i.e., the client network). In one embodiment, the client network is part of the enterprise network. In another embodiment, the client network is a separate network accessing the enterprise network through externally available entry points, such as a gateway, a remote access protocol, or a public or private internet address.
[0074] The description and illustration of one or more embodiments provided in this application are not intended to limit or restrict the scope of the invention as claimed in any way. The embodiments, examples, and details provided in this application are considered sufficient to convey possession and enable others to make and use the best mode of claimed invention. The claimed invention should not be construed as being limited to any embodiment, example, or detail provided in this application. Regardless of whether shown and described in combination or separately, the various features (both structural and methodological) are intended to be selectively included or omitted to produce an embodiment with a particular set of features. Having been provided with the description and illustration of the present application, one skilled in the art may envision variations, modifications, and alternate embodiments falling within the spirit of the broader aspects of the claimed invention and the general inventive concept embodied in this application that do not depart from the broader scope.

Claims

CLAIMS What Is Claimed Is:
1. An external application server comprising:
a farm configuration;
one or more computing devices, each computing device being a member of a server farm, each said member having a local configuration storage location for storing a copy of said farm configuration;
a management agent for each said member, each said member running one instance of said management agent, one said management agent designated as a master management agent, said local configuration storage location on said member running said master management agent designated as a central configuration storage location for holding a master copy of said farm configuration, said master management agent maintaining said master copy of said farm configuration;
a replication agent for each said member, each said member running one instance of said replication agent, said replication agent periodically requesting a copy of said farm configuration from said master management agent and storing said copy said farm configuration in said local configuration storage location on said member; and
a document handling agent for each said member, each said member running one instance of said document handling agent, said document handling agent providing functionality to interact with a document of a selected file type.
2. The external application server of claim 1 further comprising a plurality of watchdog agents, each said member running one instance of each watchdog agent, said plurality of watchdog agents comprising a watchdog agent for a watched agent, said watched agent comprising another agent running on said member.
3. The external application server of claim 2 further comprising a plurality of health assessment agents, each said member running one instance of said health assessment agent, each said watchdog agent reporting a watched agent status of the corresponding said watched agent to said health assessment agent, said health assessment agent generating a member health report based on said watched agent status, each said health assessment agent reporting said member health report to said master management agent.
4. The external application server of claim 3 characterized in that said master management agent stores said member health report in said farm configuration.
5. The external application server according to any of claims 1 to 4 characterized in that each said member is assigned an intended role and each said member responds to any request made to said member regardless of said intended role assigned to said member.
6. A method of providing fault tolerance in an external application server farm, said method comprising the steps of:
providing a one or more computing devices, each said computing device being a member of a server farm;
running a management agent on each said member;
designating said management agent on one said member as a master management agent;
storing an official farm configuration in a central farm configuration store using said master management agent;
running a replication agent on each said member;
requesting a copy of said official farm configuration from said master management agent using said replication agent;
storing said copy of said official farm configuration in a local configuration store on said member; and
running a document handling agent on each said member, said document handling agent providing functionality to interact with a document of a selected file type.
7. The method of claim 6 characterized in that each said management agent, each said replication agent, and each said document handling agent are watched agents, said method further comprising the step of running a watchdog agent for each watched agent on each said member.
8. The method of claim 7 further comprising the steps of:
running a health assessment agent on each said member; and
reporting an agent status of the corresponding said watched agent to said health assessment agent using each said watchdog agent; and
sending a member health report based on each said agent status to said master management agent using said health assessment agent.
9. The method of according to any of claims 6 to 8 further comprising the step of allowing each said member to respond to all requests made to said member regardless of said intended role of said member.
10. An external application server comprising: a farm configuration;
one or more computing devices, each computing device being a member of a server farm, each said member having a local configuration storage location for storing a copy of said farm configuration;
a plurality of watched agents comprising:
(i) a management agent running on each said member, one said management agent designated as a master management agent, said local configuration storage location on said member running said master management agent designated as a central configuration storage location for holding a master copy of said farm configuration, said master management agent maintaining said master copy of said farm configuration;
(ii) a replication agent running on each said member, each said replication agent periodically requesting a copy of said farm configuration from said master management agent and storing said copy said farm configuration in said local configuration storage location on said member; and
(iii) a document handling agent running on each said member, each said document handling agent providing functionality to interact with a document of a selected file type;
a plurality of watchdog agents running on each member, each said watchdog agent uniquely associated with one said watched agent, each said watchdog agent reporting a watched agent status of the associated said watched agent; and
a health assessment agent running on each member, each said health assessment agent receiving said watched agent status and producing a member health report, said health assessment agent sending said member health report to said master management agent for inclusion in said farm configuration.
PCT/US2012/057677 2011-09-27 2012-09-27 Fault tolerant external application server WO2013049426A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP12834670.7A EP2761486A4 (en) 2011-09-27 2012-09-27 Fault tolerant external application server
KR1020147008020A KR101951066B1 (en) 2011-09-27 2012-09-27 Fault tolerant external application server
JP2014532124A JP6220338B2 (en) 2011-09-27 2012-09-27 Fault-tolerant external application server

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201161539975P 2011-09-27 2011-09-27
US61/539,975 2011-09-27
US13/284,718 US20130080603A1 (en) 2011-09-27 2011-10-28 Fault Tolerant External Application Server
US13/284,718 2011-10-28

Publications (1)

Publication Number Publication Date
WO2013049426A1 true WO2013049426A1 (en) 2013-04-04

Family

ID=47912443

Family Applications (3)

Application Number Title Priority Date Filing Date
PCT/US2012/057657 WO2013049414A2 (en) 2011-09-27 2012-09-27 Host agnostic integration and interoperation system
PCT/US2012/057670 WO2013049422A1 (en) 2011-09-27 2012-09-27 External service application discovery method
PCT/US2012/057677 WO2013049426A1 (en) 2011-09-27 2012-09-27 Fault tolerant external application server

Family Applications Before (2)

Application Number Title Priority Date Filing Date
PCT/US2012/057657 WO2013049414A2 (en) 2011-09-27 2012-09-27 Host agnostic integration and interoperation system
PCT/US2012/057670 WO2013049422A1 (en) 2011-09-27 2012-09-27 External service application discovery method

Country Status (8)

Country Link
US (3) US9578114B2 (en)
EP (3) EP2761806B1 (en)
JP (1) JP6220338B2 (en)
KR (1) KR101951066B1 (en)
AR (1) AR089563A1 (en)
HK (1) HK1178636A1 (en)
TW (1) TWI556168B (en)
WO (3) WO2013049414A2 (en)

Families Citing this family (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10048854B2 (en) 2011-01-31 2018-08-14 Oracle International Corporation Drag and drop interaction between components of a web application
US8572505B2 (en) * 2011-01-31 2013-10-29 Oracle International Corporation Automatically testing a web application that has independent display trees
US9578114B2 (en) 2011-09-27 2017-02-21 Microsoft Technology Licensing, Llc External service application discovery method
US10430388B1 (en) 2011-10-17 2019-10-01 Google Llc Systems and methods for incremental loading of collaboratively generated presentations
US8266245B1 (en) 2011-10-17 2012-09-11 Google Inc. Systems and methods for incremental loading of collaboratively generated presentations
US20150199308A1 (en) 2011-10-17 2015-07-16 Google Inc. Systems and methods for controlling the display of online documents
US20130254553A1 (en) * 2012-03-24 2013-09-26 Paul L. Greene Digital data authentication and security system
CN102664937B (en) * 2012-04-09 2016-02-03 威盛电子股份有限公司 High in the clouds computing graphics server and high in the clouds computing figure method of servicing
US10607219B2 (en) * 2012-06-11 2020-03-31 Visa International Service Association Systems and methods to provide privacy protection for activities related to transactions
US9292352B2 (en) 2012-08-10 2016-03-22 Adobe Systems Incorporated Systems and methods for cloud management
US10963420B2 (en) * 2012-08-10 2021-03-30 Adobe Inc. Systems and methods for providing hot spare nodes
GB2509723A (en) * 2013-01-10 2014-07-16 Ibm Invoking web services that are determined at the time of execution
US9588954B2 (en) * 2013-06-15 2017-03-07 Microsoft Technology Licensing, Llc Application/document collaboration in a multi-device environment
US20150058369A1 (en) * 2013-08-23 2015-02-26 Samsung Electronics Co., Ltd. Electronic device and method for using captured image in electronic device
US9170808B2 (en) * 2013-11-07 2015-10-27 Sap Se Dynamic containerization
FR3013541B1 (en) * 2013-11-19 2021-02-19 Oberthur Technologies METHOD AND DEVICE FOR CONNECTION TO A REMOTE SERVICE
US9936002B2 (en) 2014-02-21 2018-04-03 Dell Products L.P. Video compose function
US20150244835A1 (en) * 2014-02-21 2015-08-27 Andrew T. Fausak Transcoding instance with multiple channels
US11340769B2 (en) 2014-03-31 2022-05-24 Microsoft Technology Licensing, Llc Generating content items out of an electronic communication workflow
US10466882B2 (en) 2014-03-31 2019-11-05 Microsoft Technology Licensing, Llc Collaborative co-authoring via an electronic user interface
US10404637B2 (en) 2014-03-31 2019-09-03 Microsoft Technology Licensing, Llc Electronic communication-based storage of documents to support multiple workflows
WO2015171517A1 (en) * 2014-05-06 2015-11-12 Okta, Inc. Facilitating single sign-on to software applications
US9722795B2 (en) * 2014-05-20 2017-08-01 Vmware, Inc. Digitally signing JSON messages
US9361054B2 (en) * 2014-05-29 2016-06-07 Nuance Communications, Inc. Voice and touch based mobile print and scan framework
US20150379469A1 (en) * 2014-06-30 2015-12-31 Bank Of America Corporation Consolidated client onboarding system
TWI582625B (en) * 2014-07-03 2017-05-11 阿貝爾環球國際有限公司 Method for operating tool in working environment and machine using such method
US10511694B2 (en) * 2014-07-23 2019-12-17 Citrix Systems, Inc. Systems and methods for application specific load balancing
US9621650B2 (en) * 2014-09-30 2017-04-11 Google Inc Mobile application state identifier framework
US9853863B1 (en) 2014-10-08 2017-12-26 Servicenow, Inc. Collision detection using state management of configuration items
US9600548B2 (en) * 2014-10-10 2017-03-21 Salesforce.Com Row level security integration of analytical data store with cloud architecture
US9876849B2 (en) * 2014-11-05 2018-01-23 Google Llc Opening local applications from browsers
US9954837B2 (en) 2015-01-07 2018-04-24 Cyph, Inc. Method of multi-factor authenication during encrypted communications
WO2016114822A1 (en) * 2015-01-16 2016-07-21 Cyph Inc. A system and method of cryprographically signing web applications
US10491399B2 (en) * 2015-01-07 2019-11-26 Cyph, Inc. Cryptographic method for secure communications
US20160292445A1 (en) 2015-03-31 2016-10-06 Secude Ag Context-based data classification
US10216504B2 (en) * 2015-06-05 2019-02-26 Oracle International Corporation System and method for insulating a web user interface application from underlying technologies in an integration cloud service
CN106330988B (en) 2015-06-16 2020-01-03 阿里巴巴集团控股有限公司 Method and device for reissuing hypertext transfer request and client
CN105005543A (en) * 2015-06-29 2015-10-28 浪潮通用软件有限公司 Interface generation apparatus and method
US10397191B2 (en) * 2015-12-01 2019-08-27 Adobe Inc. Passing content securely from web browsers to computer applications
US10715502B2 (en) * 2015-12-31 2020-07-14 Verisign, Inc. Systems and methods for automating client-side synchronization of public keys of external contacts
US10628466B2 (en) * 2016-01-06 2020-04-21 Quest Software Inc. Smart exchange database index
US10438209B2 (en) 2016-02-10 2019-10-08 Bank Of America Corporation System for secure routing of data to various networks from a process data network
US11374935B2 (en) 2016-02-11 2022-06-28 Bank Of America Corporation Block chain alias person-to-person resource allocation
US10178105B2 (en) * 2016-02-22 2019-01-08 Bank Of America Corporation System for providing levels of security access to a process data network
TW201732583A (en) 2016-03-04 2017-09-16 群暉科技股份有限公司 Method for executing request and associated server
EP3608825B1 (en) * 2016-05-10 2021-06-23 CyberArk Software Ltd. Application control
US20170366545A1 (en) * 2016-06-18 2017-12-21 Lior Malka Sealed network external applications
US10310718B2 (en) * 2016-06-22 2019-06-04 Microsoft Technology Licensing, Llc Enabling interaction with an external service feature
CN106302661B (en) * 2016-08-02 2019-08-13 网宿科技股份有限公司 P2P data accelerated method, device and system
US10402796B2 (en) 2016-08-29 2019-09-03 Bank Of America Corporation Application life-cycle transition record recreation system
US10362143B2 (en) * 2016-09-29 2019-07-23 International Business Machines Corporation Dynamically transitioning the file system role of compute nodes for provisioning a storlet
US10423475B2 (en) 2016-09-30 2019-09-24 Microsoft Technology Licensing, Llc Stateful tokens for communicating with external services
US9998551B1 (en) * 2016-10-24 2018-06-12 Palantir Technologies Inc. Automatic discovery and registration of service application for files introduced to a user interface
US10313359B2 (en) 2016-11-01 2019-06-04 Microsoft Technology Licensing, Llc Protocols for accessing hosts
US20180150810A1 (en) * 2016-11-29 2018-05-31 Bank Of America Corporation Contextual augmented reality overlays
CN106850609A (en) * 2017-01-24 2017-06-13 北京奇虎科技有限公司 The method of calibration and device of a kind of file
US10671570B2 (en) * 2017-02-01 2020-06-02 Open Text Sa Ulc Web application open platform interface (WOPI) server architecture and applications for distributed network computing environments
US10387383B2 (en) 2017-02-15 2019-08-20 Google Llc Systems and methods for providing access to a data file stored at a data storage system
CN107332922B (en) * 2017-07-19 2020-07-17 佛山科学技术学院 Data transmission method and system of embedded Web server based on community management
US10747728B2 (en) * 2017-08-10 2020-08-18 Microsoft Technology Licensing, Llc Edit and share unsupported files through instantly generated preview
US10470040B2 (en) 2017-08-27 2019-11-05 Okta, Inc. Secure single sign-on to software applications
GB201717251D0 (en) * 2017-10-20 2017-12-06 Palantir Technologies Inc Serving assets in a networked environment
US10866963B2 (en) 2017-12-28 2020-12-15 Dropbox, Inc. File system authentication
US10142349B1 (en) 2018-02-22 2018-11-27 Palantir Technologies Inc. Verifying network-based permissioning rights
CN108737527B (en) * 2018-05-11 2021-07-09 重庆工商职业学院 Large-scale user access method and system suitable for platform
US10949272B2 (en) 2018-06-14 2021-03-16 Microsoft Technology Licensing, Llc Inter-application context seeding
US20200117722A1 (en) * 2018-10-12 2020-04-16 Goke Us Research Laboratory Efficient file storage and retrieval system, method and apparatus
US10904314B2 (en) * 2018-10-31 2021-01-26 Salesforce.Com, Inc. Endpoint URL generation and management
US11190514B2 (en) * 2019-06-17 2021-11-30 Microsoft Technology Licensing, Llc Client-server security enhancement using information accessed from access tokens
US11425143B2 (en) * 2020-01-23 2022-08-23 Bank Of America Corporation Sleeper keys
US11934548B2 (en) * 2021-05-27 2024-03-19 Microsoft Technology Licensing, Llc Centralized access control for cloud relational database management system resources
US11934545B2 (en) 2021-06-22 2024-03-19 Fortra, Llc Secure way to authenticate from file protocol while handling third party cookies and browser inconsistencies

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040010588A1 (en) 2002-06-07 2004-01-15 Slater Alastair Michael Serving out video over a network of video servers
US20070005662A1 (en) * 2005-06-30 2007-01-04 Microsoft Corporation Extensible and automatically replicating server farm configuration management infrastructure
US20090106571A1 (en) * 2007-10-21 2009-04-23 Anthony Low Systems and Methods to Adaptively Load Balance User Sessions to Reduce Energy Consumption
WO2010034608A1 (en) 2008-09-24 2010-04-01 Telefonaktiebolaget Lm Ericsson (Publ) System and method for configuration of processing clusters
US20110078333A1 (en) * 2009-09-29 2011-03-31 Robert Jakubowski Synchronization of server-side cookies with client-side cookies
US20110208804A1 (en) * 2010-02-23 2011-08-25 Microsoft Corporation Centralized management tool for remote presentation session server farms

Family Cites Families (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802530A (en) 1996-07-01 1998-09-01 Sun Microsystems, Inc. Web document based graphical user interface
US5875296A (en) 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US6167441A (en) 1997-11-21 2000-12-26 International Business Machines Corporation Customization of web pages based on requester type
US6256620B1 (en) 1998-01-16 2001-07-03 Aspect Communications Method and apparatus for monitoring information access
JP2000112906A (en) * 1998-10-01 2000-04-21 Mitsubishi Electric Corp Cluster system
US20020002563A1 (en) 1999-08-23 2002-01-03 Mary M. Bendik Document management systems and methods
US7120590B1 (en) 1999-08-23 2006-10-10 User Trencis, Inc. Electronically distributing promotional and advertising material based upon consumer internet usage
US6766298B1 (en) 1999-09-03 2004-07-20 Cisco Technology, Inc. Application server configured for dynamically generating web pages for voice enabled web applications
US7434219B2 (en) * 2000-01-31 2008-10-07 Commvault Systems, Inc. Storage of application specific profiles correlating to document versions
US7146233B2 (en) * 2000-02-11 2006-12-05 Sun Microsystems, Inc. Request queue management
US20010051890A1 (en) * 2000-03-17 2001-12-13 Raleigh Burgess Systems and methods for providing remote support via productivity centers
US7401131B2 (en) 2000-05-22 2008-07-15 Verizon Business Global Llc Method and system for implementing improved containers in a global ecosystem of interrelated services
JP4287990B2 (en) 2000-07-07 2009-07-01 インターナショナル・ビジネス・マシーンズ・コーポレーション Network system, terminal management system, terminal management method, data processing method, recording medium, and Internet service providing method
US6988241B1 (en) 2000-10-16 2006-01-17 International Business Machines Corporation Client side, web-based spreadsheet
US6931429B2 (en) * 2001-04-27 2005-08-16 Left Gate Holdings, Inc. Adaptable wireless proximity networking
WO2003001413A1 (en) 2001-06-22 2003-01-03 Nosa Omoigui System and method for knowledge retrieval, management, delivery and presentation
US7207041B2 (en) * 2001-06-28 2007-04-17 Tranzeo Wireless Technologies, Inc. Open platform architecture for shared resource access management
US7117504B2 (en) 2001-07-10 2006-10-03 Microsoft Corporation Application program interface that enables communication for a network software platform
US7552443B2 (en) 2001-10-18 2009-06-23 Bea Systems, Inc. System and method for implementing an event adapter
US20030084045A1 (en) 2001-11-01 2003-05-01 Flying Wireless, Inc. Systems and protocols for remote file access
US20030115226A1 (en) * 2001-12-13 2003-06-19 International Business Machines Corporation Method, apparatus, and program for quick save to remote storage
JP2003224674A (en) 2002-01-30 2003-08-08 Nec Infrontia Corp Health management service system by portable telephone terminal
US7603450B2 (en) 2002-04-26 2009-10-13 Hewlett-Packard Development Company, L.P. Methods and applets for providing and contributing to an IT network management service
US7499983B2 (en) 2002-05-06 2009-03-03 Micron Technology, Inc. Web dispatch service
US7085764B2 (en) * 2002-05-13 2006-08-01 International Business Machines Corporation System, method and program product for centrally managing agents
US7047243B2 (en) * 2002-08-05 2006-05-16 Microsoft Corporation Coordinating transactional web services
CN100463469C (en) 2002-10-25 2009-02-18 国际商业机器公司 Method, device and system for sharing applied program conversation information on multichannels
US7441046B2 (en) 2003-03-03 2008-10-21 Siemens Medical Solutions Usa, Inc. System enabling server progressive workload reduction to support server maintenance
JP4297811B2 (en) 2003-03-14 2009-07-15 株式会社リコー Information providing apparatus, information providing method, and program
US7216169B2 (en) * 2003-07-01 2007-05-08 Microsoft Corporation Method and system for administering personal computer health by registering multiple service providers and enforcing mutual exclusion rules
US20050049924A1 (en) 2003-08-27 2005-03-03 Debettencourt Jason Techniques for use with application monitoring to obtain transaction data
US7533168B1 (en) * 2003-09-11 2009-05-12 Sun Microsystems, Inc. Autonomic grid computing mechanism
US7376650B1 (en) 2003-09-12 2008-05-20 Microsoft Corporation Method and system for redirecting a request using redirection patterns
WO2005026946A2 (en) 2003-09-17 2005-03-24 Research In Motion Limited System and method for dynamic content processing with extendable provisioning
US7716357B2 (en) 2003-10-24 2010-05-11 Microsoft Corporation Service discovery and publication
US7475125B2 (en) * 2003-11-24 2009-01-06 Microsoft Corporation Seamless discovery of workstation-installed remote applications from an extranet
US7720906B2 (en) 2003-11-24 2010-05-18 Microsoft Corporation Web service for remote application discovery
US7844639B2 (en) * 2003-11-24 2010-11-30 Ebay Inc. Backward compatibility in database schemas
US8082520B2 (en) * 2004-02-26 2011-12-20 International Business Machines Corporation System and method for database management
US20050193106A1 (en) * 2004-03-01 2005-09-01 University Of Florida Service discovery and delivery for ad-hoc networks
US7606814B2 (en) 2004-03-11 2009-10-20 Microsoft Corporation Tracing a web request through a web server
US7650432B2 (en) 2004-05-20 2010-01-19 Bea Systems, Inc. Occasionally-connected application server
US20050268215A1 (en) 2004-06-01 2005-12-01 Microsoft Corporation Method and apparatus for viewing and interacting with a spreadsheet from within a web browser
US7680955B2 (en) * 2004-12-01 2010-03-16 George Mason Intellectual Properties, Inc. SCIT-DNS: critical infrastructure protection through secure DNS server dynamic updates
JP2006163723A (en) * 2004-12-06 2006-06-22 Hitachi Software Eng Co Ltd Document search method
US7752536B2 (en) 2005-09-09 2010-07-06 Microsoft Corporation Designating, setting and discovering parameters for spreadsheet documents
US7606844B2 (en) * 2005-12-19 2009-10-20 Commvault Systems, Inc. System and method for performing replication copy storage operations
US8122111B2 (en) * 2006-07-25 2012-02-21 Network Appliance, Inc. System and method for server configuration control and management
US20080091806A1 (en) * 2006-10-11 2008-04-17 Jinmei Shen Dynamic On-Demand Clustering
US7908292B2 (en) 2006-12-05 2011-03-15 Nokia Corporation Metadata broker
JP5046669B2 (en) * 2007-01-31 2012-10-10 キヤノン株式会社 Image forming apparatus, image forming apparatus control method, program, and storage medium
US20080209037A1 (en) 2007-02-05 2008-08-28 Dror Zernik System and method for enforcing in real time corporate business rules on web users
US8756673B2 (en) 2007-03-30 2014-06-17 Ricoh Company, Ltd. Techniques for sharing data
US20090007067A1 (en) * 2007-06-28 2009-01-01 International Business Machines Corporation Composite portal application
US8155987B2 (en) 2007-08-31 2012-04-10 Sap Aktiengeselleschaft Linking transactions with separate systems
KR20090038105A (en) 2007-10-15 2009-04-20 권진욱 Method for file common in web using dispersion storage
US8326814B2 (en) * 2007-12-05 2012-12-04 Box, Inc. Web-based file management system and service
US20090157987A1 (en) 2007-12-14 2009-06-18 Casdex, Inc. System and Method for Creating Self-Authenticating Documents Including Unique Content Identifiers
US9104738B2 (en) 2008-06-19 2015-08-11 Tropare, Inc. Leveraging collaborative cloud services to build and share apps
US20100162236A1 (en) * 2008-12-22 2010-06-24 Witchey Nicholas J Using Stored State To Instantiate A Virtual Computer
US8195792B2 (en) 2009-01-16 2012-06-05 Microsoft Corporation Interfacing distinct services for providing web based document manipulation access
US9165154B2 (en) 2009-02-16 2015-10-20 Microsoft Technology Licensing, Llc Trusted cloud computing and services framework
US8332356B2 (en) * 2009-05-12 2012-12-11 Oracle International Corporation NFS agent upgrade
US8510755B2 (en) * 2009-06-22 2013-08-13 Microsoft Corporation Automatically re-starting services
US8645511B2 (en) 2009-10-13 2014-02-04 Google Inc. Pre-configuration of a cloud-based computer
US9220054B2 (en) 2009-12-22 2015-12-22 Intel Corporation Enhanced service discovery mechanism in wireless communication system
US8296267B2 (en) * 2010-10-20 2012-10-23 Microsoft Corporation Upgrade of highly available farm server groups
CN102118249B (en) 2010-12-22 2014-04-30 厦门柏事特信息科技有限公司 Photographing and evidence-taking method based on digital digest and digital signature
CA2832444C (en) * 2011-04-07 2017-10-17 Pneuron Corp. Legacy application migration to real time, parallel performance cloud
US9009212B2 (en) * 2011-06-29 2015-04-14 Cisco Technology, Inc. Optimized transfer of applications between computing environments
US20130060806A1 (en) * 2011-09-07 2013-03-07 Microsoft Corporation Data Solution Composition Architecture
US9578114B2 (en) 2011-09-27 2017-02-21 Microsoft Technology Licensing, Llc External service application discovery method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040010588A1 (en) 2002-06-07 2004-01-15 Slater Alastair Michael Serving out video over a network of video servers
US20070005662A1 (en) * 2005-06-30 2007-01-04 Microsoft Corporation Extensible and automatically replicating server farm configuration management infrastructure
US20090106571A1 (en) * 2007-10-21 2009-04-23 Anthony Low Systems and Methods to Adaptively Load Balance User Sessions to Reduce Energy Consumption
WO2010034608A1 (en) 2008-09-24 2010-04-01 Telefonaktiebolaget Lm Ericsson (Publ) System and method for configuration of processing clusters
US20110078333A1 (en) * 2009-09-29 2011-03-31 Robert Jakubowski Synchronization of server-side cookies with client-side cookies
US20110208804A1 (en) * 2010-02-23 2011-08-25 Microsoft Corporation Centralized management tool for remote presentation session server farms

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2761486A4

Also Published As

Publication number Publication date
US9578114B2 (en) 2017-02-21
TW201314571A (en) 2013-04-01
AR089563A1 (en) 2014-09-03
KR101951066B1 (en) 2019-02-21
EP2761489A4 (en) 2015-09-02
HK1178636A1 (en) 2013-09-13
US20130080603A1 (en) 2013-03-28
KR20140079385A (en) 2014-06-26
US20130080785A1 (en) 2013-03-28
EP2761489A1 (en) 2014-08-06
WO2013049414A3 (en) 2013-05-23
EP2761806A2 (en) 2014-08-06
EP2761486A4 (en) 2015-07-01
JP2014530435A (en) 2014-11-17
JP6220338B2 (en) 2017-10-25
EP2761806B1 (en) 2018-07-25
TWI556168B (en) 2016-11-01
EP2761806A4 (en) 2015-04-22
WO2013049414A2 (en) 2013-04-04
EP2761489B1 (en) 2018-06-13
WO2013049422A1 (en) 2013-04-04
US20130080507A1 (en) 2013-03-28
US9319469B2 (en) 2016-04-19
EP2761486A1 (en) 2014-08-06

Similar Documents

Publication Publication Date Title
US20130080603A1 (en) Fault Tolerant External Application Server
US9483473B2 (en) High availability architecture for a cloud-based concurrent-access collaboration platform
CN109691057B (en) Interchangeably retrieving sensitive content via a private content distribution network
EP3100431B1 (en) Tenant based signature validation
US20080120362A1 (en) Single virtual client for multiple client access and equivalency
CN109565518B (en) Method and system for interchangeable content retrieval
US9171099B2 (en) System and method for providing calculation web services for online documents
US7437566B2 (en) System and method for identity confirmation of a contact published on a network
US20210092127A1 (en) Writing role-backed access control to chain
US10282255B2 (en) Coordinating file synchronization between a sync engine and another application that supports document collaboration
US10542088B2 (en) Modifying data resources within party-partitioned storage areas
US11080243B2 (en) Synchronizing virtualized file systems
US10715494B2 (en) Orchestrating work across domains and work streams
Bose et al. A billboard manager based model that offers dual features supporting cloud operating system and managing cloud data storage
US20160140352A1 (en) Communicating data between client devices using a hybrid connection having a regular communications pathway and a highly confidential communications pathway
US20180213398A1 (en) Tenant based signature validation
Sedivy et al. Mcsync-distributed, decentralized database for mobile devices
CN102930368B (en) Fault tolerant external application server
US10015248B1 (en) Syncronizing changes to stored data among multiple client devices
US11750669B1 (en) Personalized contextual connection of items in a multi-user system
US20170366916A1 (en) Programming organizational links that propagate to mobile applications
US20130198234A1 (en) Shared and Local Properties in a Multi-Hierarchy Taxonomy

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12834670

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2012834670

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2014532124

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20147008020

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE