Running software application with dynamic action delegation

    公开(公告)号:GB2516833A

    公开(公告)日:2015-02-11

    申请号:GB201313660

    申请日:2013-07-31

    Applicant: IBM

    Abstract: A first component of a first computer system, such as a wireless mobile device, registers that it can execute various actions requested by applications running on the system. The actions may be sensing a physical quantity or running a background service. When a request to execute an action is received, the component determines whether the action should be executed by a local component or a remote component. The remote component may be on a further mobile device near the first computer system or it may be a remote computer provided by a network service. The first component executes the action on a remote component if there is no local component capable of executing the action. If there are suitable local and remote components, the choice may be based on a metric, such as battery level, network bandwidth, processor usage or memory usage.

    Reorganization of software images based on predicted use thereof

    公开(公告)号:GB2499290B

    公开(公告)日:2014-09-24

    申请号:GB201221591

    申请日:2012-11-30

    Applicant: IBM

    Abstract: A solution for managing a software image being stored in a plurality of physical blocks of a storage system comprises monitoring each access to the physical blocks, calculating a predicted sequence of access to the physical blocks according to the monitored accesses, and reorganizing the physical blocks according to the predicted sequence. The monitoring may be performed as the physical blocks are accessed during the booting of virtual images on the software image.

    Method and system for patching a virtual image

    公开(公告)号:GB2511012A

    公开(公告)日:2014-08-20

    申请号:GB201410081

    申请日:2012-12-04

    Applicant: IBM

    Abstract: An improved method for patching a virtual image comprises the steps: Modifying a selected dormant virtual image to be patched by injecting a corresponding patch logic, and patch material to be applied on next boot during an off-line preparation phase; downloading a boot medium (42) and creating a temporary disk (52) for a selected target virtual machine (50) with corresponding deployment data; changing a master boot record of said temporary disk (52) associated with said target virtual machine (50) to boot next on said boot medium (42); and executing said patch logic to install said patch material in case said target virtual machine (50) associated with said virtual image to be patched is booted.

    Avoiding conflicts between computing machines

    公开(公告)号:GB2508160A

    公开(公告)日:2014-05-28

    申请号:GB201220936

    申请日:2012-11-21

    Applicant: IBM

    Abstract: A solution is proposed to avoid conflicts when deploying software images onto a computing system. A computing machine is installed onto a computing system from a corresponding software image, the computing machine having an old access identifier and being connected to an old access identifier of at least one further computing machine in the software image. The computing machine being configured to have a new access identifier associated to the old access identifier. The system configured to retrieve (448-466) the new access identifier of each further computing machine from an association between the old access identifier and the new access identifier, and redirecting (469-478) each outbound communication from the computing machine to the old access identifier of each further computing machine to the new access identifier. Further claims are directed to the association of connection parameters to the old and new access identifiers.

    Method of migrating an operating system executing an application

    公开(公告)号:GB2506177A

    公开(公告)日:2014-03-26

    申请号:GB201217027

    申请日:2012-09-25

    Applicant: IBM

    Abstract: The application discloses methods for the live-migration of an operating system (OS) running an application. The OS and application run on a first computer system. The live-migration is performed to a second computer such that the application shows no externally detectable downtime during migration. A tracking tool is used to track and store data modifications to the storage system of the computer in a tracking file. On a shutdown of the first computer, the tracking tool continues to operate in a tracking mode and shuts down the first computer completely. The data modifications stored prior to the shutdown are sent to the second computer, which may then be started based on this data, followed by starting the application such that from an external perspective no application disruption is detectable.

    UPGRADE OF SOFTWARE IMAGES BASED ON STREAMING TECHNIQUE

    公开(公告)号:CA2817109A1

    公开(公告)日:2012-06-21

    申请号:CA2817109

    申请日:2011-11-10

    Applicant: IBM

    Abstract: A solution is proposed for migrating a data-processing entity (100) from a source software image (205s) installed on a mass memory (130) of the data- processing entity to a target software image stored on an external source (225), each software image including a plurality of memory blocks each one having a corresponding image address within the software image, and the mass memory including a plurality of memory locations each one for storing a memory block, the memory location having a corresponding memory address within the mass memory. A corresponding method (300) includes the steps of releasing (306) a portion of the mass memory, relocating (310) the memory blocks stored in boot locations of the target software image to the released portion, the boot locations being the memory locations having the memory addresses equal to the image addresses of boot blocks of the target software image including the memory blocks required to boot the data- processing entity up to load a streaming function (215) adapted to download the target software image from the external source, storing (314) the boot blocks into the corresponding boot locations, booting (316) the data-processing entity from the boot blocks in the corresponding boot locations thereby loading the streaming function, and serving (330-350) each request of reading a selected memory block of the target software image by the streaming function, the streaming function downloading (336) the selected memory block from the external source and storing (338-346) the selected memory block into the released portion when the selected memory block is not available in the mass memory, or retrieving (348) the selected memory block from the mass memory otherwise.

    A SOFTWARE DISTRIBUTION METHOD AND SYSTEM

    公开(公告)号:CA2481712C

    公开(公告)日:2011-07-12

    申请号:CA2481712

    申请日:2003-02-13

    Applicant: IBM

    Abstract: A software distribution method (300b) and a corresponding system are proposed. In a software distribution application, packages including instructions specifying the actions to be carried out on each target computer for installing or removing selected software products are prepared in a central site; typically, the actions are conditioned to a hardware configuration to the target computer. Each package is transmitted to the target computer, and the corresponding instructions are interpreted so as to enforce the desired software products meeting the current configuration of the target computer. In the solution of the invention, the configuration of the target computer is monitored to detect (337) any hardware upgrade. In response thereto, the target computer generates (339-351) a list of actions for removing software products not meeting the new configuration any longer and a list of action for installing software products now meeting the new configuration.

    A SOFTWARE DISTRIBUTION METHOD AND SYSTEM

    公开(公告)号:CA2481712A1

    公开(公告)日:2003-10-16

    申请号:CA2481712

    申请日:2003-02-13

    Applicant: IBM

    Abstract: A software distribution method (300b) and a corresponding system are propose d. In a software distribution application, packages including instructions specifying the actions to be carried out on each target computer for installing or removing selected software products are prepared in a central site; typically, the actions are conditioned to a hardware configuration to the target computer. Each package is transmitted to the target computer, and the corresponding instructions are interpreted so as to enforce the desired software products meeting the current configuration of the target computer. In the solution of the invention, the configuration of the target computer is monitored to detect (337) any hardware upgrade. In response thereto, the target computer generates (339-351) a list of actions for removing software products not meeting the new configuration any longer and a list of action f or installing software products now meeting the new configuration.

Patent Agency Ranking