A method for providing an image of software installed on a computer system is disclosed. The method includes the steps of deconstructing the image into at least one portion and creating at least one module from the at least one portion of the image. The deconstructing step can include the steps of scanning an image and identifying at least one portion of the image to be modularized. The creating step can include the steps of extracting the at least one portion of the image identified to be modularized and generating at least one module from the extracted portion of the image. The modules that are created in accordance with the present invention can be formatted for use in a new image or part of a new image to be used with a software program such as with a hardware-independent imaging tool. Furthermore, the modules can be used with hardware-independent technologies and can facilitate management of image inventory and facilitate deployment of images to new computer systems with different hardware configurations. Furthermore, the method is simple, cost effective and capable of being easily adapted to existing technology.
|
33. A method providing an image of software installed on a computer system, the method comprising the:
deconstructing the image into at least one portion, wherein the at least one portion of the image comprises an operating system, a set of drivers and application software;
creating at least one module utilizing uninstall code from the at least one portion of the image; and
formatting the at least one module for use in at least a portion of a new image.
1. A method for providing an image of software installed on a computer system, the method comprising:
deconstructing the image into at least one portion, wherein the at least one portion of the image comprises an operating system, a set of drivers and application software;
creating at least one module utilizing uninstall code from the at least one portion of the image; and
formatting the at least one module for use in a new image or at least a portion of a new image.
35. A system comprising:
a storage medium; and
a processing system coupled to the storage medium, the processing system including a mechanism for deconstructing an image into at least one portion, wherein the at least one portion of the image comprises an operating system, a set of drivers and application software; creating at least one module utilizing uninstall code from the at least one portion of the image; and formatting the at least one module for use in a new image or at least a portion of a new image.
34. A computer-readable storage medium including a compute program for providing an image of software installed on a computer system, comprising instructions for:
deconstructing the image into at least one portion, wherein the at least one portion of the image comprises an operating system, a set of drivers and application software;
creating the at least one module utilizing uninstall code from the at least one portion of the image; and
formatting the at least one module for use in at least a portion of a new image.
17. A computer-readable storage medium including a computer program for providing an image of software installed on a computer system, comprising instructions for:
deconstructing the image into at least one portion, wherein the at least one portion of the image comprises an operating system, a set of drivers and application software;
creating at least one module utilizing uninstall code from the at least one portion of the image; and
formatting the at least one module for use in a new image or at least a portion of a new image.
2. The method of
scanning the image; and
identifying at least one portion of the image to be modularized.
3. The method of
providing a list of portions of the image to be modularized; and
selecting at least one portion of the image to be modularized.
4. The method of
6. The method of
7. The method of
8. The method of
extracting the at least one portion of the image; and
generating the at least one module from the extracted portion of the image.
10. The method of
scanning the uninstall scripts; and
generating install scripts from the uninstall scripts.
11. The method of
reversing the order of the uninstall scripts;
determining uninstall scripts from the uninstall scripts; and
configuring a portion of the install scripts.
12. The method of
13. The method of
14. The method of
15. The method of
16. The method of
18. The medium of
scanning the image; and
identifying the at least one portion of the image to be modularized.
19. The medium of
providing a list of portions of the image to be modularized; and
selecting the at least one portion of the image to be modularized.
20. The medium of
22. The medium of
23. The medium of
24. The medium of
extracting the at least one portion of the image; and
generating at least one module from the extracted portion of the image.
26. The medium of
scanning the uninstall scripts; and
generating install scripts from the uninstall scripts.
27. The medium of
reversing the order of the uninstall scripts;
determining install scripts from the uninstall scripts; and
configuring a portion of the install scripts.
28. The medium of
29. The medium of
31. The medium of
32. The medium of
36. The system of
scanning the image; and
identifying at least one portion of the image to be modularized.
37. The system of
providing a list of portions of the image to be modularized; and
selecting at least one portion of the image to be modularized.
38. The system of
40. The system of
41. The system of
42. The system of
extracting the at least one portion of the image; and
generating the at least one module from the extracted portion of the image.
44. The system of
scanning the uninstall scripts; and
generating install scripts from the uninstall scripts.
45. The system of
reversing the order of the uninstall scripts;
determining the uninstall scripts from the uninstall scripts; and
configuring a portion of the install scripts.
46. The system of
47. The system of
49. The system of
50. The system of
|
The present invention relates to imaging technology, and more particularly to a method for providing an image of software installed on a computer system.
A conventional computer system typically includes various different hardware subsystems, which constitute a particular hardware configuration.
A computer system is typically purchased with preloaded software, which can include an operating system, hardware drivers, software utilities, and commonly used application software, e.g., word processors and spreadsheets. The software is already loaded/installed on the computer system by the time it is delivered to a customer. The customer can be a large enterprise but is not limited to large enterprises.
The individual software programs that constitute the preloaded software are provided by various software suppliers. For example, the operating system, e.g., Windows NT™ or OS/2™, would be provided by one software supplier. The hardware drivers, e.g., for a CD drive, would be provided by another software supplier. The individual software programs are typically provided on diskettes, the web, or CDs. Preloading the software programs can be substantially cumbersome especially when the number of individual software programs is increased or when the number of computer systems to be preloaded is increased.
The software is typically installed and stored on the hard disk drive of a computer system. The term “image” is used to describe the software installed on a hard disk drive of a computer system.
Managing and loading one image onto another system is much more efficient than manually installing and loading the software programs individually onto the other system. Images are deployed by organizations such as an information technology (IT) shop of a customer. Some of these images can be created and deployed using software utilities/tools such as IBM's ImageUltra™, Microsoft's SysPrep™ or industry standard tools such as PowerQuest's DriveImage™ or Symantech's Ghost™. Many of these software tools are primarily used to create a backup image for reinstallation should any software files become corrupted.
Unfortunately, most of these images require a donor system and are monolithic; i.e., they only work on computer systems with the same hardware configurations. This is because an image is customized to a particular hardware configuration. This is problematic because new images need to be created for new computer systems that are introduced in the customer's environment, where the new computer systems have a different hardware configuration. This problem exists even if the hardware configuration is only slightly different, such as being a different model. As a result, a customer needs to maintain and manage an inventory of images for the different hardware configurations of different computer systems. As the number of hardware configurations increase, the number of images that the customer needs to maintain increases, thus further complicating image-inventory management.
However, new images must still be created for each hardware configuration because the conventional solutions do not modify the images themselves. Images must be built from scratch, which is time consuming and inefficient, especially where there are many computer systems with different hardware configurations. IBM's ImageUltra™ is designed to manage and maintain images.
Accordingly, what is needed is an improved method for providing an image of software installed on a computer system. The method should facilitate management of image inventory and should facilitate deployment of images to new computer systems with different hardware configurations, even when portions of an image are not available for a particular computer system. The method should be simple, cost effective and capable of being easily adapted to existing technology. The present invention addresses such needs.
A method for providing an image of software installed on a computer system is disclosed. The method includes the steps of deconstructing the image into at least one portion and creating at least one module from the at least one portion of the image. The deconstructing step can include the steps of scanning an image and identifying at least portion of the image to be modularized. The creating step can include the steps of extracting the at least one portion of the image identified to be modularized and generating at least one module from the extracted portion of the image. The modules that are created in accordance with the present invention can be formatted for use in a new image or part of a new image to be used with a software program such as with a hardware-independent imaging tool. Furthermore, the modules can be used with hardware-independent technologies and can facilitate management of image inventory and facilitate deployment of images to new computer systems with different hardware configurations. Furthermore, the method is simple, cost effective and capable of being easily adapted to existing technology.
The present invention relates to imaging technology, and more particularly to an improved method for providing an image of software installed on a computer system. The following description is presented to enable one of ordinary skill in the art to make and use the invention and is provided in the context of a patent application and its requirements. Various modifications to the preferred embodiment and the generic principles and features described herein will be readily apparent to those skilled in the art. Thus, the present invention is not intended to be limited to the embodiment shown but is to be accorded the widest scope consistent with the principles and features described herein.
A method in accordance with the present invention, including the steps of deconstructing an existing image and creating one or more modules from all or part of the image, is disclosed. To deconstruct the image, the image is scanned to identify at least one portion of the image to be modularized. At least one portion of the image is then extracted, and at least one module is generated from that portion of the image. The module can then be formatted for use in a new image or part of a new image to be used with a particular software program, such as with a hardware-independent imaging tool or with other hardware-independent application software. An advantage of making an image modular is that it allows hardware-independent software programs (e.g., operating system, commonly used application software) to be abstracted or separated from hardware-dependent software programs (e.g., device drivers, hardware-dependent software). Modules can be added or removed from an image as needed, or can be combined to create new modular-based images. To more particularly describe the features of the present invention, refer now to the following description in conjunction with the accompanying figures.
By storing an image as modules, modules can be added to or removed from an image as needed. This flexibility is useful when an image is to be copied to computer systems with different hardware configurations, even when portions of an image are not available for a particular computer system. Such differences can result when the hardware of one or computer systems are upgraded. For example, one or more computer systems might be upgraded from having a CD drive to a CD-RW drive, or simply be upgraded from an older version of the original device driver. Rather than creating an entirely new image for the new hardware configuration, the portion of the image related to the CD drive can be stored as a module. This module is then replaced with a module with the appropriate CD-RW software. The modified image can then be deployed to one or more computer systems with the new hardware configuration. The need to create an image with the CD-RW drive from scratch is avoided.
If the modules are formatted for use in a new image, the new image would be a modular-based imaged. Alternatively, if the modules are formatted for use in an existing image that is not entirely modular based, the portions of that image with the new modules will be modular based and the remaining portions need not be modular based. This process can take place on a single computer at a customer site. Alternatively, the process can take place remotely over a network such as an intranet or the internet.
The criteria for identifying which portion(s) of the image to modularize will vary depending on the specific application. The portions to be modularized can be those portions associated with hardware-independent software programs (e.g., operating systems, drivers, and application software). Alternatively, the portions to be modularized can be those associated with hardware-dependent software programs (e.g., device drivers), or a combination of hardware-independent and hardware-dependent software programs.
The entire image can be modularized such that all portions of the image are modularized. Alternatively, selected portions of the image can be modularized. As such, after the image is scanned, a list of portions of the image available to be modularized is provided. The list can comprise, for example, software programs for operating systems, drivers and application software, which are present in the image. They can be hardware independent, hardware dependent, or a combination of both. One or more portions of the image from the list can be selected to be modularized. The selection can be done manually by the customer. Alternatively, the selection can be done automatically based on predetermined criteria, e.g., certain application software of a certain class. For example, such a class can include all spreadsheet application software.
Still referring to both
The module can then be installed onto a computer system or processed by an imaging tool by using install scripts that correspond to the uninstall scripts. The install scripts can be determined from information from the uninstall scripts in combination with log information related to the OS during an original installation. When a software program is installed under an OS, the OS maintains a log of actions taken during the installation process. For example, the log includes information on changes to the OS software. Such changes can include, for example, newly shared DLLs reference counts, removed tags, decremented reference counts, etc. Such information can be used to configure the generated install scripts. The install scripts are ascertainable because the install and uninstall procedures are standardized. Accordingly, existing information in the image can be used in a reverse engineering process to create install scripts from the uninstall scripts. The install and uninstall scripts can be stored in a location specified by the user or in a default location such as with the files needed by related software programs.
Still referring to
Once one or more modules are created, they can be stored in a module or image library and can be used or grouped as needed by the customer. For example, some of the modules can be used to create new modular-based hardware-independent images. Some of the modules can be used to modify existing hardware-independent modular-based images created in accordance with the present invention. Some of the modules can be used to modify existing images that are partly modular based. As can be seen, management of image inventory is greatly facilitated.
The modules can also be integrated into a software developer's kit such as IBM's ImageUltra™ Builder™, which allows the customer to buy one computer system, configure it as desired, build an image, and then copy the image from the hard drive of the original computer system to other identical computer systems. If a customer wants to add a software program to an image being built, ImageUltra™ adds an application wrapper around the software program. The application wrapper automates the installation of the software program. In the preferred embodiment, install scripts are integrated into the application wrapper.
In accordance with the present invention, an image can be made into modules even if the image was created by other technologies such as Microsoft's SysPrep™ image. The modules in accordance with the present invention would help customers to rapidly migrate their image inventory to take advantage of new hardware-independent technologies. This is because the modules eliminate or reduce the need for manual application installation, hardware testing and support.
An improved method for providing an image of software installed on a computer system is disclosed. The method includes the steps of deconstructing an existing image and creating one or more modules from all or part of the image. To deconstruct the image, the image is scanned to identify at least one portion of the image to be modularized. At least one portion of the image is then extracted, and at least one module is generated from that portion of the image. The module can then be formatted for use in a new image or part of a new image to be used with a particular software program, such as with a hardware-independent imaging tool or with other hardware-independent application software. An advantage of making an image modular is that it allows hardware-independent software programs (e.g., operating system, commonly used application software) to be abstracted or separated from hardware-dependent software programs (e.g., device drivers, hardware-dependent software). Modules can be added or removed from an image as needed, or can be combined to create new modular-based images.
Although the present invention has been described in accordance with the embodiments shown, one of ordinary skill in the art will readily recognize that there could be variations to the embodiments and those variations would be within the spirit and scope of the present invention. For example, modules can also be created at the batch level. Also, if a plurality of modules is created from the at least one portion of the image, the plurality of modules can comprise a combination of hardware-independent and hardware-dependent modules. As such, the plurality of modules can be used with hardware-independent or hardware-dependent software programs, a combination of both. Accordingly, many modifications may be made by one of ordinary skill in the art without departing from the spirit and scope of the appended claims.
Locker, Howard J., Mese, John C., Weksler, Arnold, Estroff, Jeffrey M., Hunt, James A., Novak, Joshua N., Caliendo, Jr., Neal R., Fuccella-Walcutt, Michaelle L., Ruiz, Jose R., Waltermann, Rod D. W.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
5175856, | Jun 11 1990 | SILICON GRAPHICS INTERNATIONAL, CORP | Computer with integrated hierarchical representation (IHR) of program wherein IHR file is available for debugging and optimizing during target execution |
5701423, | Apr 10 1992 | Intellisync Corporation | Method for mapping, translating, and dynamically reconciling data between disparate computer platforms |
6061513, | Aug 18 1997 | Automated methods for constructing language specific systems for reverse engineering source code into abstract syntax trees with attributes in a form that can more easily be displayed, understood and/or modified | |
6071317, | Dec 11 1997 | HANGER SOLUTIONS, LLC | Object code logic analysis and automated modification system and method |
6281893, | Apr 04 1996 | Sun Microsystems, Inc. | Method and apparatus for providing an object oriented approach to a device independent graphics control system |
6591415, | Apr 30 1999 | Macrovision Corporation | Polymorphic code generation method and system therefor |
6615199, | Aug 31 1999 | Accenture Global Services Limited | Abstraction factory in a base services pattern environment |
6715145, | Aug 31 1999 | Accenture Global Services Limited | Processing pipeline in a base services pattern environment |
6721946, | Sep 28 2000 | Dell Products L P | Method and system for installing software on a computer |
6742015, | Aug 31 1999 | Accenture Global Services Limited | Base services patterns in a netcentric environment |
6748584, | Dec 29 1999 | Symantec Corporation | Method for determining the degree to which changed code has been exercised |
6817014, | Apr 11 2001 | Hewlett Packard Enterprise Development LP | Analysis of executable program code using compiler-generated function entry points and endpoints with other sources of function entry points and endpoints |
6886111, | Mar 08 2000 | International Business Machines Corporation | Method and data processing system for software testing of a device driver |
6938185, | Jun 25 2002 | Macom Technology Solutions Holdings, Inc | Method and system for adapting a debugger to new targets |
7047380, | Jul 22 2003 | Acronis International GmbH | System and method for using file system snapshots for online data backup |
7181740, | Mar 31 2003 | Sony Corporation; Sony Electronics INC | Method and system for automated provision of build images |
20020035522, | |||
20020059402, | |||
20020180783, | |||
20020188703, | |||
20020191018, | |||
20030033432, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Aug 18 2003 | Lenovo (Singapore) Pte. Ltd. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Date | Maintenance Schedule |
Jul 10 2010 | 4 years fee payment window open |
Jan 10 2011 | 6 months grace period start (w surcharge) |
Jul 10 2011 | patent expiry (for year 4) |
Jul 10 2013 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jul 10 2014 | 8 years fee payment window open |
Jan 10 2015 | 6 months grace period start (w surcharge) |
Jul 10 2015 | patent expiry (for year 8) |
Jul 10 2017 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jul 10 2018 | 12 years fee payment window open |
Jan 10 2019 | 6 months grace period start (w surcharge) |
Jul 10 2019 | patent expiry (for year 12) |
Jul 10 2021 | 2 years to revive unintentionally abandoned end. (for year 12) |