Elastic application framework for deploying software
First Claim
Patent Images
1. A system, comprising:
- at least one processor; and
memory including instructions that, upon being executed by the at least one processor, cause the system to;
obtain a request to perform a process requiring server resources;
determine a trigger associated with the request;
determine a function comprising code and responsive to the trigger, the function for processing data associated with the trigger;
determine a computing device from a plurality of candidate computing devices to execute the function based at least in part upon the computing device having security characteristics that are devoid of requirements for user intervention to execute the function;
send second instructions to the computing device to cause the data to be obtained by the computing device from a remote data store using a network location;
cause the computing device to execute the code to perform the process using the data and to satisfy a performance threshold monitored for the process performed on the computing device; and
cause the code to be deployed to a second computing device of the plurality of candidate computing devices having the security characteristics in response to changes to performance of the process relative to the performance threshold so that the second computing device performs the process.
0 Assignments
0 Petitions
Accused Products
Abstract
Software is deployed to, and executed at, one or more computing devices in a computing system based on current conditions in the computing system and the capabilities of the different computing devices to handle the software. A request to run a software process calls a manager which determines an optimal place to run the software process. The manager can consider factors such as response time, user demands, bandwidth, processor utilization, storage utilization, security considerations, compatibility considerations and cost. Once a computing device is selected to run the software process, the manager facilitates movement of code and/or data to the computing device.
-
Citations
17 Claims
-
1. A system, comprising:
-
at least one processor; and memory including instructions that, upon being executed by the at least one processor, cause the system to; obtain a request to perform a process requiring server resources; determine a trigger associated with the request; determine a function comprising code and responsive to the trigger, the function for processing data associated with the trigger; determine a computing device from a plurality of candidate computing devices to execute the function based at least in part upon the computing device having security characteristics that are devoid of requirements for user intervention to execute the function; send second instructions to the computing device to cause the data to be obtained by the computing device from a remote data store using a network location; cause the computing device to execute the code to perform the process using the data and to satisfy a performance threshold monitored for the process performed on the computing device; and cause the code to be deployed to a second computing device of the plurality of candidate computing devices having the security characteristics in response to changes to performance of the process relative to the performance threshold so that the second computing device performs the process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method, comprising:
-
obtaining a request to perform a process requiring server resources; determining a trigger associated with the request; determining a function comprising code and responsive to the trigger, the function for processing data associated with the trigger; determining a computing device from a plurality of candidate computing devices to execute the function based at least in part upon the computing device having security characteristics that are devoid of requirements for user intervention to execute the function; sending second instructions to the computing device for causing the data to be obtained from a remote data store by the computing device using a network location; causing the computing device to execute the code to perform the process using the data and to satisfy a performance threshold monitored for the process performed on the computing device; and causing the code to be deployed to a second computing device of the plurality of candidate computing devices having the security characteristics in response to changes to performance of the process relative to the performance threshold so that the second computing device performs the process. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium storing instructions, the instructions, upon being executed by at least one processor, causing the at least one processor to:
-
obtain a request to perform a process requiring server resources; determine a trigger associated with the request; determine a function comprising code and responsive to the trigger, the function for processing data associated with the trigger; determine a computing device from a plurality of candidate computing devices to execute the function based at least in part upon the computing device having security characteristics that are devoid of requirements for user intervention to execute the function; send second instructions to the computing device to cause the data to be obtained by the computing device from a remote data store using a network location; cause the first computing device to execute the code to perform the process using the data and to satisfy a performance threshold monitored for the process performed on the computing device; and cause the code to be deployed to a second computing device of the plurality of candidate computing devices having the security characteristics in response to changes to performance of the process relative to the performance threshold so that the second computing device performs the process. - View Dependent Claims (17)
-
Specification