Method and system for optimizing software upgrades
First Claim
1. A method for analyzing an impact on binaries of a computer system caused by a software upgrade, comprising:
- accessing a configuration inventory of the computer system including a profile for each of the binaries;
accessing a set of upgrade rules for the software upgrade; and
analyzing the binary profiles based on the upgrade rules to generate binary analysis results dividing the binaries into a set of safe binaries and at-risk binaries, wherein the at-risk binaries are further divided into subcategories based on risk of incompatibility of the at-risk binaries with the software upgrade.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.
-
Citations
35 Claims
-
1. A method for analyzing an impact on binaries of a computer system caused by a software upgrade, comprising:
-
accessing a configuration inventory of the computer system including a profile for each of the binaries;
accessing a set of upgrade rules for the software upgrade; and
analyzing the binary profiles based on the upgrade rules to generate binary analysis results dividing the binaries into a set of safe binaries and at-risk binaries, wherein the at-risk binaries are further divided into subcategories based on risk of incompatibility of the at-risk binaries with the software upgrade. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for providing an analysis of a planned software upgrade for a customer computer system, comprising:
-
collecting hardware and software configuration data from the customer computer system including a hardware profile and an operating system profile;
providing upgrade rules for the planned software upgrade;
comparing the hardware profile with the upgrade rules to determine hardware compatibility with the planned software upgrade;
comparing the operating system profile with the upgrade rules to determine operating system compatibility with the planned software upgrade; and
generating an upgrade analysis report based on the hardware compatibility and the operating system compatibility. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer system for analyzing an impact of a software upgrade on a customer computer system, comprising:
-
a data storage device storing a configuration inventory for the customer computer system including data on binaries on the customer computer system;
a data storage device storing upgrade rules for the software upgrade; and
an analysis tool processing the binaries data based on the upgrade rules to classify the binaries into a set of safe binaries and a set of at-risk binaries, the set of at-risk binaries including subsets of binaries differentiated based on a level of risk of incompatibility with the software upgrade. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A computer system for analyzing an impact of a software upgrade on a customer computer system, comprising:
-
a data storage device storing a configuration inventory for the customer computer system;
a data storage device storing configuration information for the customer computer system after the software upgrade; and
an analysis tool for comparing the configuration inventory to the upgrade information to determine the impact of the software upgrade on the customer computer system. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification