Using disassociated images for computer and storage resource management
First Claim
1. A method of computer resource management, comprising:
- receiving, at a management node that comprises at least one management computer, at least one ample image captured from an existing computer;
obtaining at the management node meta-data that is structurally associated with the ample image;
indexing the ample image within a plurality of ample images such that the ample image can be located by using at least part of the meta-data as a key;
mounting the ample image within a management environment at the management node, the management environment providing at least the ability to perform at least one file system operation to read files and directories;
identifying a suspect file within the ample image;
tracking, by searching the plurality of ample images, propagation of the suspect file; and
upon identifying the suspect file, repairing at least a portion of the ample image such that the resulting, modified, ample image reflects a different data state, different software state, different operating system environment, or different hardware operating environment than that which existed on the existing computer at the time the image was captured.
9 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides tools and techniques for facilitating (314) management of storage (122), software (118), and other resources of a computer (102) at a distinct management computer (110) using a disassociated ample image (104) of the managed computer'"'"'s storage. Ample images may be searched (310) to identify (414) infected files or illegal files, to extract (410) disk usage information, or for other reasons. Ample images may be modified (312) and then deployed (316) back to the original imaged computer and/or to other computers outside the management node. Modifications may change (502, 504, 506) application software, change (508, 510, 512) hardware drivers to match hardware changes on the target computer(s), manipulate (520) partitions, and/or perform other steps to optimize storage, software, or other resources.
72 Citations
35 Claims
-
1. A method of computer resource management, comprising:
-
receiving, at a management node that comprises at least one management computer, at least one ample image captured from an existing computer; obtaining at the management node meta-data that is structurally associated with the ample image; indexing the ample image within a plurality of ample images such that the ample image can be located by using at least part of the meta-data as a key; mounting the ample image within a management environment at the management node, the management environment providing at least the ability to perform at least one file system operation to read files and directories; identifying a suspect file within the ample image; tracking, by searching the plurality of ample images, propagation of the suspect file; and upon identifying the suspect file, repairing at least a portion of the ample image such that the resulting, modified, ample image reflects a different data state, different software state, different operating system environment, or different hardware operating environment than that which existed on the existing computer at the time the image was captured. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable storage medium configured to cause at least one management node computer to perform a method of computer resource management, the method comprising the steps of:
-
receiving, at a management node computer, at least one ample image captured from an existing computer; obtaining at the management node meta-data that is structurally associated with the ample image; indexing the ample image within a plurality of ample images such that the ample image can be located by using at least part of the meta-data as a key; identifying a suspect file within the ample image; tracking, by searching the plurality of ample images, propagation of the suspect file; upon identifying the suspect file, repairing at least a portion of the ample image in the management environment such that the resulting, modified, ample image reflects a different data state, different software state, different operating system environment, or different hardware operating environment than that which existed on the existing computer at the time the image was captured; and sending the modified ample image from the management node to be installed on at least one computer that is not in the management node. - View Dependent Claims (18, 19, 20, 21, 22, 33)
-
-
23. A system for computer resource management, comprising:
-
a management node that includes at least one management computer; an indexing component that indexes ample images within a plurality of ample images such that a given ample image captured from an existing computer can be located by using meta-data as a key; a management environment at the management node, the management environment providing at least the ability to perform at least one file system operation to read files and directories, and the management environment providing access to the ample image such that within the management environment the ample image appears as a standard, mounted, directory, volume, partition, or disc; a searching tool for; identifying a suspect file within the ample image; tracking, by searching the plurality of ample images, propagation of the suspect file; and a modifying tool for repairing, upon identification of the suspect file, at least a portion of the ample image within the management environment such that the resulting, modified, ample image reflects a different data state, different software state, different operating system environment, or different hardware operating environment than that which existed on the existing computer at the time the image was captured. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
34. A method for managing computer resources, comprising:
-
receiving, at a management node that comprises at least one management computer, at least one ample image captured from an existing computer; identifying, at the management node, meta-data associated with the ample image; indexing the ample image within a plurality of ample images based on the meta-data associated with the ample image; mounting the ample image to the management node; identifying a suspect file within the ample image; tracking, by searching the plurality of ample images, propagation of the suspect file; and upon identifying the suspect file, repairing, using the management node, at least a portion of the ample image captured from the existing computer. - View Dependent Claims (35)
-
Specification