×

Systems and methods for efficiently using network bandwidth to deploy dependencies of a software package

  • US 8,341,622 B1
  • Filed: 12/15/2005
  • Issued: 12/25/2012
  • Est. Priority Date: 12/15/2005
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for efficiently using network bandwidth to deploy dependencies of a software package to a plurality of target nodes, comprising:

  • deploying a dependent software package to the plurality of target nodes;

    identifying one or more dependencies of the dependent software package; and

    for each dependency that is identified;

    determining which of the plurality of target nodes already have the dependency installed, wherein determining which of the plurality of target nodes already have the one or more dependencies installed comprises;

    sending a detection file to the plurality of target nodes, wherein the detection file identifies the one or more dependencies of the dependent software package and comprises instructions to search for one or more indicators of the one or more dependencies, wherein the detection file is sent from management software running on a computer system external to the target nodes, wherein the instructions to search comprise instructions to search for a particular registry key; and

    receiving at the management software notification from the plurality of target nodes about whether the one or more dependencies are already installed; and

    deploying the dependency only to the target nodes that do not already have the dependency installed,wherein the detection file is a vulnerability definition file that is defined by an XML (Extensible Markup Language) document, wherein the XML document comprises an uninstall information element that indicates whether an uninstallation can be performed and whether an original patch element is required, a patches element and a registration keys element that includes the following as child elements;

    an uninstall information element, a patch element, and a vulnerability element.

View all claims
  • 25 Assignments
Timeline View
Assignment View
    ×
    ×