Systems and methods for efficiently using network bandwidth to deploy dependencies of a software package
First Claim
Patent Images
1. A computer-implemented method for efficiently using network bandwidth to deploy dependencies of a software package to a plurality of target nodes, comprising:
- deploying a dependent software package to the plurality of target nodes;
identifying one or more dependencies of the dependent software package; and
for each dependency that is identified;
determining which of the plurality of target nodes already have the dependency installed, wherein determining which of the plurality of target nodes already have the one or more dependencies installed comprises;
sending a detection file to the plurality of target nodes, wherein the detection file identifies the one or more dependencies of the dependent software package and comprises instructions to search for one or more indicators of the one or more dependencies, wherein the detection file is sent from management software running on a computer system external to the target nodes, wherein the instructions to search comprise instructions to search for a particular registry key; and
receiving at the management software notification from the plurality of target nodes about whether the one or more dependencies are already installed; and
deploying the dependency only to the target nodes that do not already have the dependency installed,wherein the detection file is a vulnerability definition file that is defined by an XML (Extensible Markup Language) document, wherein the XML document comprises an uninstall information element that indicates whether an uninstallation can be performed and whether an original patch element is required, a patches element and a registration keys element that includes the following as child elements;
an uninstall information element, a patch element, and a vulnerability element.
25 Assignments
0 Petitions
Accused Products
Abstract
A package deployment manager on an administrative system deploys a dependent software package to a plurality of target nodes. The package deployment manager also identifies one or more dependencies of the dependent software package. For each dependency that is identified, the package deployment manager determines which of the plurality of target nodes already have the dependency installed, and deploys the dependency only to the target nodes that do not already have the dependency installed.
67 Citations
15 Claims
-
1. A computer-implemented method for efficiently using network bandwidth to deploy dependencies of a software package to a plurality of target nodes, comprising:
-
deploying a dependent software package to the plurality of target nodes; identifying one or more dependencies of the dependent software package; and for each dependency that is identified; determining which of the plurality of target nodes already have the dependency installed, wherein determining which of the plurality of target nodes already have the one or more dependencies installed comprises; sending a detection file to the plurality of target nodes, wherein the detection file identifies the one or more dependencies of the dependent software package and comprises instructions to search for one or more indicators of the one or more dependencies, wherein the detection file is sent from management software running on a computer system external to the target nodes, wherein the instructions to search comprise instructions to search for a particular registry key; and receiving at the management software notification from the plurality of target nodes about whether the one or more dependencies are already installed; and deploying the dependency only to the target nodes that do not already have the dependency installed, wherein the detection file is a vulnerability definition file that is defined by an XML (Extensible Markup Language) document, wherein the XML document comprises an uninstall information element that indicates whether an uninstallation can be performed and whether an original patch element is required, a patches element and a registration keys element that includes the following as child elements;
an uninstall information element, a patch element, and a vulnerability element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer system that is configured for efficiently using network bandwidth to deploy dependencies of a software package to a plurality of target nodes, the computer system comprising:
-
a processor; memory in electronic communication with the processor; instructions stored in the memory, the instructions being executable to; deploy a dependent software package to the plurality of target nodes; identify one or more dependencies of the dependent software package; and for each dependency that is identified; determine which of the plurality of target nodes already have the dependency installed, wherein the executable instructions to determine which of the plurality of target nodes already have the one or more dependencies installed comprise instructions executable to; send a detection file to the plurality of target nodes, wherein the detection file identifies the one or more dependencies of the dependent software package and comprises instructions to search for one or more indicators of the one or more dependencies, wherein the detection file is sent from management software running on the computer system, the computer system being external to the target nodes, wherein the instructions to search comprise instructions to search for a particular registry key; and receive at the management software notification from the plurality of target nodes about whether the one or more dependencies are already installed; and deploy the dependency only to the target nodes that do not already have the dependency installed, wherein the detection file is a vulnerability definition file that is defined by an XML (Extensible Markup Language) document, wherein the XML document comprises an uninstall information element that indicates whether the dependency can be an uninstallation can be performed and whether an original patch element is required, a patches element and a registration keys element that includes the following as child elements;
an uninstall information element, a patch element, and a vulnerability element. - View Dependent Claims (13)
-
-
14. A non-transitory computer-readable medium comprising executable instructions for efficiently using network bandwidth to deploy dependencies of a software package to a plurality of target nodes, the instructions being executable to:
-
deploy a dependent software package to the plurality of target nodes; identify one or more dependencies of the dependent software package; and for each dependency that is identified; determine which of the plurality of target nodes already have the dependency installed, wherein the executable instructions to determine which of the plurality of target nodes already have the one or more dependencies installed comprise instructions executable to; send a detection file to the plurality of target nodes, wherein the detection file identifies the one or more dependencies of the dependent software package and comprises instructions to search for one or more indicators of the one or more dependencies, wherein the detection file is sent from management software running on a computer system external to the target nodes, wherein the instructions to search comprise instructions to search for a particular registry key; and receive notification at the management software from the plurality of target nodes about whether the one or more dependencies are already installed; and deploy the dependency only to the target nodes that do not already have the dependency installed, wherein the detection file is a vulnerability definition file that is defined by an XML (Extensible Markup Language) document, wherein the XML document comprises an uninstall information element that indicates whether an uninstallation can be performed and whether an original patch element is required, a patches element and a registration keys element that includes the following as child elements;
an uninstall information element, a patch element, and a vulnerability element. - View Dependent Claims (15)
-
Specification