Deployment of software across an enterprise system
First Claim
1. A method of preparing software for deployment across an enterprise system, the software including a base package and an extended package, the extended package including duplicate files and new files with respect to the base package, the method comprising using a computer to:
- create indices of files for each of the base and extended packages;
compute a hash of each one of the files in the indices for each of the base and extended packages to produce a fingerprint for each one of the files;
iterate the indices of the base and extended packages to identify the duplicate files, wherein the fingerprints are compared to identify the duplicate files and the new files in the extended package; and
create, at the computer, a deployment package that includes only the new files for installation on an end user computer in the enterprise system wherein the deployment package also includes a first validation file that identifies all files that should be installed on the end user computer;
the method further comprising using the end user computer to install the deployment package and create a second validation file for those files actually installed on the end user computer, and compare the first and second files, whereby installation is successful if the first and second validation files are identical.
1 Assignment
0 Petitions
Accused Products
Abstract
Software is prepared for deployment across an enterprise system. The software initially included a base package and now includes an extended package. The extended package includes duplicate files and new files with respect to the base package. A method comprises using a computer to create indices of files for each of the base and extended packages, the indices identifying properties of the files; compare the properties of the files listed in the indices to identify the duplicate files and the new files in the extended package; and create a deployment package that includes only the new files.
29 Citations
13 Claims
-
1. A method of preparing software for deployment across an enterprise system, the software including a base package and an extended package, the extended package including duplicate files and new files with respect to the base package, the method comprising using a computer to:
-
create indices of files for each of the base and extended packages; compute a hash of each one of the files in the indices for each of the base and extended packages to produce a fingerprint for each one of the files; iterate the indices of the base and extended packages to identify the duplicate files, wherein the fingerprints are compared to identify the duplicate files and the new files in the extended package; and create, at the computer, a deployment package that includes only the new files for installation on an end user computer in the enterprise system wherein the deployment package also includes a first validation file that identifies all files that should be installed on the end user computer;
the method further comprising using the end user computer to install the deployment package and create a second validation file for those files actually installed on the end user computer, and compare the first and second files, whereby installation is successful if the first and second validation files are identical. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising a first computer and an end user computer, the first computer programmed to:
-
create indices of files for an extended software package and a previous package, the indices identifying properties of the files for each of the extended software package and the previous package, the extended package including all files of the previous package plus new files; compare the properties of the files listed in the indices to identify duplicate files in the extended package and the new files in the extended package; and create, at the first computer, a deployment package that includes only the new files in the extended package for installation on the end user computer and also a first validation file that identifies all files that should be installed on an end user computer; the end user computer programmed to install the deployment package and create a second validation file for those files actually installed on the end user computer, and compare the first and second files, whereby installation is successful if the first and second validation files are identical. - View Dependent Claims (11, 12, 13)
-
Specification