System and method for modeling cloud rules for migration to the cloud
First Claim
Patent Images
1. A computerized method for modeling rules for migration to the cloud, the method comprising the steps of:
- providing a computer including a processor and executable instructions stored on a memory coupled to the processor;
reviewing, using executed instructions on the computer, without further intervention of a user, architectures of a source platform and a target platform, wherein the architectures are the organizational structures of the source platform and the target platform, and the reviewing includes identifying the interaction between the architectures to determine constraints for migration of the source platform to the target platform;
defining, using executed instructions on the computer, without intervention of a user, a plurality of rules, wherein the plurality of rules implement the constraints of the target platform and the defining includes developing the plurality of rules in at least one programming language of the source platform and the target platform;
scanning, using executed instructions on the computer, without further intervention of a user, source code of an application intended to be migrated to the target platform to determine whether the application violates any of the plurality of rules;
correcting, using executed instructions on the computer, without further intervention of the user, via a code correction framework for at least one type of source code, one or more violations of the plurality of rules of the source code according to an original token, a location of the original token, and an alternate token for replacing the original token wherein the tokens are elements of the source code; and
generating, using executed instructions on the computer, without further intervention of a user, a report including any violations of the plurality of rules that have been corrected and any violations of the plurality of rules not corrected, the latter left for manual correction by the user;
wherein the correcting step includes automatically modifying, via a PDF report plugin, the source code of the application to correct the one or more violations of the plurality of rules.
9 Assignments
0 Petitions
Accused Products
Abstract
A computerized system and method of migrating an application from a source platform to a target platform, such as a cloud platform. A set of rules are developed that represent aspect of the target platform and the source code of the application to be migrated is analyzed to determine whether it violates any of these rules. In some embodiments, the source code could be automatically modified to correct for violations of the rules.
34 Citations
20 Claims
-
1. A computerized method for modeling rules for migration to the cloud, the method comprising the steps of:
-
providing a computer including a processor and executable instructions stored on a memory coupled to the processor; reviewing, using executed instructions on the computer, without further intervention of a user, architectures of a source platform and a target platform, wherein the architectures are the organizational structures of the source platform and the target platform, and the reviewing includes identifying the interaction between the architectures to determine constraints for migration of the source platform to the target platform; defining, using executed instructions on the computer, without intervention of a user, a plurality of rules, wherein the plurality of rules implement the constraints of the target platform and the defining includes developing the plurality of rules in at least one programming language of the source platform and the target platform; scanning, using executed instructions on the computer, without further intervention of a user, source code of an application intended to be migrated to the target platform to determine whether the application violates any of the plurality of rules; correcting, using executed instructions on the computer, without further intervention of the user, via a code correction framework for at least one type of source code, one or more violations of the plurality of rules of the source code according to an original token, a location of the original token, and an alternate token for replacing the original token wherein the tokens are elements of the source code; and generating, using executed instructions on the computer, without further intervention of a user, a report including any violations of the plurality of rules that have been corrected and any violations of the plurality of rules not corrected, the latter left for manual correction by the user; wherein the correcting step includes automatically modifying, via a PDF report plugin, the source code of the application to correct the one or more violations of the plurality of rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computerized method for modeling rules for migration to the cloud, the method comprising the steps of:
-
providing a computer including a processor and executable instructions stored on a memory coupled to the processor; reviewing , using executed instructions on the computer, without further intervention of a user, architectures of a source platform and a target platform , wherein the architectures are the organizational structures of the source platform and the target platform, and the reviewing includes identifying the interaction between the architectures to determine constraints for migration of the source platform to the target platform; defining, using executed instructions on the computer, without intervention of a user, a plurality of rules, wherein the plurality of rules implement the constraints of the target platform and the defining includes developing the plurality of rules in at least one programming language of the source platform and the target platform; scanning, using executed instructions on the computer, without further intervention of a user, source code of an application intended to be migrated to the target platform to determine whether the application violates any of the plurality of rules; analyzing, using executed instructions on the computer, without further intervention of a user, (a) one or more XML files including a configuration of the source code for violations of the plurality of rules, (b) one or more Java properties files associated with the source code for violations of the plurality of rules, or both (a) and (b); correcting, using executed instructions on the computer, without further intervention of a user, via a code correction framework for at least one type of source code, the violations according to an original token, a location of the original token, and an alternate token for replacing the original token; and generating, using executed instructions on the computer, without further intervention of a user, a report including any violations of the plurality of rules that have been corrected and any violations of the plurality of rules not corrected, the latter left for manual correction by the user; wherein the correcting step includes automatically modifying, via a PDF report plugin, the source code of the application to correct the one or more violations of the plurality of rules. - View Dependent Claims (17, 18, 19, 20)
-
Specification