[go: up one dir, main page]

GB2495081A - Management system for delivering an application - Google Patents

Management system for delivering an application Download PDF

Info

Publication number
GB2495081A
GB2495081A GB1116458.9A GB201116458A GB2495081A GB 2495081 A GB2495081 A GB 2495081A GB 201116458 A GB201116458 A GB 201116458A GB 2495081 A GB2495081 A GB 2495081A
Authority
GB
United Kingdom
Prior art keywords
user
application
software
users
demand
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1116458.9A
Other versions
GB201116458D0 (en
Inventor
Jeremy Bullock
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CENTRIX NETWORKING Ltd
Original Assignee
CENTRIX NETWORKING Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CENTRIX NETWORKING Ltd filed Critical CENTRIX NETWORKING Ltd
Priority to GB1116458.9A priority Critical patent/GB2495081A/en
Publication of GB201116458D0 publication Critical patent/GB201116458D0/en
Priority to PCT/GB2012/052320 priority patent/WO2013041863A2/en
Publication of GB2495081A publication Critical patent/GB2495081A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A management system (70) for delivering an application to a user (10a-d) analyses capabilities of a user location; determines accessibility of user content and identifies associated applications and bases a decision made concerning provision of the application to the user and uses an optimizer to allocates an optimal application to the user. The method also takes into account user defined criteria or rules (60) and one or more groups in order to identify user content and associated applications to ensure the optimal application is deployed to the user. The user defined criteria may include demand predefined tariffs according to demand and licenses. The system may include a means for determining if a user is authorized to use the application. A further means for determining the quickest, cheapest or easiest way an application can be delivered. Determination may also be made on the available bandwidth, license availability, number of users, time or combination of these.

Description

Dynamic Content Association
Field of the Invention
The invention relates to a method and system of delivecing an application, such as for example a piece of software, code or data, to a user in a manner that is fransparent to the user. In addition to user transparency, the method optimizes an end-user computing experience.
Backciround Nowadays computer systems typically comprise one or many application server 0) machines arid many client machines for end-users. The application server machines host application software which can be provisioned to end-users by way O of several different application delivery methods.
An example of such a delivery method is as a streaming application. A streaming application is one form of on-demand software distribution. This delivery method arises as a result of the way computer languages and operating systems produce arid run application code. Only specific parts of a computer program need to be available at any instance for an end user to perform a particular JUnction. An advantage of this is that a computer program does not need to be fully Installed on a client computer. Instead chunks of program can be delivered over a network as and when they are required.
Another example of a typical delivery method is an application session, An application session is a piece of software or code that is located intermediate an application layer and a main network and typically manages connectivity to the network, which may be one that is rapidly changing. Application session software effectively insulates an application server farm from the network by way of a programmable engine, so as to provide application specific call-control fLinctions independent of each network. Often application session code incorporates a number of open standards. An advantage of application session software is that it is scalable to support many millions of subscribers via a single system.
Applications may be accessed via a virtual desktop, hosted on a remote server. In addition, the same application may be installed locally, for example on an end-user client machine, personal computer or a laptop. Companies and organisations possess hundreds, sometimes thousands, of data hardware resources, such as for o example computer terminals and servers, which may be networked. However, servers are expensive capital equipment to purchase, to manage and to maintain. Ce)
Contemporary computer users are focussed on content, which may be documents or other office software, for example word processing programs, accountancy packages, spreadsheets, database software, video, music, graphics or other creative material. Generally users are less focussed on a particular application (specific software package) that is used to display or edit the content and are more concerned with end user experience or processing speed. This change in user behaviour and demand is a shift in computer interaction and results from relatively recent development of increasingly Intuitive devices and marks a step towards ubiquitous computing.
Computer management and IT departments ot commercial organizations are Increasingly moving to new application delivery mechanisms, such as on-demand local installation, virtual desktop infrastructures, streaming applications and session-based access to server-hosted applications, Advantages of these delivery mechanisms are explained below.
These shifts in desire and behaviour are to some extent at odds with one other.
Hence maintaining the end-user experience in a server-based infrastructure, has proved difficult, which itself can be seen as limiting adoption of virtual infrastructures.
As a consequence of moving applications from an end-users computer terminal (PC or laptop), into a server hosted environment, the content-focussed experience is made more difficult. This provides an opportunity for a mechanism that optimises the application delivery alongside the end-user experence. Ce)
As mentioned above, in recent years delivery mechanisms have undergone changes. One such delivery mechanism is on-demand local installation. This allows applications to be deployed in real-time to any client from a virtual application server. On-demand local installation removes the need for local installation of the applications. Instead, only a piece of control code needs to be installed on a personal computer. All application data is permanently stored on the virtual application server Whichever software is needed is either streamed or locally cached from an application server on demand and run locally.
Mother delivery mechanism is virtual desktop infrastwctures. So called virtual desktop infrastructure arises when groups of pie-defined users have tended to pool hardware resources and so reduce capital costs of purchase and hire of hardware and software resources.
Specific routers (switches) operating under control of software are used to augment a virtual infrastructure of systems. The virtual infrastructure of systems can be accessed and shared by many users, for example by way of a wide area network (WAN) or a local area network (LAN) connection. Users may not be located in the same building and so share remote facilities, yet their user experience is no different from someone with a direct connection to their n dedicated computeL The major difference is a saving in cost of hardware and maintenance as weff as a saving in licence fees payable for use of software. a)
o Mother is session-based access to server-hosted applications which are a type of (Y) Internet hosting in which the client leases an entire server and does not share this facility with any external user. This is more flexible than shared hosting, as organizations have fUll control over the server(s) hosted and offered, including choice of operating system and hardware. Furthermore maintenance and server administration can usually be provided by the hosting company.
Cloud computing is a term given to a technique that enables users to work in a variety of locations, by accessing remotely stored data and using remote systems, so as to perform a task that was previously done using resources at a desk. There are many advantages in cloud computing, in particular, surety of access to data (by way of alternative data paths as systems are networked), reduced purchase and operational costs, the ability to back-up data in several locations, the capabilities of rapid changes from small to large requirements (and vice versa) and of course flexjbility of access with respect to user location.
Recently the success of so-called doud conipubng has impeded across small user groups, or small numbers of user groups, often referred to as an estate. Practically it is the end result that is usually modelled, rather than the impact of the sum of indMdual computer devices.
Cloud based systems include databases, web servers business applications which can be consobdated and can run side by side -so improvig efficiency. However r they also have separate operating systems -for example Windows (Trade Mark) or r Linux (Trade Math). a)
Prior Art
An example of a virtualized desktop manager is described in US Patent Application US 2003/0189597 (Microsoft Corporation) and describes a method for a user to preview muftiple virtual desktops in a graphical user interface. The method comprises receiving an indication from a user to preview multiple virtual desktops and to display multiple panes on the display.
Aithough successful, the system described did not allocate resources in any predetined or proscribed manner.
The present invention arose to overcome this and provides a system and method to allocate available resources in a flexible and resource efficient manner.
SummarY of the Invention
According to a first aspect of the invention there is provided a method of deliveilng an application which analyses capabilities of a user location; determines accessibility of user content and identifies associated applications and bases a decision made concerning provision of the application to the user and allocates an optimal resource. a)
The optimal resource may be dehvered, for example via the Internet, made available from existing resources, such as pooled resources, purchased, as a bespoke software package or delivered by way of a combination of an application session andlor virtual desktop infrastructure and!or a streaming application.
According to another aspect of the invention there is provided a method of establishing user requirements comprising the steps of determining a number of users; identifying user demand, identifying user content and associated applications and providing applications to the user in an optimised format.
The optimal format may include: selecting software that is available from an open source software provider anclloi-purchasing licences of software packages and/or purchasing bespoke off the shelf' software. Alternatively the optimal format may optimise a software management suite.
According to another aspect of the invention there is provided a database management system including: an optimiser operable in accordance with a plurality of user defined criteria and in conjunction with one or more sub-groups so as to impose one or more predeflned tariffs to users in accordance with demand and licence criteria.
In this latter embodiment the invention selects optimal packages according to cost.
r Alternative criteria may be applied, such as speed, bandwidth, number of users and r scalabibty. a)
It is seen therefore that the system determines whether a particular user, who is demanding access to a resource, which may be software or an application or a specific tool, establishes firstly if that user is authorised for that purpose. If the user is not authorised, the system determines the quickest and/or easiest and/or cheapest manner in which the resource can be delivered. The optimal outcome may be to purchase a temporary or permanent user licence or establish a temporary virtualized resource.
Alternative discrimination criteria may be applied, tar example this may be: the available bandwidth or a limited licence, for example based upon numbers at users, amount of time of total usage time, cumulative data required or a combination of these.
More particularly optimising a computer processor, so as to allocate available resources, comprises the steps of: performing an assessment of resources available to a user group; determining typical usage parameters based upon one or more user criteria; comparing immediate and future demand with usage parameters and delivering a resource so as to satisfy the aforementioned criteria.
Ideally the method takes into consideration one or more of the follcrwing attributes prior to or during the application delivery selection process. r
Preferably the decision is based upon the location of content and so, as part of the delivery process, the available bandwidth and network characteristics of the delivery infra structure are taken into consideration. Ce)
In addition to the location of the content, decisions may also be based upon the location of applications. For example some applications may be present on one or more systems; in which case an application not required by one user may be offered or flagged as available, for use by another user.
Aitematively. or in addition to the foregoing delivery mectianisms, access can be provided, in the form of network connected states, and this may be performed in accordance with a predetermined time andfor cost tariff.
Another variable which may be taken into consideration when determining optimal user access is immediate demand that is being made by existing or potential users on a hosting platform.
Preferably the method takes into consideration user needs, when determining optimal usage is the type of access required. For example some users may only require read access -so called read only consumers; whereas other users may require read and write access, so called producers.
The system can be readily extended to other factors, as are often considered by r suppliers and designers, such as appropriate corporate pohcies and security 1 limitations. For example, specific corporate bulk licences may only permit a limited C) number of concunent users to access a specific application or software package.
o Exceeding pre-set limits may trigger a higher tariff or impose some other penalty, o and as such an IT manager would tend to consider alternative solutions ahead of an C') expensive tariff. Certain other conditions may need to be assessed in order to ascertain whether the user requirement justifies incurring the penalty, and these may be prescribed by an IT manger upon installation ot software managing the system.
Ideally in a network the application exchanges data with one or more further computers via the network.
Mvantageously a set of calculations is performed detailing concurrency values for a predefined group of variables. Statistical techniques -such as Monte Cailo methods can be employed in order to achieve optimal tolerance ranges for concurrency.
A period of time may also be determined1 by when the aforementioned processes, listed within the usage information must have either started or stopped.
It is appreciated that the invention also applies to a database management system including: an optlmiser operable in accordance with a plurality of user defined criteria and in conjunction with one or more sub-groups so as to impose one or more predefined tariffs to users in accordance with demand and lk*nce cnteria. r
An example of one method will n be described, with reference to the Figures, in which: Ce) Brief Desotiotion of the Ficiures Figure 1 illustrates an example of a system of workstations networked in cloud based' local area network (LAN); Figures 2a to 2d are diagrammatical overview of a system and shows examples of hierarchical diagrams that illustrate some key parameters, in the form of RULES; and Figure 3 Is a diagrammatical overview of a system communicating with a wide area network (WAN), a database a server farm and a virtualised office.
Detailed Descriotion of Preferred Embodiment of the Invention RaVening to the Figures, and specifically Figure 1, which shows a four personal computers 10 operating as a virtualised system by way of a cloud computer' host T 20 Which has access to a database 30. The cloud host 20 provides user applications for word processing document in a specific environment that may be C) opened for an end-user at PC terminals ba -lCd using a locafly installed copy of 0 Microsoft WordPad (Trade Mark) software, a copy of Microsoft Word for Windows crrade Mark) sOftware delivered via an application session on a Cftrix (Trade Mark) server farm, or an online word processing application, for example from Google (Trade Mark) Does.
The choice of which to use depends on where the file(s) is/are stored, the user experience; Whether the end-user is connected to the Internet, which may be required for some delivery formats, for example Googie (Trade Mark) Docs and/or a corporate network. In the latter case access to a corporate network may be required for access to the Citrix (Trade Mark) server farm. In general an application running locally on the end-user's machine provides the best interactive and performance capability than any application running remotely.
However, WordPad (Trade Mark) software is less feature-rich and a less desirable application to Microsoft Word (Trade Mark) software. Therefore, the choice may be in favour of a remote application over a local application if connectivity, licensing, bandwidth and other constraints do not negate the benefit of using Word (Trade Mark) software over WordPad (Trade Mark) software. A rule, as shown for example in Figure 2a, may be to enable local WordPad software to be used for read-only access to the content if the user is disconnected from the network. An alternative rule is shown in Figure 2b and this may be applicable to the same user or group of users at the same or at a different time.
Figure 3 illustrates an overview of a system communicating with a wide area networi (WAN) 20, a database 30. a server farm 40 and two examples of a virtualised office 50A and SOB. Ce)
The application delivery selection process, for example as determined by rules in Figure 2. is driven by the configured rules which can be modified by approptiate system administrators; information analysis of the application and determining the network estate. These rules are described in detail below Attributes such as available bandwidth and current demand on the hosting platfbrm are dynamic values which can be monitored and fed into the decision process 60 which is then provided to the manager which oversees the application delivery process 70. Rules of preferred delivery mechanisms given the satisfaction of a set of conditions may be configured by system administrators.
When an end-user ba or lOb requests a document to be opened, the application delivery process 70 runs a decision making process and selects a delivery mechanism for the application. The application is then automatically started, along with any dependent infrastructure that is required, such as starting a virtual machine at a server farm 40 image to deliver the application to the virtual office 50A.
Windows FTA is a static solution with a user centric control. Citrbc content redirection documented here: (httix/lsupcoqt cflrix.comIoroddo/tpoitenpp()5f)-w2k3/os-Pub-content-redireonflo-conceot. vahtm() is a static system with more IT administration and control that allows combinations of local applications and r XenApp hosted applications to host content. a)
It is apparent that the method may be applied locally or over a large area network.
Alternatively dedicated hardware may be provided for use as part of a system and the hardware may be distributed over two or more locations.
The invention has been described by way of example only and with reference to the Figures and it will be appreciated that variation may been made to the embodiments descnbed
GB1116458.9A 2011-09-23 2011-09-23 Management system for delivering an application Withdrawn GB2495081A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB1116458.9A GB2495081A (en) 2011-09-23 2011-09-23 Management system for delivering an application
PCT/GB2012/052320 WO2013041863A2 (en) 2011-09-23 2012-09-20 Dynamic content associations

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1116458.9A GB2495081A (en) 2011-09-23 2011-09-23 Management system for delivering an application

Publications (2)

Publication Number Publication Date
GB201116458D0 GB201116458D0 (en) 2011-11-02
GB2495081A true GB2495081A (en) 2013-04-03

Family

ID=44937748

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1116458.9A Withdrawn GB2495081A (en) 2011-09-23 2011-09-23 Management system for delivering an application

Country Status (2)

Country Link
GB (1) GB2495081A (en)
WO (1) WO2013041863A2 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401238B1 (en) * 1998-12-10 2002-06-04 International Business Machines Corporation Intelligent deployment of applications to preserve network bandwidth
WO2002044892A2 (en) * 2000-11-28 2002-06-06 4Thpass Inc. Method and system for maintaining and distributing wireless applications
US20040193702A1 (en) * 2003-03-31 2004-09-30 Microsoft Corp. System and method of network content location for roaming clients
US20090199175A1 (en) * 2008-01-31 2009-08-06 Microsoft Corporation Dynamic Allocation of Virtual Application Server
US20100153482A1 (en) * 2008-12-10 2010-06-17 Full Armor Corporation Cloud-Based Automation of Resources
US20100268581A1 (en) * 2009-04-16 2010-10-21 Microsoft Corporation Selective enablement of runtime-based application behaviors

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7010755B2 (en) 2002-04-05 2006-03-07 Microsoft Corporation Virtual desktop manager

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6401238B1 (en) * 1998-12-10 2002-06-04 International Business Machines Corporation Intelligent deployment of applications to preserve network bandwidth
WO2002044892A2 (en) * 2000-11-28 2002-06-06 4Thpass Inc. Method and system for maintaining and distributing wireless applications
US20040193702A1 (en) * 2003-03-31 2004-09-30 Microsoft Corp. System and method of network content location for roaming clients
US20090199175A1 (en) * 2008-01-31 2009-08-06 Microsoft Corporation Dynamic Allocation of Virtual Application Server
US20100153482A1 (en) * 2008-12-10 2010-06-17 Full Armor Corporation Cloud-Based Automation of Resources
US20100268581A1 (en) * 2009-04-16 2010-10-21 Microsoft Corporation Selective enablement of runtime-based application behaviors

Also Published As

Publication number Publication date
WO2013041863A3 (en) 2013-10-31
WO2013041863A2 (en) 2013-03-28
GB201116458D0 (en) 2011-11-02

Similar Documents

Publication Publication Date Title
US10817318B2 (en) Multitenant hosted virtual machine infrastructure
RU2598324C2 (en) Means of controlling access to online service using conventional catalogue features
AU2012230866B2 (en) Strong rights management for computing application functionality
US8812687B2 (en) Managing user state of cloud desktops
US8856917B2 (en) Single sign-on for remote desktops
US10095532B2 (en) Providing excess compute resources with virtualization
US20130074064A1 (en) Automated infrastructure provisioning
US20130067345A1 (en) Automated Desktop Services Provisioning
US20130073670A1 (en) Geo-Migration Of User State
US9959113B2 (en) Managing versions of software packages
Brohi et al. Challenges and benefits for adopting the paradigm of cloud computing
Mousa Cloud computing
GB2495081A (en) Management system for delivering an application
Wall Virtualisation and thin client: a survey of virtual desktop environments
Mutavdžić Decision framework for building platform as a service (paas) based government services
Schwertner Public and private autonomous data base cloud.
CN116016424A (en) Method, apparatus, device and computer-readable medium for interacting business data
Suchithra et al. Elements of Cloud Computing: A Perspective on Service Oriented Enterprises (SOEs)
Kaushik Systematic Evaluation of Iaas Including Case Study
Kumar et al. Cloud Computing in IT and Emerging Platforms
Ventresco VMware Horizon View 6 Desktop Virtualization Cookbook
Wani A Comprehensive Methodology for Data Security and Privacy in Cloud Computing Systems
Katzer Why Office 365

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)