Embodiments of the inventive subject matter generally relate to the field of computers, and, more particularly, to automatically recommending an upgrade approach for a customizable software product.
Some software products, such as IBM® Tivoli Monitoring, can be customized by a customer to fit the customer's unique environment. Customization of a software product can range from specification of new configuration parameters to completely rewritten code modules. Upgrading a customized software product is more complicated than upgrading software in an out-of-the-box configuration. Software vendors typically provide toolkits for upgrading software products in out-of-the-box configurations and may also be able to manage some level of customer customization.
Embodiments include a method directed to comparing an installed software product to an out-of-the-box configuration of the software product. The installed software product comprises a set of one or more installed modules installed on an electronic device. A convenience value is computed that represents convenience of using an automatic upgrade toolkit for upgrading the installed software product. A variance value is computed that represents variance of the one or more installed modules with respect to an out-of-the-box configuration of the software product. The convenience value and the variance value are stored in a machine-readable media. A recommended approach is generated for upgrading the installed software product based, at least in part, on the convenience and variance values.
The present embodiments may be better understood, and numerous objects, features, and advantages made apparent to those skilled in the art by referencing the accompanying drawings.
The description that follows includes exemplary systems, methods, techniques, instruction sequences and computer program products that embody techniques of the present inventive subject matter. However, it is understood that the described embodiments may be practiced without these specific details. In other instances, well-known instruction instances, protocols, structures and techniques have not been shown in detail in order not to obfuscate the description.
Software vendors provide toolkits for automatically upgrading customized software products to new versions. However, the level of customization of a software product can reduce the effectiveness of the automatic upgrade because the toolkit may not be able to fully migrate deeply customized units of code or modules (e.g., functions, procedures, methods, blocks of code, segments of code, class instances, etc.) to the new version. Considerable time is wasted when an upgrade fails after running an automatic upgrade toolkit on a deeply customized environment. In some cases, an environment may comprise a few deeply customized modules and other modules with little to no customization (“mixed environment”). In a mixed environment, the efficiency of using an automatic upgrade toolkit may be unclear. An upgrade analysis unit, for example, implemented as part of an automatic upgrade toolkit, can include functionality to analyze a customized software product and compute a convenience for using the automatic upgrade toolkit. The upgrade analysis unit automatically generates a recommended upgrade approach based on the convenience. The recommended upgrade approach identifies software product modules recommended for automatic upgrade with the upgrade toolkit.
At stage B, the upgrade analysis unit 105 computes a distance between each installed module and a corresponding standard module. The distance quantifies how much an installed module deviates from a corresponding standard module. Installed modules 101 that have not been customized have a distance of 0. In this example, distance, d, is computed with Equation 1 discussed later in reference to
At stage C, the upgrade analysis unit 105 computes an average distance, d, based on the individual distance of each installed module. The average distance is computed in accordance with Equation 2, which is described in more detail later with reference to
At stage D, the upgrade analysis unit 105 determines a convenience, k, of using an automatic upgrade toolkit based on the computed average distance. The convenience is a scalar value that is the difference between the maximum convenience (i.e., for an out-of-the-box configuration) and the average distance. The maximum convenience is 1. Equation 3 expresses the convenience, k.
At stage E, the upgrade analysis unit 105 computes a variance, Var(d). The variance represents the distribution of customization in the installed modules of a software product. Equation 4 expresses the variance, Var(d).
At stage F, the upgrade analysis unit 105 recommends an upgrade approach to an information technology person 107 based on the convenience and variance via a user interface on a computer system. The recommended approach is one of a completely automatic upgrade, a completely manual upgrade and a combination of automatic and manual upgrades. In addition, the recommended approach identifies modules to upgrade automatically and modules to upgrade manually when a mixed approach is recommended. The information technology person 107 uses the recommendation to configure the automatic upgrade toolkit. For example, tile information technology person 107 launches the automatic upgrade toolkit and selects an option for a customized upgrade installation. The automatic upgrade toolkit displays a list of modules to be installed. The information technology person 107 can remove modules to be upgraded manually from the list with various user interface techniques (e.g., un-checking a checkbox next to the module name).
The upgrade analysis unit 105 may be independent of the automatic upgrade toolkit. For example, a software vendor may provide an upgrade analysis tool that is capable of analyzing a plurality of different software products. The upgrade analysis unit 105 may be a plug-in to the automatic upgrade toolkit. For example, the automatic upgrade toolkit analyzes the installed modules 101 to recommend an upgrade approach before starting an upgrade process. In addition, the upgrade analysis 105 unit may be able to configure and/or invoke the automatic upgrade toolkit to upgrade installed modules based on the recommended upgrade approach.
At block 203, a loop for each installed module begins.
At block 205, the installed module is compared with a standard module of an out-of-the-box configuration.
At block 206, it is determined if the installed module has been customized. If the installed module has been customized, flow continues at block 207. If the installed module has not been customized, flow continues at block 208.
At block 207, a distance between the installed module and the corresponding standard module is computed. Since the distance between an installed module that has not been customized and a standard module is by definition 0, it is not necessary to compute distances for installed modules that have not been customized. For example, ITM allows customers to customize resource models (RMs). RMs specify the rules of operation for a resource including operational logging, levels of performance, metrics, etc. Examples of resources are ports, central processing units, etc. The RMs can detect and correct operation errors. The distance for each customized resource module (CRM), dcrm, is computed by Equation 1:
The distance, dcrm, depends on four functions, h(t), i(p), l(e) and m(o). Function h(t) depends on the CRM complexity class. Complexity classes are predefined levels encoded in an upgrade analysis unit. The complexity classes are pre-determined based on a software vendor's experience. Equation 5 expresses the complexity classes.
In this example, there are four complexity classes, but the granularity may be finer (or coarser) in other examples. The parameter q is a tuning parameter that may be refined by either the software vendor or customer. Tuning parameters and initial conditions are defined below. The four complexity classes are:
Level A. The RM is realized with a standard RM; generally only thresholds or parameters are added and the decision logic does not vary from decision logic in a corresponding standard RM.
Level B1. The RM decision logic is completely re-written and the metrics are collected using ITM standard libraries.
Level B2. The RM decision logic is completely re-written and the metrics are collected using specific scripts directly invoked from the decision logic.
Level C. The RM is completely new, both the decision logic and libraries have been developed by the customer.
The more complex the customizations as represented by the functions m(o), l(e), and i(p) become, the closer the multiplier that will be applied to h(t) in the distance equation will be to 1. As the customizations represented by the functions m(o), i(p), and l(e), are closer to standard, then the resulting multiplier that is applied to h(t) will be a smaller fractional multiplier, thus reducing the effect of h(t). The expression captures the relationship between class complexity and the customizable aspects.
The function i(p) depends on a number of profiles that reference the CRM, where p is the number of profiles. A profile comprises one or more RMs that enables simultaneous monitoring of multiple resources. Equation 6 expresses the function i(p).
When the number of profiles increase, in particular when the number is very large, the function increases asymptotically towards l. The parameters n, and i0 are tuning parameters and p0 is an initial condition.
The function l(e) depends on the number of subscribers to each profile referencing the CRM, where e is the number of subscribers. Equation 7 expresses function l(e).
When the number of subscribers increases, in particular when the number is very large, the function increase asymptotically towards l. The parameters m, and l0 are tuning parameters and e0 is an initial condition.
The function m(o) depends on the number of resources in the CRM, where o is the number of resources. Equation 8 expresses the function m(o).
When the number of monitored objects increases, in particular when the number is very large, the function increases asymptotically towards l. It is expected that m(o) has a lower weight on the total convenience because of the values of tuning parameter for exponent, l, given below. The parameters l, and m0 are tuning parameters and o0 is an initial condition.
A first tuning of the equations produces a base for tuning parameters and initial conditions which is expressed in Equation 9.
n=m=l=1
i0=l0=m0=1
p0=e0=o0=200
p=q=2 Equation 9
The functions i(p), l(e) and m(o) correspond to the ITM example. Similar equations can characterize aspects of other software products. One or more functions, perhaps of similar form as i(p), l(e) and m(o), that characterize aspects of particular software products and/or aspects of software products in general can be used in calculating distance. The one or more functions characterize the customizable aspects of the installed modules. Examples of customized aspects include number of profiles referencing a customized module, number of modules referencing the customized module, etc.
At block 208, the loop for each installed module ends.
At block 209, an overall distance is computed based on an average of the individual distances of the CRMs. For example, the overall distance, l, is computed with Equation 2:
Parameter Nrm is the total number of installed RMs. Parameter Ncrm is the number of CRMs. The overall distance takes into account both uncustomized RMs and CRMs.
At block 211, a convenience is computed based on the overall distance. For example, the convenience, k, is computed with Equation 3:
Convenience represents the difference between the maximum convenience of a standard environment and the overall distance. The maximum convenience value is 1. The expression for k, indicated with Equation 3 yields convenience values between 0 and 1.
At block 213, a variance is computed based on the standard deviation of the individual distances of the CRMs. Variance is expressed with the function Var(x), where μ is the expected value and σ is the standard deviation in Equation 10.
μ=E(x)
Var(x)=E((x−μ)2)
σ=√{square root over (Var(x))} Equation 10
Equation 11 expresses variance for a finite population:
In this example, variance, Var(d), is computed in accordance with Equation 4:
The variance characterizes a customized environment and provides a mathematical description of the distribution of customizations over the customized environment. The variance provides an estimate of a percentage of population within the interval of 1σ, 2σ or 3σ from the average value. If a normal distribution can be assumed the estimate is more precise. But the estimate remains valid for a distribution due to Chebyshev's inequality.
Some embodiments may take into account that a distribution may not be symmetric. A measure of the asymmetry of the probability distribution, “skewness,” may be calculated. In most cases, the variance is sufficient to characterize the distribution even though the distribution may not be symmetric.
After the variance and convenience are computed, a recommended upgrade approach is automatically generated. Generation of the recommended upgrade approach can vary with implementation. For example, the upgrade analysis unit can generate the recommended upgrade approach as part of a toolkit or separately. The upgrade analysis unit can communicate the computed variance and convenience to an automatic upgrade toolkit for generation of the recommended upgrade approach.
At block 305, it is determined if convenience is high or low. The thresholds for high or low convenience may be default values or may be specified by a user of an upgrade analysis unit. If convenience is high, flow continues at block 307. If convenience is low, flow continues at block 319.
At block 307, it is determined if variance is high or low. The thresholds for high or low variance may be default values or may be specified by a user of an upgrade analysis unit. If variance is low, flow continues at block 309. If variance is high, flow continues at block 311.
At block 309, use of the automatic upgrade toolkit is recommended for all installed modules and flow ends. In this case, high convenience suggests that a customized environment is close to a standard environment. The low variance implies that each installed module does not vary far from a corresponding standard module and the automatic upgrade toolkit is suitable for upgrading all installed modules.
If variance was determined to be high, then blocks 315 and 317 are performed. At block 315, use of the automatic upgrade toolkit is recommended for one or more installed modules with distances below a threshold. The threshold may be a default value or specified by a user of an upgrade analysis unit. For example, the threshold may be 2 standard deviations above the average distance. Installed modules with distances below the threshold are suitable for being upgraded by the automatic upgrade toolkit.
At block 317, use of the automatic upgrade toolkit is recommended for installed modules with distances above the threshold. Installed modules with distances above the threshold are not suitable for being upgraded by the automatic upgrade toolkit. If convenience was determined to be low at block 305, then it is determined if variance is high or low at block 319. If variance is high, flow continues at block 315. If variance is low, flow continues at block 321.
At block 321, a manual approach is recommended for all installed modules. In this case, low convenience suggests that a customized environment is far from a standard environment. The low variance implies that each installed module does not vary greatly from a corresponding standard module, the low convenience characterization applies to at least a significant number of the installed modules, and the automatic upgrade toolkit is not suitable to upgrade the installed modules of the software product.
It should be understood that the depicted flowchart are examples meant to aid in understanding embodiments and should not be used to limit embodiments or limit scope of the claims. Embodiments may perform additional operations, fewer operations, operations in a different order, operations in parallel, and some operations differently. For instance, referring to
Embodiments may take the form of an entirely hardware embodiment, a software embodiment (including firmware, resident software, micro-code, etc.) in computer storage media or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, embodiments of the inventive subject matter may take the form of a computer program product embodied in any tangible medium of expression having computer usable program code embodied in the medium. The described embodiments may be provided as a computer program product, or software, that may include a machine-readable medium having stored thereon instructions, which may be used to program a computer system (or other electronic device(s)) to perform a process according to embodiments, whether presently described or not, since every conceivable variation is not enumerated herein. A machine readable medium includes any mechanism for storing or transmitting information in a form (e.g., software, processing application) readable by a machine (e.g., a computer). The machine-readable medium may include, but is not limited to, magnetic storage medium (e.g., floppy diskette); optical storage medium (e.g., CD-ROM); magneto-optical storage medium; read only memory (ROM); random access memory (RAM); erasable programmable memory (e.g., EPROM and EEPROM); flash memory; or other types of medium suitable for storing electronic instructions. In addition, embodiments may be embodied in an electrical, optical, acoustical or other form of propagated signal (e.g., carrier waves, infrared signals, digital signals, etc.), or wireline, wireless, or other communications medium. The computer program product may be stored on the computer storage medium associated with one system and downloaded over a communications network to the computer storage medium associated with a second system.
Computer program code for carrying out operations of the embodiments may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on a user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN), a personal area network (PAN), or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
While the embodiments are described with reference to various implementations and exploitations, it will be understood that these embodiments are illustrative and that the scope of the inventive subject matter is not limited to them. In general, techniques for automatically recommending an upgrade approach for a customizable software product as described herein may be implemented with facilities consistent with any hardware system or hardware systems. Many variations, modifications, additions, and improvements are possible.
Plural instances may be provided for components, operations or structures described herein as a single instance. Finally, boundaries between various components, operations and data stores are somewhat arbitrary, and particular operations are illustrated in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of the inventive subject matter. In general, structures and functionality presented as separate components in the exemplary configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements may fall within the scope of the inventive subject matter.
Number | Name | Date | Kind |
---|---|---|---|
5485621 | Schwanke | Jan 1996 | A |
5602993 | Stromberg | Feb 1997 | A |
5758071 | Burgess et al. | May 1998 | A |
5809287 | Stupek, Jr. et al. | Sep 1998 | A |
6260020 | Ruffin et al. | Jul 2001 | B1 |
6282712 | Davis et al. | Aug 2001 | B1 |
6367077 | Brodersen et al. | Apr 2002 | B1 |
6601233 | Underwood | Jul 2003 | B1 |
7055149 | Birkholz et al. | May 2006 | B2 |
7076778 | Brodersen et al. | Jul 2006 | B2 |
7117486 | Wong et al. | Oct 2006 | B2 |
7191435 | Lau et al. | Mar 2007 | B2 |
7203937 | Kyle et al. | Apr 2007 | B1 |
7392522 | Murray et al. | Jun 2008 | B2 |
7398524 | Shapiro | Jul 2008 | B2 |
7496912 | Keller et al. | Feb 2009 | B2 |
7509636 | McGuire et al. | Mar 2009 | B2 |
7526771 | Roman et al. | Apr 2009 | B2 |
7552430 | Napier et al. | Jun 2009 | B2 |
7730123 | Erickson et al. | Jun 2010 | B1 |
7823147 | Moshir et al. | Oct 2010 | B2 |
8060874 | Rengarajan et al. | Nov 2011 | B2 |
8065740 | Rive et al. | Nov 2011 | B2 |
8074217 | James et al. | Dec 2011 | B2 |
8095923 | Harvey et al. | Jan 2012 | B2 |
8146072 | Trueba | Mar 2012 | B2 |
8266211 | Smith et al. | Sep 2012 | B2 |
Entry |
---|
Crameri et al,“Staged deployment in mirage and integrated software upgrade tetsing and distribution system”, ACM SOSP, pp. 221-236, 2007. |
Pukall et al, “JavaAdaptor: unrestricted dynamic software updates for Java”, ACM ICSE, pp. 989-991, 2011. |
Manna, “Dynamic software update for component based distributed systems”, ACM WCOP, pp. 1-8, 2011. |
Samuel et al, “Survivable key compromise in software update system”, ACM CCS, pp. 61-72, 2010. |
Mikael et al., “Preserving the Scholarly Side of the Web”, Proceedings of the Fourth Latin American Web Congress, Oct. 2006, pp. 162-171 (10 pages). |
Number | Date | Country | |
---|---|---|---|
20100257518 A1 | Oct 2010 | US |