Embodiments of the invention relate generally to network traffic analysis and, in particular, to methods and apparatus for automatic determining of service groups within a communications network.
Traditionally, Enterprise managers have had to choose which nodes of an Enterprise network they would consider to migrate to a cloud infrastructure. The nodes are most often members of the Virtual infrastructure. These nodes often work in concert with several other nodes to carry out a business process or function and thus it can be for a combination of nodes to be migrated together to perform the business process or function. The process of choosing which Enterprise nodes must be moved together is tedious and inefficient. It is manually achieved by the Enterprise manager who must take into account the Enterprise nodes reliance on key pieces of infrastructure, such as networks and storage.
Reference will now be made, by way of example only, to specific embodiments and to the accompanying drawings in which:
Methods and systems for migration of one or more nodes of an enterprise to a cloud infrastructure are discussed herein. The system may include an administration console configured to determine a network ontology for at least one node of the enterprise network, the network ontology describing one or more nodes for which the indicated node has a communicates_with relationship. The administration console may also generate a migration group comprising a plurality of nodes of the network ontology and generate a migration configuration file for each node of the migration group.
Specific exemplary embodiments of the invention will now be described with reference to the accompanying drawings. This invention may, however, be embodied in many different forms, and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
It will be understood that when an element is referred to as being “connected” or “coupled” to another element, it can be directly connected or coupled to the other element, or intervening elements may be present. Furthermore, “connected” or “coupled” as used herein may include wirelessly connected or coupled. It will be understood that although the terms “first” and “second” are used herein to describe various elements, these elements should not be limited by these terms. These terms are used only to distinguish one element from another element. Thus, for example, a first user terminal could be termed a second user terminal, and similarly, a second user terminal may be termed a first user terminal without departing from the teachings of the present invention. As used herein, the term “and/or” includes any and all combinations of one or more of the associated listed items. The symbol “/” is also used as a shorthand notation for “and/or”.
Modern enterprise networks are designed and architected for client/server computing, as well as peer to peer communication. A host computing machine may attach itself to a modern enterprise network and establish itself on the enterprise utilizing no more than a non-authenticated physical connection.
In one embodiment of the invention, a system and method by which software agents could be deployed to nodes within an enterprise network. The agents were used to determine collaborative relationships between the nodes. Various embodiments of the agent and an exemplary process for installing it are described in the following subsections. Further details of the agents are provided in the above referenced patent applications.
The agent could be remotely distributed from a single hardware platform to one or more nodes within an enterprise network. The agent could be installed in stages and each stage can be selected with the characteristics of that node in mind. The configuration at any given node could comprise an observation functionality, an analysis functionality, a reporting functionality, a remediation functionality or some subset of those functionalities.
The platform or AC 130 has at least the following elements: a user interface 131, an application server 132, a mapper 133, JDBC/SQL 134, database 135 and AC communication module 136. JDBC is an API for the Java programming language that defines how a client may access a database. JDBC is oriented towards relational databases and provides methods for querying and updating data in a database. SQL, referred to as Structured Query Language, is a database computer language designed for managing data in relational database management systems (RDBMS). The AC 130 propagates an agent, described in more detail below, to the various network nodes via the data transmission medium. The agent may be propagated and instantiated in stages so as to first cause a receiving network node to install the core aspect or core engine of the agent prior to instantiating other modules of the agent. The installation may be designed to be transparent to the user, with the core engine being hooked into the stack of the operating system of the node. This installation thus yields the disposition of the core engine and stealth kernel driver as shown in each of nodes 110 and 120.
Once the core engine component is installed, the AC 130 may send a communication module component that enables data traffic to be conveyed or communicated to and/or from that network node. These components are shown as the node communication modules in each of nodes 110 and 120. Collectively, the core engine, the node communication module, and the additional modules described below comprise a set of functional modules.
Once the node communication module is installed, the AC can forward one or more additional agent modules to the node. Examples of types of modules will be described below. Each such module can be designed to receive data packets intercepted between an adapter driver and a protocol layer of the node's operating system and then analyze the data packets to determine whether they are indicative of some activity or behavior of interest.
In one embodiment, the user interface of the AC will present a security dashboard to an operator. The dashboard will facilitate operator actions intended to remotely install, execute, report on and manage the state of the enterprise from a single geographic location. In one embodiment, an enterprise IT infrastructure environment, including networks of computer entities consisting of physical and/or virtual machines located at network nodes, may be advantageously described via an ontology that describes the operational usage and current state of the entities rather than being based on a fixed IT infrastructure architecture. The ontological description may be automatically and dynamically updated based on data acquired from data collection agents deployed to the nodes of the network. The data collection agents observe communicative relationships based on connections between nodes in operational use, while annotating a class state. Using the ontological description, a network analyst or system operator may be provided with an improved ability to analyze network traffic.
The ontological description may be automatically and dynamically updated based on data acquired from data collection agents deployed to the nodes of the network. The data collection agents observe communicative relationships based on connections between nodes in operational use, while annotating a class state. Using the ontological description, a network analyst or system operator may be provided with an improved ability to analyze network traffic.
Advantageously, data relating to actual connections may be acquired automatically in near real time. For example, an actual connection may be monitored in an interrupt-driven way while collecting information regarding an application that made the connection. Moreover a “volume for the connections” may be derived.
A software based data collection agent may be received by a computing device at a node within a communications network. The agent may be distributed to one or more nodes from a central node, e.g. the administration console 130, via the network. Once the software based data collection agent is received, it may be inserted in an operating system of the receiving node. Advantageously, the agent may be inserted in the kernel of the operating system or in a user space (i.e., an area in virtual memory of a computer that contains user applications that execute at the application layer). The installation may be such that it is transparent to, or undetected by a user of the node. The installed data collection agent may monitor data packet traffic between an adaptive driver layer and a protocol layer and report results of the monitoring to the central node.
In one example, the data collection agent may have an interface to an operating system's network stack and may periodically determine what applications are using the network stack. Thereby the data collection agent may track information regarding a network connection, the connection duration, and any applications and systems involved in the connection. Moreover, the data collection agent may normalize the foregoing information and report it to an administration console so that different operating systems may be correlated by the administration console.
As a further example, the data collection agent may include a network filter inserted into the network stack to determine exactly when a connection is made between entities. The filter component of the data collection agent may be inserted at one or more layers of the OSI model. For example a data collection agent may have filter interface at the transport layer and/or a filter interface at the network layer. Thereby, the data collection agent may track information regarding a network connection, the connection duration, and any applications and systems involved in the connection. Moreover, the data collection agent may normalize the foregoing information and report it to the administration console so that different operating systems may be correlated by the administration console.
As a yet further example, the data collection agent described in the preceding paragraph may also include a packet filter inserted into the network stack to track connection data. For example, a data collection agent may have a filter interface at the data link layer. Then, the data collection agent may correlate and normalize (if required) data from the network filter and the packet filter to track information regarding the network connection, the connection duration, any applications and systems involved in the connection, connection status and connection resource usage information. Moreover, the data collection agent may normalize the foregoing information and report it to the administration console so that different operating systems may be correlated by the administration console.
Referring now to
System 100 may comprise an application server 101, which interacts across a network with a number of data collection agents 500 deployed in various nodes of the network. Advantageously, application server 101, may be an element of the administrative console (AC) 130 (
Data collection agents 500, as described hereinabove, may be deployed onto network nodes including physical and/or virtual machines in an enterprise IT infrastructure environment. After such deployment, application server 101 receives messages from data collection agents 500. These messages may include data representing, for example, state and relationship information about the network nodes, configuration information related to the IT infrastructure, performance/utilization data and network communication.
The received messages may be initially handled by EJB module 612. For example, message driven EJB 623 may initially inspect a received message. A received message relating to network traffic or node status may be forwarded by message driven EJB 623 to the Business Logic EJB 624. Business Logic EJB 624 may call Network Traffic Analysis Engine 625 for messages relating to network traffic. Alternately, “infrastructure messages” (i.e., those relating to node status) may be forwarded directly to the State and Profiling Engine 626.
Messages forwarded to the state and profiling engine 626 may there undergo sorting and processing. The state and profiling engine 626, for example, may identify the entities within the IT Infrastructure as well as their dependency on one another, based on messages received from the platform. In addition, state and profiling engine 626 may perform further processing to determine the state of one or more entities. State may be based on a threshold that has been defined, for example, by the system administrator. The threshold may consist of a metric that either exceeds or underperforms in a specific area of interest to the system administrator. An example would be where a server in a network is exceeding a specified CPU utilization percentage.
A data output from state and profile engine 626 may be sent via signal flow paths 607 and 601 to ontological description creation engine 613. Initially, the data may be handled by Resource Description Framework (RDF) API knowledge base 620 where the data is categorized and stored utilizing a predefined entity relationship, determined by the Web Ontology Language (OWL) API 621. OWL is a family of knowledge representation languages for authoring ontologies which are a formal representation of the knowledge by a set of concepts within a domain and the relationships between those concepts. Ontologies are used to reason about the properties of that domain, and may be used to describe the domain.
Messages handled by the Network Traffic Analysis Engine 625 may include source-to-destination data, qualified by a communicating application within the operating system of the originating node, as well as frequency of communication information. This data is analyzed by processing the number and type of connections to determine if an ontological “communicates_with” relationship exists. A determination may be made by tracking the number of connections of a specific application over a period of time. The period of time may be a system default time or may be preselected, for example, by the system administrator. Importantly, by analyzing such data as source-to-destination data, “communicates_with” relationships can be revealed between two or more nodes even where there is no direct architectural relationship between those nodes.
The system automatically creates a service group for any ontology with a “communicates_with” relationship. The inference is also automatic and performed by the SPARQL engine. This is instantiated by a user request to search for like service groups. Messages handled by the Network Traffic Analysis Engine 625 may include source-to-destination data, qualified by a communicating application within the operating system of the originating node, as well as frequency of communication information. This data is analyzed by processing the number and type of connections to determine if an ontological “communicates_with” relationship exists. A determination may be made by tracking the number of connections of a specific application over a default period of time.
A data output from network traffic analysis engine 625 may be sent via signal flow paths 608 and 602 to ontological description creation engine 613. Initially, the data may be handled by RDF API Knowledge base 620 where the data is categorized and stored utilizing a predefined entity relationship, determined by an OWL API 621. For example, the OWL API 621 may define what entity classes exist, their possible relationship to each other, and their possible state.
Referring now to
The enterprise nodes of the system 100 may be comprised of nodes within a local area network, remote nodes and nodes within a cloud infrastructure that communicate with the enterprise network on an internet connection via a proxy server. An embodiment of the network structure is depicted in
The enterprise network 14 may include a Network Address Translation module 26 that provides network address translating functions for all inbound and outbound internet communications with the entities within the enterprise network 14. The enterprise network 14 further comprises an application server including an administration console as described above. The application server communicates with agents on a plurality of physical and virtual machines within the enterprise network as well as communicating with nodes provided within a cloud infrastructure.
The cloud infrastructure 28 may also include a NAT module 29 for controlling internet communications to nodes within the cloud 28.
From time to time, it can be desirable or necessary to migrate virtual machine nodes and/or groups of nodes within the enterprise network to a computing cloud and/or to migrate nodes already within the cloud. Ordinarily, an Enterprise manager would use the network architecture to manually determine nodes to migrate to a cloud infrastructure. The network architecture describes only direct relationships between nodes. A problem with this approach is that it cannot account for indirect communication relationships. In the method of the present disclosure, a network ontology that includes indirect communications relationships is used to determine the most suitable nodes for migration to the cloud.
The Agent system and the Ontological description of the network may be used to assist administrators in migrating one or more virtual machine nodes or service groups of nodes to, or within, a Private or Public cloud while maintaining or exceeding the service group's service level. The system may provide a complete accounting of the selected Service group (dependencies, communication relationships, & Service Tiers) to facilitate its migration to the cloud infrastructure.
An exemplary method for migrating one or more nodes to the cloud may be performed by the Jena engine 622 and is discussed in more detail in conjunction with
Referring to
An exemplary method for determining nodes to migrate may be performed by the Jena engine 622 and is depicted in
Referring to
In one embodiment, the candidates for migration are virtual machines of the enterprise network. The virtual machines may be ranked by one or more performance parameters. The virtual machines may also be ranked by a virtual machine state.
In one embodiment, the candidates for migration are nodes that make up a Business Application Service Group. A user may define a business process application service group by indicating a primary application including one or more executables of the primary application that are executed on a particular virtual machine. The system can then determine the business application service group for that primary application by determining all of the communicates_with relationships for that primary application, such as the source-to-destination communications of the executables.
In one embodiment, SPARQL Engine provides a list of candidate service groups for cloud migration by parsing the service group ontologies for service groups that are comprised entirely of virtual machines, or alternatively, service groups that are comprised of virtual machines and physical machines that can be converted to virtual machines.
In one embodiment, the SPARQL Engine provides a list of Candidate node, Service Group, or business application service groups by utilizing Network Device threshold settings and state information. A node, Service Group, or BASG that has remained in a Normal State while the Network Device that provides a dependency on the node has been unreliable, e.g. has achieved more than 5 High Warning State indications in a 24 hour period, is provided as a candidate(s) for migration.
In one embodiment, the SPARQL Engine provides a list of Candidate nodes, Service Group, or BASG by utilizing Configuration Drift state information of the component nodes of a Service Group or BASG. A node that has not achieved a Configuration Drift state change over a predetermined period, such as the last 30 days, makes the component node an ideal candidate for migration.
While distinct methods for determining candidates for migration have been described, a person skilled in the art will understand that a combination of these methods may be simultaneously employed.
In addition, while automatic recommendations can be provided to the user, the user may also be able to make manually formed migration groups. Using the web application 111, an inventory list of nodes may be displayed to the user as shown in an inventory view 70 of
In an alternative embodiment, the interface may allow the user to directly select the service group, rather than a specific member or virtual machine within the service group.
In a further alternative embodiment, the system may allow a user to define a primary application including one or more executables of the primary application. The system can determine source-to-destination relationships for those executables to determine all of the nodes that relate to the primary application. An example of a primary application is an email service, or similar business process application. The nodes that have a communicates_with relationship with the primary application are considered to form a Business Process Application Service Group. A Business Process Application Service Group can be defined by the user, e.g. by indicating the primary application. Alternatively, a Business Process Application Service Group can be automatically detected by the system as described above.
The identification of service groups, either directly or indirectly, allows the user to conveniently and efficiently determine how nodes are related to each other so that all nodes that have to be migrated to the cloud structure or infrastructure can be readily identified.
Once the nodes to be migrated have been identified, migration agents are configured for each node of the migration group. Configuration includes deploying an agent to the node, including updating an existing agent, and establishing communications between the node and the enterprise network. The node with the updated agent is then migrated to a cloud infrastructure and the agent re-establishes communication between the migrated node and the enterprise network. Once the migration agents have been configured, migration of the migration group can then be performed.
When the user selects a migration option for the selected group of nodes, the Rules Engine 626 executes a predefined migration routine, depicted by
Referring to
Each agent within a member of the migration group is configured with a cloud migration module (block 403). In one embodiment, the software agents described previously may be pre-configured with a cloud migration module that is initially inactive or disabled. In the above example, setting the “.EnableCloudModules” field to a value of “TRUE”, activates the cloud migration module for that agent. In an alternative embodiment, a specific cloud migration agent may be sent to each node that is to be migrated.
The agent is provided with the network configuration information, including communications relationships, derived from the ontology as well as service tier configuration information. At block 404 the node/s is/are migrated to the relevant cloud infrastructure. The “migration-configuration” file is received by the cloud infrastructure and used to instantiate the migrated nodes within the computing cloud, including assigning CPU and memory, installing applications, and determining service level agreements. The service tier indicated in the migration-configuration file provides a summary of the service requirements of the nodes and may be used for generating a service level agreement (SLA) with the private of public computing cloud provider.
In one embodiment, migration may be accomplished by the system “Cloning” the Virtual Images of all Virtual Machines in a migration Group. The cloned Virtual Machines may be presented to the user in the formats that are in the data store within the Virtual Infrastructure. For example, rhe cloned Virtual Machines may be stored in a Virtual machine Disk (VMDK), Virtual Desktop Infrastructure (VDI), or one of several standard Virtual Machine file formats. For example, if the Virtual machines on the Data store are VMWARE ESX infrastructure VMs, they will be gathered by the AC web server Agent and stored as “VMDK files with associated “VMX” updated configurations. The names of the VMs may be changed to their enterprise node names. These files are transported to the user via the Web browser “save as” function where the user will archive them and send them to the cloud infrastructure via whatever mechanism is provided by the cloud provider.
At block 405, the agent, after migration, processes the migration configuration file to establish service tiers within the cloud infrastructure and to re-establish communication paths with any migrated and non-migrated nodes that the node previously had communication relationships with. Connections to migrated nodes may be achieved by the Agent setting the external dependencies based on data from the Virtual Machine's migration-configuration file. The Agent sends a registration to the external dependency nodes listed in the migration-configuration file and a connection is complete once registration has occurred. Similarly, connections to non-migrated nodes may be performed by the agent by setting the local dependencies.
After migration, the Rules Engine 626 communicates with a local Master Agent to send outbound messages to the migrated VM Agents requesting those agents respond. The Rules Engine 626 listens for incoming messages on a series of local TCP/IP Sockets that confirm that the migrated agents are active and communicating utilizing the pre-configured network configuration.
As described above, in one embodiment, nodes can be selected for migration based on performance data. An EJB is created to gather the nodes and node dependency on the infrastructure to assemble Cloud Migration Service Groups. The EJB is sent to the state and profiling engine that formulates a query to the database of all known Enterprise nodes in inventory. The Inventory list is sent as a query to the SPARQL Engine and the SPARQL Engine gathers all node relationship data from the knowledge base contained in the RDF Framework.
The node relationships may be contained as Generic Service Groups in both categorized and un-categorized form. Performance metrics for the Service groups is retrieved from the state and profiling engine 626. The Service groups are then ranked based on their performance level. Performance metrics may include CPU usage, memory utilization, disk utilization, network utilization. Other suitable parameters will be apparent to a person skilled in the art. The elements are correlated and a ranked list of service groups are provided to the user with a list of dependent key infrastructure elements required for the service groups to perform their business process or function.
From this ranked list, the user is able to view the information that allows the user to decide the Service Groups that are most important to be migrated. In one embodiment, the ranking may include state, with high alert states being shown as strong migration candidates. The migration of service groups that have a high alert state to the computing cloud means that these service groups can continue to operate in a less stressed computing environment. For example, a memory alert can be relieved by allocating more memory to the service group in the computing cloud environment.
In the Inventory View example 70 of
The above described interfaces provide an easy cloud migration tool by allowing a user to select the nodes to be migrated, after which the system takes care of migrating the nodes, re-establishing communication relationships between migrated nodes and non-migrated nodes, configuring service level agreements with the cloud, etc. In addition, performance monitoring tools can be provided to the migrated VMs to ensure that performance of the VM is maintained after migration. The selection of the nodes to be migrated is enhanced by presenting the user with a list of nodes ranked by their current performance metrics.
To facilitate the migration of the nodes and/or Service groups, the software agent may be provided with modules for VM performance, identification, & allocation Information. These modules may then be used to reconfigure the network configurations of the migrated VMs to re-establish storage, peer, and admin console communication.
The VM Performance Module instructs the Agent to monitor the performance of a migrated Virtual Machine by obtaining performance metrics from the Virtual Machine's 0/S through standard O/S APIs. The identification and allocation information is gathered by the module accessing the system registry. Allocation information is information of the Virtual Machine Inventory and may include:
Applications;
Services;
Users;
Groups;
Network Devices;
Local Disk volumes;
OS version and patch level;
Peripheral devices; and
Network connections and traffic analysis.
This information is used to inform the user as to the health of a VM once migrated to determine if the Virtual Machine is still viable. The user may be notified using configuration baseline drift alerts. Configuration drift alerts can be determined by comparing a current configuration to the previously generated configuration for that node. Where differences in the configuration are reported, a configuration drift alert that details those differences is generated. The alert may include a Node ID and a time at which the configuration change was detected. In one embodiment, the configuration drift alert details a configuration change relative to the last reported configuration, rather than relative to the assigned baseline, so that changes in the performance of the system can be directly correlated with the specific configuration changes that caused the performance to be affected. In an alternative embodiment, the configuration drift alert may show changes between the current configuration and the assigned baseline. The configuration drift alert may be generated only the first time that a particular variation from the baseline is detected. This prevents an alert from being generated every time the configuration is reported by the agent at the node while the particular variation persists.
The configuration drifts can be detected at the administration console by analyzing the configuration messages that are periodically received from the agents deployed at the nodes. The administration console may then generate various visualizations that allow a user to determine if the root cause of a system performance change resulted from an application or configuration change. Further the system may indicate what impact these changes have on a group of nodes that perform a specific business process. For example, the impact of a change may be manifested in a resulting change in service tier threshold indicators for cpu, memory, storage, network and uptime. A change in configuration that has a resulting increase in demand on a given node may result in a manifested change in the nodes uptime to the overall business application.
The exemplary computer system 1000 includes a processing device 1002, a main memory 1004 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.), a static memory 1006 (e.g., flash memory, static random access memory (SRAM), etc.), and a secondary memory 1016 (e.g., a data storage device), which communicate with each other via a bus 1008.
Processing device 1002 represents one or more general-purpose processing devices such as a microprocessor, central processing unit, or the like. More particularly, the processing device 1002 may be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, processor implementing other instruction sets, or processors implementing a combination of instruction sets. Processing device 1002 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. Processing device 1002 is configured to execute instructions 1026 for performing the operations and steps discussed herein.
The computer system 1000 may further include a network interface device 1022. The computer system 1000 also may include a video display unit 1010 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)), an alphanumeric input device 1012 (e.g., a keyboard), a cursor control device 1014 (e.g., a mouse), and a signal generation device 1020 (e.g., a speaker).
The secondary memory 1016 may include a machine-readable storage medium (or more specifically a computer-readable storage medium) 1024 on which is stored one or more sets of instructions 1026 embodying any one or more of the methodologies or functions described herein. The instructions 1026 may also reside, completely or at least partially, within the main memory 1004 and/or within the processing device 1002 during execution thereof by the computer system 1000, the main memory 1004 and the processing device 1002 also constituting machine-readable storage media.
The machine-readable storage medium 1024 may also be used to store software performing the operations discussed herein, and/or a software library containing methods that call this software. While the machine-readable storage medium 1024 is shown in an exemplary embodiment to be a single medium, the term “machine-readable storage medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “machine-readable storage medium” shall also be taken to include any medium that is capable of storing or encoding a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present invention. The term “machine-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media.
Some portions of the detailed description above are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “receiving”, “determining”, “encrypting”, “decrypting”, “sending” or the like, refer to the actions and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (e.g., electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage devices.
Embodiments of the invention also relate to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the required method steps. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the invention as described herein.
It is to be understood that the above description is intended to be illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reading and understanding the above description. Although the present invention has been described with reference to specific exemplary embodiments, it will be recognized that the invention is not limited to the embodiments described, but can be practiced with modification and alteration within the spirit and scope of the appended claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense. The scope of the invention should, therefore, be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
This application is a continuation of U.S. patent application Ser. No. 12/905,645, filed Oct. 15, 2010. This application relates to applications: U.S. patent application Ser. No. 11/767,173, filed on Jun. 22, 2007, now U.S. Pat. No. 8,191,141, issued May 29, 2012, U.S. patent application Ser. No. 11/867,456, filed on Oct. 4, 2007, now U.S. Pat. No. 8,336,108, issued Dec. 18, 2012, and U.S. patent application Ser. No. 12/626,872, filed on Nov. 27, 2009, now U.S. Pat. No. 8,429,748, issued Apr. 23, 2013. This application further relates to the Applicant's applications U.S. patent application Ser. No. 12/905,565, filed on Oct. 15, 2010, issued as U.S. Pat. No. 8,825,838: titled “Identification of business process application service groups”; U.S. patent application Ser. No. 12/905,688, filed on Oct. 15, 2010, issued as U.S. Pat. No. 8,938,489: titled “Monitoring system performance changes based on configuration modification”; U.S. patent application Ser. No. 12/905,761, filed on Oct. 15, 2010, issued as U.S. Pat. No. 8,656,009: titled “Indicating an impact of a change in state of a node”; U.S. patent application Ser. No. 12/905,850, filed on Oct. 15, 2010, issued as U.S. Pat. No. 9,426,024: titled “Establishing communication between enterprise nodes migrated to a public cloud and private enterprise infrastructure”; and U.S. patent application Ser. No. 12/905,879, filed on Oct. 15, 2010, issued as U.S. Pat. No. 8,156,378: titled “System and method for determination of the root cause of an overall failure of a business application service”. The entire contents of each of the above mentioned applications are specifically incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5440719 | Hanes et al. | Aug 1995 | A |
6513059 | Gupta et al. | Jan 2003 | B1 |
6658465 | Touboul | Dec 2003 | B1 |
6836800 | Sweet et al. | Dec 2004 | B1 |
6871223 | Drees | Mar 2005 | B2 |
6901442 | Schwaller et al. | Mar 2005 | B1 |
7082463 | Bradley et al. | Jul 2006 | B1 |
7181769 | Keanini et al. | Feb 2007 | B1 |
7356679 | Le et al. | Apr 2008 | B1 |
7409719 | Armstrong et al. | Aug 2008 | B2 |
7546598 | Blumenthal et al. | Jun 2009 | B2 |
7571349 | Levidow et al. | Aug 2009 | B2 |
7600259 | Qi | Oct 2009 | B2 |
7624172 | Austin-Lane | Nov 2009 | B1 |
7698545 | Campbell et al. | Apr 2010 | B1 |
7761917 | Kumar | Jul 2010 | B1 |
7769720 | Armington | Aug 2010 | B2 |
7774498 | Kraemer et al. | Aug 2010 | B1 |
7793162 | Mock et al. | Sep 2010 | B2 |
7826602 | Hunyady et al. | Nov 2010 | B1 |
7877781 | Lim | Jan 2011 | B2 |
7886294 | Dostert et al. | Feb 2011 | B2 |
7890318 | Castellani et al. | Feb 2011 | B2 |
7949404 | Hill | May 2011 | B2 |
7953696 | Davis et al. | May 2011 | B2 |
7962738 | Zimmer et al. | Jun 2011 | B2 |
7975058 | Okmianski et al. | Jul 2011 | B2 |
7987359 | Kawano et al. | Jul 2011 | B2 |
7996836 | McCorkendale et al. | Aug 2011 | B1 |
8043785 | Inoue et al. | Oct 2011 | B2 |
8065714 | Budko et al. | Nov 2011 | B2 |
8098658 | Ranganathan et al. | Jan 2012 | B1 |
8102781 | Smith | Jan 2012 | B2 |
8104458 | Hoffman | Jan 2012 | B2 |
8127290 | Suit | Feb 2012 | B2 |
8145760 | Dinda et al. | Mar 2012 | B2 |
8156378 | Suit | Apr 2012 | B1 |
8161475 | Araujo et al. | Apr 2012 | B2 |
8185442 | Kiran Vedula | May 2012 | B2 |
8191141 | Suit | May 2012 | B2 |
8234377 | Cohn | Jul 2012 | B2 |
8250182 | Frank et al. | Aug 2012 | B2 |
8295277 | Vadlakonda et al. | Oct 2012 | B2 |
8336108 | Suit | Dec 2012 | B2 |
8356353 | Futoransky et al. | Jan 2013 | B2 |
8396946 | Brandwine et al. | Mar 2013 | B1 |
8429748 | Suit | Apr 2013 | B2 |
8478878 | Freimuth et al. | Jul 2013 | B2 |
8539570 | Sharma et al. | Sep 2013 | B2 |
8550442 | Philippe | Oct 2013 | B2 |
8560671 | Yahalom et al. | Oct 2013 | B1 |
8656009 | Suit | Feb 2014 | B2 |
8656219 | Suit | Feb 2014 | B2 |
8850423 | Barkie et al. | Sep 2014 | B2 |
8850442 | Davis et al. | Sep 2014 | B2 |
9043785 | Suit | May 2015 | B1 |
20030014626 | Poeluev | Jan 2003 | A1 |
20030046586 | Bheemarasetti et al. | Mar 2003 | A1 |
20030084329 | Tarquini | May 2003 | A1 |
20030101245 | Srinivasan et al. | May 2003 | A1 |
20030120935 | Teal et al. | Jun 2003 | A1 |
20030145225 | Burton et al. | Jul 2003 | A1 |
20030158983 | Dalakuras et al. | Aug 2003 | A1 |
20030177112 | Gardner | Sep 2003 | A1 |
20030182597 | Coha et al. | Sep 2003 | A1 |
20030225876 | Oliver et al. | Dec 2003 | A1 |
20040122937 | Huang et al. | Jun 2004 | A1 |
20040133672 | Bhattacharya et al. | Jul 2004 | A1 |
20050010765 | Swander et al. | Jan 2005 | A1 |
20050044206 | Johansson et al. | Feb 2005 | A1 |
20050102529 | Buddhikot et al. | May 2005 | A1 |
20050125503 | Iyengar et al. | Jun 2005 | A1 |
20050125520 | Hanson et al. | Jun 2005 | A1 |
20050240558 | Gil et al. | Oct 2005 | A1 |
20050240606 | Edelstein et al. | Oct 2005 | A1 |
20050268298 | Hunt et al. | Dec 2005 | A1 |
20050289648 | Grobman et al. | Dec 2005 | A1 |
20060023638 | Monaco et al. | Feb 2006 | A1 |
20060036426 | Barr et al. | Feb 2006 | A1 |
20060037072 | Rao et al. | Feb 2006 | A1 |
20060041885 | Broquere et al. | Feb 2006 | A1 |
20060069768 | Wen et al. | Mar 2006 | A1 |
20060074833 | Gardner et al. | Apr 2006 | A1 |
20060123133 | Hrastar | Jun 2006 | A1 |
20060136720 | Armstrong et al. | Jun 2006 | A1 |
20060156380 | Gladstone et al. | Jul 2006 | A1 |
20060195715 | Herington | Aug 2006 | A1 |
20060230134 | Qian et al. | Oct 2006 | A1 |
20060271395 | Harris et al. | Nov 2006 | A1 |
20070011667 | Subbiah et al. | Jan 2007 | A1 |
20070043860 | Pabari | Feb 2007 | A1 |
20070058551 | Brusotti et al. | Mar 2007 | A1 |
20070061382 | Davis et al. | Mar 2007 | A1 |
20070073882 | Brown et al. | Mar 2007 | A1 |
20070083506 | Liddell et al. | Apr 2007 | A1 |
20070118394 | Cahoon | May 2007 | A1 |
20070130566 | van Rietschote et al. | Jun 2007 | A1 |
20070147271 | Nandy et al. | Jun 2007 | A1 |
20070169121 | Hunt et al. | Jul 2007 | A1 |
20070180081 | Okmianski et al. | Aug 2007 | A1 |
20070198656 | Mazzaferri et al. | Aug 2007 | A1 |
20070204153 | Tome et al. | Aug 2007 | A1 |
20070204347 | Caceres et al. | Aug 2007 | A1 |
20070220121 | Suwarna | Sep 2007 | A1 |
20070234412 | Smith et al. | Oct 2007 | A1 |
20070234425 | Kim et al. | Oct 2007 | A1 |
20070238524 | Harris et al. | Oct 2007 | A1 |
20070261112 | Todd et al. | Nov 2007 | A1 |
20080005124 | Jung et al. | Jan 2008 | A1 |
20080016115 | Bahl et al. | Jan 2008 | A1 |
20080016570 | Capalik | Jan 2008 | A1 |
20080047009 | Overcash et al. | Feb 2008 | A1 |
20080056487 | Akyol et al. | Mar 2008 | A1 |
20080089338 | Campbell et al. | Apr 2008 | A1 |
20080126856 | Levidow et al. | May 2008 | A1 |
20080134175 | Fitzgerald et al. | Jun 2008 | A1 |
20080140795 | He et al. | Jun 2008 | A1 |
20080184225 | Fitzgerald et al. | Jul 2008 | A1 |
20080256010 | Moran et al. | Oct 2008 | A1 |
20080263658 | Michael et al. | Oct 2008 | A1 |
20080270049 | Kim et al. | Oct 2008 | A1 |
20080270104 | Stratton et al. | Oct 2008 | A1 |
20080271025 | Gross et al. | Oct 2008 | A1 |
20080288962 | Greifeneder et al. | Nov 2008 | A1 |
20080320123 | Houlihan et al. | Dec 2008 | A1 |
20080320499 | Suit et al. | Dec 2008 | A1 |
20080320561 | Suit et al. | Dec 2008 | A1 |
20080320583 | Sharma et al. | Dec 2008 | A1 |
20080320592 | Suit et al. | Dec 2008 | A1 |
20090007270 | Futoransky et al. | Jan 2009 | A1 |
20090028053 | Kannan et al. | Jan 2009 | A1 |
20090049453 | Baran et al. | Feb 2009 | A1 |
20090064136 | Dow et al. | Mar 2009 | A1 |
20090089781 | Shingai et al. | Apr 2009 | A1 |
20090119301 | Cherkasova et al. | May 2009 | A1 |
20090172666 | Yahalom et al. | Jul 2009 | A1 |
20090182880 | Inamdar et al. | Jul 2009 | A1 |
20090182928 | Becker et al. | Jul 2009 | A1 |
20090183173 | Becker et al. | Jul 2009 | A1 |
20090204701 | Herzog et al. | Aug 2009 | A1 |
20090210427 | Eidler et al. | Aug 2009 | A1 |
20090216816 | Basler et al. | Aug 2009 | A1 |
20090228579 | Sanghvi et al. | Sep 2009 | A1 |
20090228589 | Korupolu | Sep 2009 | A1 |
20090254993 | Leone | Oct 2009 | A1 |
20090293022 | Fries | Nov 2009 | A1 |
20090307689 | Sudhakar | Dec 2009 | A1 |
20090307772 | Markham et al. | Dec 2009 | A1 |
20100011200 | Rosenan | Jan 2010 | A1 |
20100017801 | Kundapur | Jan 2010 | A1 |
20100031258 | Takano et al. | Feb 2010 | A1 |
20100049731 | Kiran Vedula | Feb 2010 | A1 |
20100077078 | Suit et al. | Mar 2010 | A1 |
20100110932 | Doran et al. | May 2010 | A1 |
20100138390 | Lobo et al. | Jun 2010 | A1 |
20100146503 | Tsai et al. | Jun 2010 | A1 |
20100161604 | Mintz et al. | Jun 2010 | A1 |
20100205304 | Chaturvedi et al. | Aug 2010 | A1 |
20100269109 | Cartales | Oct 2010 | A1 |
20100281482 | Pike et al. | Nov 2010 | A1 |
20100287263 | Liu et al. | Nov 2010 | A1 |
20100293544 | Wilson et al. | Nov 2010 | A1 |
20100318609 | Lahiri et al. | Dec 2010 | A1 |
20100332432 | Hirsch | Dec 2010 | A1 |
20110113467 | Agarwal et al. | May 2011 | A1 |
20110126198 | Vike et al. | May 2011 | A1 |
20110126207 | Wipfel et al. | May 2011 | A1 |
20110154329 | Arcese et al. | Jun 2011 | A1 |
20110209140 | Scheldel et al. | Aug 2011 | A1 |
20110225277 | Freimuth et al. | Sep 2011 | A1 |
20110231839 | Bennett et al. | Sep 2011 | A1 |
20110289204 | Hansson et al. | Nov 2011 | A1 |
20120011254 | Jamjoom et al. | Jan 2012 | A1 |
20120054346 | Lee et al. | Mar 2012 | A1 |
20120072968 | Wysopal et al. | Mar 2012 | A1 |
20120096065 | Suit et al. | Apr 2012 | A1 |
20120096134 | Suit | Apr 2012 | A1 |
20120096142 | Suit | Apr 2012 | A1 |
20120096143 | Suit | Apr 2012 | A1 |
20120096171 | Suit | Apr 2012 | A1 |
20120136989 | Ferris et al. | May 2012 | A1 |
20120167214 | Suit | Jun 2012 | A1 |
20120185913 | Martinez et al. | Jul 2012 | A1 |
20120221898 | Suit | Aug 2012 | A1 |
20130055341 | Cooper et al. | Feb 2013 | A1 |
20130060839 | Van Biljon et al. | Mar 2013 | A1 |
20130091496 | Barsness et al. | Apr 2013 | A1 |
20130143522 | Rege et al. | Jun 2013 | A1 |
20130275975 | Masuda et al. | Oct 2013 | A1 |
20140109083 | Scheldel et al. | Apr 2014 | A1 |
20150143366 | Suragi Math et al. | May 2015 | A1 |
Number | Date | Country |
---|---|---|
WO2003055180 | Jul 2003 | WO |
WO2005050414 | Jun 2005 | WO |
WO2005101782 | Oct 2005 | WO |
Entry |
---|
Red Hat Office Action for U.S. Appl. No. 12/905,565, dated Oct. 12, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/905,565, dated Apr. 11, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/905,565, dated Sep. 27, 2013. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/905,565, dated Apr. 18, 2014. |
Red Hat Office Action for U.S. Appl. No. 12/905,645, dated Sep. 13, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/905,645, dated Mar. 26, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/905,645, dated Nov. 18, 2015. |
Red Hat Office Action for U.S. Appl. No. 12/905,688, dated Oct. 4, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/905,688, dated Feb. 27, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/905,688, dated Mar. 18, 2014. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/905,688, dated Sep. 10, 2014. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/905,645, dated Feb. 10, 2017. |
Red Hat Office Action for U.S. Appl. No. 12/905,761, dated Oct. 22, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/905,761, dated Apr. 11, 2013. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/905,761, dated Oct. 4, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/905,850, dated Dec. 6, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/905,850, dated Jul. 30, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/905,850, dated Feb. 18, 2014. |
Red Hat Office Action for U.S. Appl. No. 12/905,850, dated Sep. 29, 2014. |
Red Hat Office Action for U.S. Appl. No. 12/905,850, dated Jun. 3, 2015. |
Red Hat Office Action for U.S. Appl. No. 12/905,850, dated Dec. 22, 2015. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/905,850, dated Apr. 21, 2016. |
Red Hat Office Action for U.S. Appl. No. 12/905,879, dated Jul. 8, 2011. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/905,879, dated Dec. 8, 2011. |
Red Hat Office Action for U.S. Appl. No. 13/439,803, dated Aug. 31, 2012. |
Red Hat Notice of Allowance for U.S. Appl. No. 13/439,803, dated Feb. 21, 2012. |
Red Hat Office Action for U.S. Appl. No. 11/767,173, dated Jul. 6, 2010. |
Red Hat Office Action for U.S. Appl. No. 11/767,173, dated Dec. 14, 2010. |
Red Hat Notice of Allowance for U.S. Appl. No. 11/767,173, dated Nov. 7, 2011. |
Red Hat Office Action for U.S. Appl. No. 13/408,980, dated Feb. 25, 2013. |
Red Hat Notice of Allowance for U.S. Appl. No. 13/408,980, dated Jun. 12, 2013. |
Red Hat Office Action for U.S. Appl. No. 11/867,456, dated Aug. 1, 2011. |
Red Hat Office Action for U.S. Appl. No. 11/867,456, dated Feb. 16, 2011. |
Red Hat Office Action for U.S. Appl. No. 11/867,456, dated Jan. 19, 2012. |
Red Hat Notice of Allowance for U.S. Appl. No. 11/867,456, dated Jul. 16, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/111,110, dated Mar. 17, 2011. |
Red Hat Office Action for U.S. Appl. No. 12/111,110, dated Aug. 17, 2011. |
Red Hat Office Action for U.S. Appl. No. 12/111,110, dated Jan. 18, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/111,110, dated Jun. 11, 2012. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/111,110, dated Jan. 31, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/626,872, dated Jan. 13, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/626,872, dated May 30, 2012. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/626,872, dated Dec. 20, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/013,304, dated Apr. 13, 2011. |
Red Hat Office Action for U.S. Appl. No. 12/013,304, dated Oct. 4, 2011. |
Red Hat Office Action for U.S. Appl. No. 12/013,304, dated Jul. 25, 2013. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/013,304, dated Sep. 18, 2014. |
Red Hat Office Action for U.S. Appl. No. 12/013,314, dated Jul. 19, 2011. |
Red Hat Office Action for U.S. Appl. No. 12/013,314, dated Mar. 7, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/013,314, dated Sep. 9, 2013. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/013,314, dated Jul. 28, 2014. |
Red Hat Office Action for U.S. Appl. No. 11/867,500, dated Dec. 23, 2010. |
Red Hat Notice of Allowance for for U.S. Appl. No. 11/867,500, dated Jun. 29, 2011. |
Harwood, Aaron, Parallel Virtual Machine, Oct. 22, 2003, pp. 1-5. |
Office Action for U.S. Appl. No. 11/867,456, dated Feb. 16, 2011. |
Office Action for U.S. Appl. No. 11/867,500, dated Dec. 23, 2010. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/626,872, dated May 30, 2012. |
Janiquec, “Virtual Server 2005 R2 Common Issues and Tps—Duplicate MAC Addresses,” Nov. 29, 2007, pp. 1-2, online link: http://msvirt.wordpress.com/2007/11/29/virtual-server-2005-r2-common-issues-and-tips-duplicate-mac-addresses/. |
Gao et al., “A Fast and Generic Hybrid Simulation Approach Using C Virtual Machine,” ACM 978-1-50503-826-8/07/0009 Cases '07, Sep. 30, 2007. |
Magnusson et al., “Simics: A Full System Simulation Platform,” 0018-9162.02, IEEE 2002. |
Red Hat Notice of Allowance for for U.S. Appl. No. 11/867,500, dated Oct. 14, 2011. |
Chen et al., “Design and Implementation of a Large-Scale Context Fusion Network,” Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous '04). |
Red Hat Office Action for U.S. Appl. No. 11/867,456, dated Feb. 19, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/905,688, dated Sep. 11, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,259, dated Jun. 5, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,259, dated Nov. 6, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,259, dated Jul. 3, 2014. |
Red Hat Office Action for U.S. Appl. No. 12/979,259, dated Nov. 13, 2014. |
Red Hat Office Action for U.S. Appl. No. 12/979,259, dated Mar. 12, 2015. |
Red Hat Office Action for U.S. Appl. No. 12/979,259, dated Jul. 23, 2015. |
Red Hat Office Action for U.S. Appl. No. 12/979,259, dated Jan. 19, 2016. |
Red Hat Office Action for U.S. Appl. No. 12/979,259, dated Jun. 28, 2016. |
Red Hat Office Action for U.S. Appl. No. 12/979,255, dated Dec. 27, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/979,255, dated May 3, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,255, dated Jul. 7, 2015. |
Red Hat Office Action for U.S. Appl. No. 12/979,255, dated Nov. 23, 2015. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/979,255, dated Jun. 14, 2016. |
Red Hat Office Action for U.S. Appl. No. 12/979,245, dated Jan. 8, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,245, dated May 24, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,245, dated Jul. 22, 2015. |
Red Hat Office Action for U.S. Appl. No. 12/979,245, dated Nov. 23, 2015. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/979,245, dated Jun. 29, 2016. |
Red Hat Office Action for U.S. Appl. No. 12/979,237, dated Jul. 1, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,237, dated Dec. 3, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,237, dated Apr. 23, 2014. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/979,237, dated Dec. 4, 2014. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/979,237, dated Jun. 25, 2015. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/979,237, dated Jan. 14, 2016. |
Red Hat Office Action for U.S. Appl. No. 12/979,222, dated Dec. 27, 2012. |
Red Hat Office Action for U.S. Appl. No. 12/979,222, datd Jul. 2, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,222, dated Nov. 20, 2015. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/979,222, dated Jun. 29, 2016. |
Red Hat Office Action for U.S. Appl. No. 12/905,645, dated May 6, 2015. |
Red Hat Office Action for U.S. Appl. No. 12/979,229, dated Apr. 4, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,229, dated Jul. 12, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,229, dated Aug. 12, 2013. |
Red Hat Office Action for U.S. Appl. No. 12/979,229, dated Nov. 19, 2015. |
Red Hat Notice of Allowance for U.S. Appl. No. 12/979,229, dated Oct. 19, 2016. |
Number | Date | Country | |
---|---|---|---|
20170277572 A1 | Sep 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12905645 | Oct 2010 | US |
Child | 15620738 | US |