This invention pertains generally to application streaming technology, and more specifically to using application streaming to provide central application profiling.
Application streaming provides the ability for an endpoint (e.g., a client computer) to run an application locally that is stored remotely, for example on a server. The server transmits specific portions of the application (e.g., code pages) to the endpoint, as the endpoint needs them. Application streaming offers a number of advantages over running the application on the server. Streaming the application allows the application to execute locally on the endpoint, instead of remotely on the server. This eliminates the need for large farms of servers to provide applications to a plurality of client computers. Application response time to the user is also significantly faster when the application is run locally on the endpoint, as opposed to remotely on the server. Commercial application streaming technology exists today.
Software developers, quality assurance professionals and publishers have a strong interest in knowing how their software programs are actually used in the field. Data on which features of a software program are popular, which are never utilized, which confuse users, which cause the application to crash, etc., are clearly an asset in the design, implementation, testing, trouble shooting and marketing of existing and planned software programs. It is currently difficult to obtain reliable information of this nature for a wide variety of representative users.
It would be desirable to be able to glean accurate profiling data concerning application usage for a wide variety of users.
Application usage is profiled based on application streaming. Code pages of multiple applications are streamed from a server to multiple client computers (endpoints) for execution. The streaming of the code pages is monitored, and usage data is collected such as which pages are streamed to which endpoints, under what circumstances and when. By referencing the streamed code pages and the underlying source code, the code pages are mapped (at least approximately) to corresponding application features. The collected usage data usage and the relevant mapping are analyzed, to create application usage profile data for streamed applications. The application usage profile data can include such information as how often, when, where and by whom application components are being executed, as well as which components cause errors, are most popular, confuse users, etc.
The features and advantages described in this summary and in the following detailed description are not all-inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the relevant art in view of the drawings, specification, and claims hereof. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter.
The Figures depict embodiments of the present invention for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the invention described herein.
As illustrated in
As is understood by those of ordinary skill in the relevant art, the execution of a streamed application 107 is managed to a very fine level of detail by the streaming agent 104, which provides specific code pages 101 as they are required for execution by the endpoint 105. As illustrated in
As illustrated in
It is to be understood that how much of the mapping is performed automatically by the analysis module 201, and how much is input by, e.g., an application developer 205, is a variable design parameter. The implementation mechanics of performing such mapping based on application usage data 102 and corresponding source code 207 are within the skill set of one of ordinary skill in the relevant art, and the usage thereof within the context of the present invention will be readily apparent to one of such a skill level in light of this specification.
By referring to both the mapping data 209 and the collected usage data 102, the analysis module 201 can create application usage profile data 211 by determining how different components of the application 107 are being utilized (which components, how often, when, by whom, where, etc.) Specific analysis can determine factors such as how often an application 107 terminates without passing through expected code pages 101 (e.g., exit and cleanup routines), and what code was executing at the time of termination. This indicates under which circumstances an application 107 is abnormally terminating or crashing. This information can be used, for example, to drive additional testing or evaluation of the relevant components. Analysis can also indicate conclusions such as which features of an application 107 are popular (i.e., those features corresponding to frequently streamed code pages 101), which generate error conditions (i.e., those corresponding to code pages 101 streamed prior to the streaming of error processing code 101) and which confuse users (indicated by factors such long user pauses or failure to make a selection when encountering certain menus and such.) Of course, these are only examples of the type of analysis that can be performed. Other examples will be readily apparent to those of ordinary skill in the relevant art in light of this specification. For example, usage analysis can be performed by user, by company, by geo-location, by time of day, by month, etc.
The implementation mechanics of performing such analysis based on application usage data 102 and corresponding mapping data 209 are within the skill set of one of ordinary skill in the relevant art, and the usage thereof within the context of the present invention will be readily apparent to one of such a skill level in light of this specification.
As will be understood by those familiar with the art, the invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. Likewise, the particular naming and division of the portions, modules, agents, managers, components, functions, procedures, actions, layers, features, attributes, methodologies and other aspects are not mandatory or significant, and the mechanisms that implement the invention or its features may have different names, divisions and/or formats. Furthermore, as will be apparent to one of ordinary skill in the relevant art, the portions, modules, agents, managers, components, functions, procedures, actions, layers, features, attributes, methodologies and other aspects of the invention can be implemented as software, hardware, firmware or any combination of the three. Of course, wherever a component of the present invention is implemented as software, the component can be implemented as a script, as a standalone program, as part of a larger program, as a plurality of separate scripts and/or programs, as a statically or dynamically linked library, as a kernel loadable module, as a device driver, and/or in every and any other way known now or in the future to those of skill in the art of computer programming. Additionally, the present invention is in no way limited to implementation in any specific programming language, or for any specific operating system or environment. Furthermore, it will be readily apparent to those of ordinary skill in the relevant art that where the present invention is implemented in whole or in part in software, the software components thereof can be stored on computer readable media as computer program products. Any form of computer readable medium can be used in this context, such as non-transitory, magnetic or optical storage media. Additionally, software portions of the present invention can be instantiated (for example as object code or executable images) within the memory of any programmable computing device. Accordingly, the disclosure of the present invention is intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.
Number | Name | Date | Kind |
---|---|---|---|
5765205 | Breslau et al. | Jun 1998 | A |
6530082 | Del Sesto et al. | Mar 2003 | B1 |
6757894 | Eylon et al. | Jun 2004 | B2 |
7062567 | Benitez et al. | Jun 2006 | B2 |
7197570 | Eylon et al. | Mar 2007 | B2 |
7523191 | Thomas et al. | Apr 2009 | B1 |
20010034736 | Eylon et al. | Oct 2001 | A1 |
20010037399 | Eylon et al. | Nov 2001 | A1 |
20010044850 | Raz et al. | Nov 2001 | A1 |
20020087717 | Artzi et al. | Jul 2002 | A1 |
20020087963 | Eylon et al. | Jul 2002 | A1 |
20020138640 | Raz et al. | Sep 2002 | A1 |
20030004882 | Holler et al. | Jan 2003 | A1 |
20030088511 | Karboulonis et al. | May 2003 | A1 |
20030140160 | Raz et al. | Jul 2003 | A1 |
20050182750 | Krishna et al. | Aug 2005 | A1 |
20050188079 | Motsinger et al. | Aug 2005 | A1 |
20060136389 | Cover et al. | Jun 2006 | A1 |
20070192161 | Kogan et al. | Aug 2007 | A1 |
Entry |
---|
Official Action received from USPTO dated Apr. 22, 2010 for U.S. Appl. No. 12/051,590, filed Mar. 19, 2008. |