Claims
- 1. A method of computer resource management, comprising the steps of:
receiving, at a management node which includes at least one management computer, at least one ample image of storage of an imaged computer, the ample image thus disassociated from the imaged computer in that the management computer is distinct from the imaged computer; obtaining at the management node meta-data that is structurally associated with the ample image, the meta-data including at least one of:
structured image content information which describes content of the ample image, and structured imaged computer environment information which describes hardware that was installed on the imaged computer when the ample image was created; indexing the ample image into a collection of ample images such that the ample image can be located by using at least part of the meta-data as a key; bringing the ample image into a management environment at the management node; and facilitating management of a resource by performing at least one of the following steps using the ample image in the management environment:
searching the ample image; modifying the ample image.
- 2. The method of claim 1, wherein the method comprises modifying the ample image and further comprises the step of deploying the modified ample image to at least one of: the imaged computer, another computer which is distinct from the management node.
- 3. The method of claim 2, wherein the bringing step brings the ample image into a virtual environment, and the virtual environment is modified to produce the modified ample image that is deployed in the deploying step.
- 4. The method of claim 1, wherein the method comprises modifying the ample image by performing at least one of the following steps on the ample image in the management environment: installing an application, updating an application, removing an application, installing a hardware driver, updating a hardware driver, removing a hardware driver, installing system software other than a hardware driver, updating system software other than a hardware driver, removing system software other than a hardware driver, wherein removing a piece of software is done by uninstalling, overwriting, disabling, and/or deleting that software and removing is directed specifically at that software rather than the entire image.
- 5. The method of claim 1, wherein the method comprises modifying the ample image by performing at least one of the following steps on the ample image in the management environment: creating a partition, resizing a partition, resizing clusters of a partition, moving a partition, moving data between partitions, canonizing a partition, deleting a partition, merging two partitions, manipulating a volume segment.
- 6. The method of claim 1, wherein the method comprises modifying the ample image by performing at least one of the following steps on the ample image in the management environment: defragmenting files, reclaiming directory space in a partition, recovering data despite corrupted or lost file system information, converting one file system type to another file system type.
- 7. The method of claim 1, wherein the method comprises modifying the ample image in the management environment, and further comprises modifying the meta-data to reflect a modification of the ample image.
- 8. The method of claim 1, wherein the method comprises searching the ample image and performing at least one of the following steps on the ample image in the management environment: extracting disk usage information, determining whether a particular file is present, determining whether at least one file of a particular type is present, determining billing for storage usage.
- 9. The method of claim 1, wherein the method comprises searching the ample image and modifying the ample image, by performing at least one of the following pairs of steps on the ample image in the management environment: detecting a virus and then quarantining or repairing an infected file, detecting a virus and then removing an infected file, identifying an illegal file and then removing that illegal file, identifying a breach of a policy that defines standardized storage locations for particular types of data and then moving or removing data to enforce that policy.
- 10. The method of claim 1, wherein the method comprises searching multiple ample images to track file propagation by at least one of: tracking propagation of a file over time using ample images of a particular imaged computer that were created at different points in time, tracking propagation of a file over multiple computers using ample images of multiple imaged computers.
- 11. The method of claim 1, wherein the step of bringing the ample image into a management environment at the management node comprises mounting the ample image into a file system that is running on a management node computer.
- 12. The method of claim 1, wherein the step of receiving at a management node at least one ample image of storage of an imaged computer comprises receiving an image of an entire disk of the imaged computer.
- 13. The method of claim 1, wherein the step of indexing the ample image into a collection of ample images such that the ample image can be located by using at least part of the meta-data as a key comprises indexing by at least one of: a user name, a computer name, an image creation time, an IP address, a value identifying installed hardware, a value identifying installed operating system type, a value identifying an installed application, a value given in a registry file of the imaged computer.
- 14. The method of claim 1, wherein at least one facilitating step is performed in response to a script of batch-mode user commands.
- 15. The method of claim 1, wherein at least one facilitating step is performed in response to a policy specified on a computer-readable medium in a computer-parseable form.
- 16. A modified ample image produced by a process comprising the steps of:
sending, from an imaged computer to a management node which includes at least one management computer, at least one ample image of storage of the imaged computer, the ample image thus disassociated from the imaged computer in that the management node is distinct from the imaged computer; sending, from the imaged computer to the management node, meta-data that is structurally associated with the ample image, the meta-data including at least one of:
structured image content information which describes content of the ample image, and structured imaged computer environment information which describes hardware that was installed on the imaged computer when the ample image was created; and receiving, at the imaged computer, a modified ample image which is a modification of the ample image sent to the management node.
- 17. The modified ample image of claim 16 in combination with the imaged computer, wherein the modified ample image has been installed in storage at the imaged computer.
- 18. The modified ample image of claim 16, wherein the modified ample image differs from the image sent to the management node in at least one of the following ways: a change in application software; a change in driver software; a change in other software; a change in a partition table; a change in cluster size; a change of given data's location from a folder in which the given data was stored; a change of given data's location from a partition in which the given data was stored; a change in status of a file infected by a virus; a change in status of an illegal file.
- 19. A computer-readable storage medium configured to cause at least one management node computer to perform a method of computer resource management, the method comprising the steps of:
receiving, at a management node computer, at least one ample image of storage of an imaged computer, the ample image thus disassociated from the imaged computer in that the management computer is distinct from the imaged computer; obtaining at the management node meta-data that is structurally associated with the ample image; indexing the ample image into a collection of ample images such that the ample image can be located by using at least part of the meta-data as a key; modifying the ample image in the management environment; and sending the modified ample image from the management node to be installed on at least one computer that is not in the management node.
- 20. The configured medium of claim 19, wherein the method comprises modifying the ample image by performing at least one of the following steps on the ample image: installing software, updating software, removing software, wherein removing a piece of software is done by uninstalling, overwriting, disabling, and/or deleting that software, and removing is directed specifically at that software rather than the entire image.
- 21. The configured medium of claim 19, wherein the method comprises modifying the ample image by performing at least one of the following steps on the ample image: modifying the partition table, resizing a partition, resizing clusters of a partition, moving data between partitions, canonizing a partition, deleting a partition, merging two partitions, manipulating a volume segment.
- 22. The configured medium of claim 19, wherein the method comprises modifying the ample image by performing at least one of the following steps on the ample image: defragmenting files, reclaiming directory space in a partition, recovering data despite corrupted or lost file system information, converting one file system type to another file system type, quarantining an infected file, repairing an infected file, removing an infected file, removing an illegal file.
- 23. The configured medium of claim 19, wherein the method further comprises modifying the meta-data to reflect a modification of the ample image.
- 24. The configured medium of claim 19, wherein the method further comprises searching the ample image.
- 25. A system for computer resource management, comprising:
a management node which includes at least one management computer; an indexing component which indexes ample images into a collection of ample images such that a given ample image can be located by using meta-data as a key; a management environment at the management node; and a searching tool for searching an ample image within the management environment.
- 26. The computer resource management system of claim 25, further comprising a modifying tool for modifying an ample image within the management environment.
- 27. The computer resource management system of claim 26, further comprising code for modifying the modifying meta-data to reflect a modification of the ample image.
- 28. The computer resource management system of claim 25, further comprising a deploying tool for deploying an ample image from the management environment to at least one computer not in the management node.
- 29. The computer resource management system of claim 25, wherein the modifying tool is capable of modifying the ample image by performing at least one of the following steps on the ample image in the management environment: creating a file, installing a file, updating a file, removing a file, and wherein removing a file containing software is done by uninstalling, overwriting, disabling, and/or deleting that software, and removing a file is directed specifically at that file rather than the entire image.
- 30. The computer resource management system of claim 25, wherein the modifying tool is capable of modifying the ample image by performing at least one of the following steps on the ample image in the management environment: manipulating a partition, manipulating a volume segment, defragmenting files, reclaiming directory space, recovering data despite corrupted or lost file system information, converting one file system type to another file system type.
- 31. The computer resource management system of claim 25, wherein the searching tool is capable of searching the ample image by performing at least one of the following steps on the ample image in the management environment: extracting disk usage information, determining whether a particular file is present, determining whether at least one file of a particular type is present, determining billing for storage usage, detecting a virus-infected file, identifying an illegal file, identifying a breach of a policy that defines standardized storage locations for particular types of data, tracking propagation of a file over time using ample images of a particular imaged computer that were created at different points in time, tracking propagation of a file over multiple computers using ample images of multiple imaged computers.
- 32. The computer resource management system of claim 25, wherein the management environment comprises a driver capable of mounting the ample image into a file system that is running on a management node computer.
- 33. The computer resource management system of claim 25, wherein the management environment comprises a virtual environment that simulates storage-related characteristics of the imaged computer.
- 34. The computer resource management system of claim 25, further comprising a command interpreter which processes a script of batch-mode user commands.
RELATED APPLICATIONS
[0001] This application claims priority to commonly owned copending application serial No. 60/370,100 filed Apr. 3, 2002, which is incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60370100 |
Apr 2002 |
US |