A workflow may define a sequence of tasks that may be executed in a predefined order to produce a designated outcome. Input to a given task in the workflow may come from output generated by an earlier task in the sequence. Alternatively, a given task may use an external source as input.
As noted above, a workflow may define a sequence of tasks that may be executed in a predefined order to produce a designated outcome. A workflow manager may be used as a component of a workflow automation program. Workflow managers may interpret a workflow definition, access the input resources, and execute each task. With the advent of the cloud, input data for the workflow may be located across different network locations. When executing cloud based workflows, a task may need to access a remote repository on the cloud that requires authentication before reading the data. These credentials may be hardcoded in the task definition or entered manually by a user. If a workflow definition contains the right credentials, the input may be obtained.
Workflows may be shared among different individuals that require access to different repositories on a network or cloud. In this instance, each user of the workflow may have their own set of input/output resources with different authentication credentials. While the workflow definitions may be shared among the users in a public repository, the credentials and data locations may be private to each user. Unfortunately, this may be problematic for large entities with many users executing many workflows daily.
In view of the foregoing, disclosed herein are a system, non-transitory computer readable medium, and method for managing workflows. In one example, credentials in a user profile may be used to access data for a workflow. In another example, each source of input and the credentials of each source of input may be associated with a tag contained in the workflow. In another example, a given tag in the workflow may be substituted with a source of input associated with the given tag and with credentials of the source of input associated with the given tag. Thus, rather than hard coding data sources in the workflow or requiring users to enter details of the data sources, a workflow can dynamically adjust its data sources based on the user requesting the workflow. The aspects, features and advantages of the present disclosure will be appreciated when considered with reference to the following description of examples and accompanying figures. The following description does not limit the application; rather, the scope of the disclosure is defined by the appended claims and equivalents.
Non-transitory computer readable media may comprise any one of many physical media such as, for example, electronic, magnetic, optical, electromagnetic, or semiconductor media. More specific examples of suitable non-transitory computer-readable media include, but are not limited to, a portable magnetic computer diskette such as floppy diskettes or hard drives, a read-only memory (“ROM”), an erasable programmable read-only memory, a portable compact disc or other storage devices that may be coupled to computer apparatus 100 directly or indirectly. Alternatively, non-transitory CRM 112 may be a random access memory (“RAM”) device or may be divided into multiple memory segments organized as dual in-line memory modules (“DIMMs”). The non-transitory CRM 112 may also include any combination of one or more of the foregoing and/or other devices as well. While only one processor and one non-transitory CRM are shown in
The instructions illustrated herein (e.g., workflow manager 116) may comprise any set of instructions to be executed directly (such as machine code) or indirectly (such as scripts) by processor 110. In this regard, the terms “instructions,” “scripts,” and “applications” may be used interchangeably. The computer executable instructions may be stored in any computer language or format, such as in object code or modules of source code. Furthermore, it is understood that the instructions may be implemented in the form of hardware, software, or a combination of hardware and software and that the examples herein are merely illustrative.
In one example, at least one workflow may comprise a series of tasks executable by a computer. In another example, workflow manager 116 may instruct processor 110 to read a request by a user to execute a workflow. In yet a further example, workflow manager 116 may instruct processor 110 to read a user profile associated with the user. The user profile may specify at least one source of input to the workflow and may specify credentials for accessing the at least one source of input. In a further aspect, the workflow may be executed using the source of input specified in the user profile such that the workflow uses the credentials to access the source of input.
Working examples of the system, method, and non-transitory computer-readable medium are shown in
Referring now to
Referring back to
Advantageously, the foregoing computer apparatus, non-transitory computer readable medium, and method execute workflows that can dynamically change where input is read from and where output is written to. In this regard, tags may be placed in areas of the workflow that require the reading or writing of data. These tags may be replaced automatically with details provided in a user profile or some other source. In turn, users with different input and output requirements may share the same workflow regardless of where their repositories are located and regardless of the credentials for accessing their repositories.
Although the disclosure herein has been described with reference to particular examples, it is to be understood that these examples are merely illustrative of the principles of the disclosure. It is therefore to be understood that numerous modifications may be made to the examples and that other arrangements may be devised without departing from the spirit and scope of the disclosure as defined by the appended claims. Furthermore, while particular processes are shown in a specific order in the appended drawings, such processes are not limited to any particular order unless such order is expressly set forth herein. Rather, processes may be performed in a different order or concurrently and steps may be added or omitted.
| Filing Document | Filing Date | Country | Kind |
|---|---|---|---|
| PCT/US2013/061139 | 9/23/2013 | WO | 00 |
| Publishing Document | Publishing Date | Country | Kind |
|---|---|---|---|
| WO2015/041694 | 3/26/2015 | WO | A |
| Number | Name | Date | Kind |
|---|---|---|---|
| 7577649 | Wu | Aug 2009 | B2 |
| 8261233 | Szpak et al. | Sep 2012 | B2 |
| 8453159 | Appelbaum et al. | May 2013 | B2 |
| 9589250 | Palanisamy | Mar 2017 | B2 |
| 9703974 | Surkatty | Jul 2017 | B1 |
| 20020138543 | Teng et al. | Sep 2002 | A1 |
| 20040078105 | Moon et al. | Apr 2004 | A1 |
| 20040172445 | Singh | Sep 2004 | A1 |
| 20060271390 | Rich | Nov 2006 | A1 |
| 20070033079 | Rits et al. | Feb 2007 | A1 |
| 20070113289 | Blumenau | May 2007 | A1 |
| 20070208602 | Nocera et al. | Sep 2007 | A1 |
| 20100114782 | Candelore | May 2010 | A1 |
| 20120116980 | Mercuri | May 2012 | A1 |
| 20120197975 | Samson et al. | Aug 2012 | A1 |
| 20120311662 | Abnous | Dec 2012 | A1 |
| 20130073724 | Parashar et al. | Mar 2013 | A1 |
| 20130205373 | Jaudon et al. | Aug 2013 | A1 |
| Entry |
|---|
| Fostering Scientific Workflow Preservation through Discovery of Substitute Services, Belhajjame et al, 10.1109/eScience.2011.22, IEEE, 2011 (Year: 2011). |
| Cheung, W.K. et al; Towards Privacy Aware Data Analysis Workflows for e-science; http://www.isi.edu/˜gil/papers/cheung-gil-aaai-ses-07.pdt; May 9, 2007. |
| PCT Search Report/Written Opinion ˜ Application No: PCT/US2013/061139 dated Jun. 9, 2014 ˜ 10 pages. |
| Number | Date | Country | |
|---|---|---|---|
| 20160203329 A1 | Jul 2016 | US |