Data processing: software development – installation – and managem – Software installation – Network
Reexamination Certificate
2005-12-30
2011-10-25
Yigdall, Michael J (Department: 2192)
Data processing: software development, installation, and managem
Software installation
Network
C717S168000, C717S171000, C717S172000, C717S174000
Reexamination Certificate
active
08046755
ABSTRACT:
A computer-implemented method may include receiving first data that includes one or more configuration parameters that characterize an intended deployment of software and a target computer system on which the software is to be deployed. The computer-implemented method may further include calculating a deployment risk level based on the first data, determining whether the calculated deployment risk level is less than a threshold risk level, and transmitting second data to target computer system authorizing deployment of the software if the deployment risk level is less than the threshold risk level. In some implementations, the software is enterprise software. The one or more configuration parameters may include hardware specifications of the target computer system, and the calculated deployment risk level may be based on threshold recommended hardware specifications of the target computer for running the software to be deployed.
REFERENCES:
patent: 5883955 (1999-03-01), Ronning
patent: 5907617 (1999-05-01), Ronning
patent: 6177932 (2001-01-01), Galdes et al.
patent: 6199204 (2001-03-01), Donohue
patent: 6202207 (2001-03-01), Donohue
patent: 6725399 (2004-04-01), Bowman
patent: 6904449 (2005-06-01), Quinones
patent: 7035809 (2006-04-01), Miller et al.
patent: 2002/0124245 (2002-09-01), Maddux et al.
patent: 2002/0156874 (2002-10-01), Suorsa et al.
patent: 2003/0005326 (2003-01-01), Flemming
patent: 2003/0120589 (2003-06-01), Williams et al.
patent: 2003/0158760 (2003-08-01), Kannenberg
patent: 2003/0172367 (2003-09-01), Kannenberg
patent: 2003/0188290 (2003-10-01), Corral
patent: 2004/0010772 (2004-01-01), McKenna et al.
patent: 2004/0102923 (2004-05-01), Tracy et al.
patent: 2004/0143811 (2004-07-01), Kaelicke et al.
patent: 2004/0205727 (2004-10-01), Sit et al.
patent: 2005/0132206 (2005-06-01), Palliyil et al.
patent: 2005/0149759 (2005-07-01), Vishwanath et al.
patent: 2005/0198556 (2005-09-01), Tripp et al.
patent: 2005/0203968 (2005-09-01), Dehghan et al.
patent: 2005/0210459 (2005-09-01), Henderson et al.
patent: 2005/0257215 (2005-11-01), Denby et al.
patent: 2006/0184926 (2006-08-01), Or et al.
patent: 2006/0235732 (2006-10-01), Miller et al.
Stoneburner, Gary Goguen, Alice, and Feringa, Alexis. “Risk Management Guide for Information Technology Systems” Computer Security Division Information Technology Laboratory National Institute of Standards and Tehcnology Jul. 2002 <http://csrc.nist.gov/publications
istpubs/800-30/sp800-30.pdf> pp. 1-55.
Alleman, Glen B. Information Technology Risk Management. Copyright 2002 Niwot Colorado <http://www.niwotridge.com/PDFs/Risk%20Managment%20Combined.pdf> pp. 1-22.
Alberts, Christopher Dorofee, Audrey. “An Introduction to the OCTAVE Method” Software Engineering Institute Carnegie Mellon Jan. 30, 2001 <http://www.cert.org/octave/methodintro.html> pp. 1-11.
Gaa-Frost Bettina
Krimmel Stefan
Pulkowski Sebastian
Fish & Richardson P.C.
Hayim Samuel
SAP (AG)
Yigdall Michael J
LandOfFree
Deploying software based on a calculated deployment risk level does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Deploying software based on a calculated deployment risk level, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Deploying software based on a calculated deployment risk level will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4272592