Deploying software based on a calculated deployment risk level

Data processing: software development – installation – and managem – Software installation – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C717S168000, C717S171000, C717S172000, C717S174000

Reexamination Certificate

active

08046755

ABSTRACT:
A computer-implemented method may include receiving first data that includes one or more configuration parameters that characterize an intended deployment of software and a target computer system on which the software is to be deployed. The computer-implemented method may further include calculating a deployment risk level based on the first data, determining whether the calculated deployment risk level is less than a threshold risk level, and transmitting second data to target computer system authorizing deployment of the software if the deployment risk level is less than the threshold risk level. In some implementations, the software is enterprise software. The one or more configuration parameters may include hardware specifications of the target computer system, and the calculated deployment risk level may be based on threshold recommended hardware specifications of the target computer for running the software to be deployed.

REFERENCES:
patent: 5883955 (1999-03-01), Ronning
patent: 5907617 (1999-05-01), Ronning
patent: 6177932 (2001-01-01), Galdes et al.
patent: 6199204 (2001-03-01), Donohue
patent: 6202207 (2001-03-01), Donohue
patent: 6725399 (2004-04-01), Bowman
patent: 6904449 (2005-06-01), Quinones
patent: 7035809 (2006-04-01), Miller et al.
patent: 2002/0124245 (2002-09-01), Maddux et al.
patent: 2002/0156874 (2002-10-01), Suorsa et al.
patent: 2003/0005326 (2003-01-01), Flemming
patent: 2003/0120589 (2003-06-01), Williams et al.
patent: 2003/0158760 (2003-08-01), Kannenberg
patent: 2003/0172367 (2003-09-01), Kannenberg
patent: 2003/0188290 (2003-10-01), Corral
patent: 2004/0010772 (2004-01-01), McKenna et al.
patent: 2004/0102923 (2004-05-01), Tracy et al.
patent: 2004/0143811 (2004-07-01), Kaelicke et al.
patent: 2004/0205727 (2004-10-01), Sit et al.
patent: 2005/0132206 (2005-06-01), Palliyil et al.
patent: 2005/0149759 (2005-07-01), Vishwanath et al.
patent: 2005/0198556 (2005-09-01), Tripp et al.
patent: 2005/0203968 (2005-09-01), Dehghan et al.
patent: 2005/0210459 (2005-09-01), Henderson et al.
patent: 2005/0257215 (2005-11-01), Denby et al.
patent: 2006/0184926 (2006-08-01), Or et al.
patent: 2006/0235732 (2006-10-01), Miller et al.
Stoneburner, Gary Goguen, Alice, and Feringa, Alexis. “Risk Management Guide for Information Technology Systems” Computer Security Division Information Technology Laboratory National Institute of Standards and Tehcnology Jul. 2002 <http://csrc.nist.gov/publications
istpubs/800-30/sp800-30.pdf> pp. 1-55.
Alleman, Glen B. Information Technology Risk Management. Copyright 2002 Niwot Colorado <http://www.niwotridge.com/PDFs/Risk%20Managment%20Combined.pdf> pp. 1-22.
Alberts, Christopher Dorofee, Audrey. “An Introduction to the OCTAVE Method” Software Engineering Institute Carnegie Mellon Jan. 30, 2001 <http://www.cert.org/octave/methodintro.html> pp. 1-11.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Deploying software based on a calculated deployment risk level does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Deploying software based on a calculated deployment risk level, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Deploying software based on a calculated deployment risk level will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4272592

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.