Nothing Special   »   [go: up one dir, main page]

US20050198647A1 - Snapshot virtual-templating - Google Patents

Snapshot virtual-templating Download PDF

Info

Publication number
US20050198647A1
US20050198647A1 US11/096,747 US9674705A US2005198647A1 US 20050198647 A1 US20050198647 A1 US 20050198647A1 US 9674705 A US9674705 A US 9674705A US 2005198647 A1 US2005198647 A1 US 2005198647A1
Authority
US
United States
Prior art keywords
resource
application
nonshareable
resources
recited
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/096,747
Inventor
Burton Hipp
Rajeev Bharadhwai
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Symantec Operating Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/096,747 priority Critical patent/US20050198647A1/en
Publication of US20050198647A1 publication Critical patent/US20050198647A1/en
Assigned to VERITAS OPERATING CORPORATION reassignment VERITAS OPERATING CORPORATION MERGER (SEE DOCUMENT FOR DETAILS). Assignors: EJASENT, INC.
Assigned to SYMANTEC CORPORATION reassignment SYMANTEC CORPORATION CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: VERITAS OPERATING CORPORATION
Assigned to SYMANTEC OPERATING CORPORATION reassignment SYMANTEC OPERATING CORPORATION CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE PREVIOUSLY RECORDED ON REEL 019872 FRAME 979. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE IS SYMANTEC OPERATING CORPORATION. Assignors: VERITAS OPERATING CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • G06F9/4856Task life-cycle, e.g. stopping, restarting, resuming execution resumption being on a different machine, e.g. task migration, virtual machine migration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/48Indexing scheme relating to G06F9/48
    • G06F2209/482Application

Definitions

  • FIG. 1 is a high level block diagram illustrating the various components of a computer network used in connection with the present invention
  • FIG. 3 illustrates how application state is tracked using library and operating system kernel interposition
  • FIG. 1 illustrates in high level block diagram form the overall structure of the present invention as used in connection with a global computer network 100 such as the Internet.
  • Remote users 102 - 1 and 102 - 2 can connect through the computer network 100 to a private network of computers 106 protected by firewall 104 .
  • Computer network 106 is a network comprising computers 150 - 1 , 150 - 2 , through 150 -n, where n is the total number of computers in network 106 .
  • Computers 150 are used to run various applications, as well as host web sites for access by remote users 102 .
  • the present invention is implemented on computer network 106 in the form of virtual environments 110 - 1 and 110 - 2 . While only two virtual environments are illustrated, it is to be understood that any number of virtual environments may be utilized in connection with the present invention.
  • FIG. 4 illustrates the capture of an application's run time state.
  • the OS API interfaces 210 are standard programming interfaces defined by international standards organizations such as XOPEN.
  • the openO system call which allows an application to open a file for reading is an example of an API interface.
  • the process management system 216 is a component of the operating system 206 that allows one process to examine or alter the state of another process.
  • the interfaces that are provided by this component are usually not standardized interfaces (not part of a recognized standard API) and are OS-implementation dependent. However, such interfaces usually allow access to more state than standardized API interfaces.
  • the run-time information captured from a process is used by the snapshot driver 218 .
  • Recreating the state entails creating a global resource that is functionally identical to the resource at the time of the snapshot. For example if during a snapshot, a semaphore with id 5193 is found with a value of 7, then to recreate the state at restore time a new semaphore must be created having the exact same ID as before (ie 5193) and it also must have the same state (ie value 7) as before. Then, for each image, a process is created that inherits the global/shared state restored in step 308 , and each created process is isolated to prevent inter-process state changes. When a process is being restored, process state is being registered with the kernel, inter-process mechanisms are being restored and reconnected and I/O buffers in the kernel may be being restored.
  • step 314 This is done by taking the system resource that was created in step 314 and binding it to the virtual definition that was saved during the snapshot in step 266 . This allows the application to see a consistent view of resources, since it cannot be guaranteed that at restore time the exact same system resource will be available.
  • step 322 If the state is shared with another process, such as via a pipe (decision state 320 ), the shared state is reconnected with the other process at step 322 . If there are more states (decision step 324 ) steps 314 through 322 are repeated. Once steps 314 through 322 have been executed for all states, control continues to step 326 , where the process is placed in synchronized wait. If there are remaining images in the snapshot image (decision step 328 ), steps 310 through 326 are repeated. Once all images have been processed, control continues to step 330 , where traces and states induced during restore of the process are removed, and a synchronized resume of all processes occurs at step 332 .
  • the present invention provides a system, method, and computer program product for creating snapshot virtual application templates for the purpose of propagating a single application snapshot into multiple distinct instances.
  • Snapshot virtual templates allow multiple application instances to use the same fixed resource ID (“RID”) by making the resource ID virtual, privatizing the virtual RID, and dynamically mapping it to a unique system resource ID.
  • RID is the identifier assigned to represent a specific system resource and acts as a handle when referencing that system resource.
  • Anonymous resources are resources that are read-only or functionally isolated from other applications. Anonymous resources are also shareable resources.
  • An anonymous resource is a non-fixed resource allocated by the operating system and identified by a per-process handle. These are functionally-isolated since the operating system allocates it anonymously and one is as food as another.
  • a resource is said to be network-wide unique if there can only be one instance of that resource with its corresponding identifier on computer network or subnetwork.
  • An example of this is an network IP address (i.e. 10.1.1.1).
  • Snapshot virtual templates allow snapshots to be described in a manner that separates shareable data from non-sharable data. Data is loosely defined to mean any system resource (memory, files, sockets, handles, etc.). When a snapshot is cloned from a virtual template, the common or shared data is used exactly as is, whereas the non-sharable data is either copied-on-write, multiplexed, virtualized, or customized-on-duplication.
  • Snapshot virtual templating works by noting access to modified resources, fixed system IDs/keys and unique process-related identifies and automatically inserting a level of abstraction between these resources and the application.
  • the resources contained in a snapshot virtual template can be dynamically redirected at restore time.
  • Access to memory and storage is managed in a copy-on-write fashion.
  • System resource handles are managed in a virtualize-on-allocate fashion or by a multiplex-on-access mechanism.
  • Process-unique resources are managed in a redirect-on-duplicate fashion. Rules may be defined through an application configurator that allows some degree of control over the creation of non-sharable data.
  • the application configurator is a software component that resides in the application domain and communicates configuration information about the application on its behalf such as the DSL specifications. Since this component operates without assistance from the application, it may exist in the form of an application library, or may be placed in the applications environment (via inheritance at execution time), ir it can be implemented as a server process that proxies application information to the operating system as necessary.
  • a resource duplicator is a software component that fields requests for non-shareable resources and duplicates or virtualizes resources so that applications receive their own private copies and can co-exist transparently with multiple instances of the same application forged from the same virtual template.
  • the resource duplicator also processes duplication rules fed by the application configurator or application snapshot/restore framework 200 .
  • non-sharable data refers to any resource that is modified and globally visible to other application instances is non-sharable (i.e. files).
  • Process-related identifiers that are system-wide unique are also non-shareable since conflicts will arise if two instances use the same identifier at the same time (uniqueness is no longer preserved).
  • References to unique resources by fixed handles i.e. fixed TCP port numbers or IPC keys
  • Memory pages that are specific to an application instance i.e. the stack
  • examples of non-sharable data include application config files that must be different per application instance as well as modified application data files if the application is not written to run multiple copies simultaneously.
  • Other examples include stack memory segments or heap segments may also be non-sharable data, shared memory keys that are a fixed value, usage of fixed well-known (to the application) TCP port numbers, and process identifiers (two distinct processes cannot share the same PID).
  • Snapshot virtual templates are node-independent as well as application-instance dependent. Snapshot virtual templates cannot be created for applications that use non-shareable physical devices. Snapshot virtual templates must save references to non-shareable resources in their pre- customized form, rather than their evaluated form. All access by an application to non-shareable resources must be via the operating system. Internal or implicit dependencies by the application itself cannot be virtually-templated. A snapshot virtual template may be created from an application instance that was originally forged from a different virtual template.
  • Snapshot virtual templating is an alternate method of creating an application instance.
  • the snapshot restore method described above requires creating unique instances of an application to create unique “snapshots” of that application.
  • Virtual templating allows the creation of a generic application instance from which unique instances may be spawned. Every unique instance that is created from the original virtual template starts out as an exact copy (referred to herein as “clone”) but has been personalized just enough to make it a fully-finctioning independent copy. Differences between copies may be due to the way resources are named or identified.
  • FIG. 7 illustrates in block diagram form the contents of a snapshot virtual template.
  • the main components are resource name size, resource descriptor size, resource type, resource name, and resource data.
  • Resource data includes many different types of information, as illustrated.
  • environment variables or pathnames that incorporate an AID to differentiate and customize a particular resource among multiple instances.
  • the following syntax created for illustration purposes: Define ⁇ APPL-ID> as PROPERTY application-ID REDIR PATH “/user/app/config” to “/usr/app/ ⁇ APPL-ID>/config” SET ENV “HOME” “/usr/app/ ⁇ APPL-ID>”
  • rules are created, they should also be specified via the application configurator. If no rule is found, the resource is checked using a standard set of criteria that determine whether the resource needs to be abstracted or virtualized in order to be cloned at step 364 . The criteria is again checked at steps 366 , 370 , 372 , 378 , 380 and 386 . In most cases, no action is taken. Resources are simply classified into their correct types so that when an instance is cloned the correct action can be taken. If the resource is shared, i.e. shared memory (decision step 366 ), the resource is marked as shared (step 368 ) so that during the subsequent snapshot all references to the shared object will be noted.
  • shared memory i.e. shared memory
  • the resource If the resource can be modified (decision step 370 ), it must be isolated from the original during cloning so that the original remains untouched. If the resource is a large object and has a notion of an underlying object, such as i.e. mapped memory (decision step 372 ), it is marked for copy-on-write (step 374 ). Otherwise, the entire resource must be duplicated and marked accordingly (step 376 ).
  • a resource is said to be systemwide unique if the identifier used to represent that resource cannot represent more than one instance of that resource at a single point in time on the same node or computer.
  • the resource is systemwide unique (decision step 378 ), and is exported as an external interface, as is the case when another client application that is not running on the platform has a dependency on the resource, such as a TCP port number (decision step 380 ), it is marked to be multiplexed (step 382 ). Multiplexing allows multiple independent connections to transparently co-exist over the same transport using only a single identifiable resource. If it isn't externally exported, the resource is marked for virtualize at step 384 . Continuing to decision step 386 , if the resource is network-unique, it is marked for allocation at step 388 . Control proceeds to step 390 , where the resource request is processed. Steps 360 through 390 are repeated for every resource request occurring during application execution.
  • FIG. 9 illustrates the sequence of steps executed to perform cloning or replication of a process from a snapshot virtual template.
  • This sequence of steps can be performed by a replication program that creates a new snapshot image from an existing template, or by the restore driver 220 .
  • a new instance is automatically cloned from the template using the rules that were gathered during the creation of the template.
  • rules for the resource and access type are looked up. Any resource that requires special handling as part of the templating effort has the rule described inside the snapshot template as part of the auxiliary state associated with the resource.
  • the resource is recreated using the existing saved information in the snapshot (step 402 ). Otherwise, if a resource is marked for duplicate (decision step 404 ), then a copy of the original resource is made at step 406 . If a resource is marked for copy-on-write (decision step 408 ), then at step 410 a reference to the original underlying object (in the original template) is kept, and any modifications to the original force a copy-on-write action so that the modifications are kept in an application-instance private location and the two form a composite view that is visible to the application instance.
  • RID's are usually numeric in form, but can also be alphanumeric. RID's are unique to a machine, and can be reused once all claims to a specific RID have been given up. Some examples of RID's include process ID's, shared memory ID's, and semaphore ID's. Only the virtual RID is visible to the application. Conversely, the virtual RID is transparent to the OS, and only the system RID is visible to the OS. Every application has a unique identifier that distinguishes it from every other running application. There exists a one to one mapping between the AID: resource type: virtual RID combination and the node ID: system RID.
  • Resolution of a RID may occur in two different directions.
  • a RID may be passed from the application to the OS, in which case the RID is mapped from virtual ID to system ID.
  • the RID may be passed from the OS to the application, in which case the transition is from system ID to virtual ID.
  • Requests for translation are passed from the framework to the virtual RID translation unit and the corresponding mapping is returned once it has been fetched from the appropriate translation table.
  • Multiple translation tables may exist if there are multiple resource types.
  • FIG. 10 illustrates the steps executed to register an application.
  • the AppShot harness 500 exists to aid in the creation of the appropriate runtime environment for the application prior to launching the application.
  • the appshot harness 500 initializes the runtime environment for an application by first priming its own environment with the appropriate settings and then launching the application which inherits all these settings.
  • the appshot harness 500 is provided because the application cannot be recompiled or rewritten to initialize its own environment.
  • Some of the settings that are established by the appshot harness 500 include the AID, assigned process ID range, DSL specifications, application virtual ID's, and snapshot templating rules.
  • the DSL specifications are registered as part of the environment.
  • a process is an in-memory instantiation of a software program.
  • Process x is the in-memory image of the AppShot harness 500 and processy is the in-memory image of the application.
  • the appshot harness 500 registers an AID a i , such as “dbserver.” with the application snapshot/restore framework 200 within the OS kernel 206 .
  • the application snapshot/restore framework 200 then creates virtual translation tables 502 for the AID at step 512 .
  • Virtual translation tables 502 are data units that contain translation information related to RID's, such as AID's or process ID's, virtual RID'S, and system RID's. Separate tables can be implemented per resource type or a table can be shared if a unique resource type is stored per table entry.
  • a translation unit maps the system RID's to the virtual RID's by storing and fetching translation information in the appropriate translation table.
  • FIG. 11 shows the allocation of a virtual resource such as a semaphore in accordance with the present invention.
  • an application requests that a semaphore resource is allocated for its process y .
  • the application snapshot/restore framework 200 looks up the AID in memory 154 , and returns AID a i .
  • the system semaphore pool returns semaphore s i .
  • the application snapshot/restore framework 200 scans the virtual resource translation table 502 for an available slot and allocates the virtual semaphore.
  • the virtual semaphore v 3 is returned to the application.
  • step 590 If the semaphore was not allocated by the semaphore interface (decision step 590 ), and the interface returns a semaphore (decision step 592 ) control proceeds to step 594 where a reverse lookup for the translation of the AID with a system RID is performed. The returned virtual RID is then substituted for the virtual ID at step 596 .

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

A system, methods, and computer program products are disclosed for creating virtual application templates for the purpose of propagating a single application snapshot into multiple, distinct images. Snapshot virtual templates allow multiple application instances to use the same fixed resource identifier by making the resource identifier virtual, privatizing it, and dynamically mapping it to a unique system resource identifier. When a snapshot is cloned from a virtual template, the common or shared data is used exactly as is, whereas the non-sharable data is either copied-on-write, multiplexed, virtualized, or customized-on-duplication. The present invention notes access to modified resources, fixed system IDs/keys and unique process-related identifies and automatically inserts a level of abstraction between these resources and the application. The resources contained in a snapshot virtual template can be dynamically redirected at restore time. Access to memory and storage is managed in a copy-on-write fashion. System resource handles are managed in a virtualize-on-allocate fashion or by a multiplex-on-access mechanism. Process-unique resources are managed in a redirect-on-duplicate fashion. Rules may be defined through an application configurator that allows some degree of control over the creation of non-sharable data. The snapshot virtual template is constructed by dividing the snapshot image into sharable and non-sharable data. Knowledge of which system resources can be shared is encoded in the application snapshot/restore framework.

Description

    REFERENCE TO RELATED APPLICATIONS
  • The present application claims priority to and incorporates the following applications by reference: DYNAMIC SYMBOLIC LINK RESOLUTION, Prov. No. 60/157,728, filed on Oct. 5, 1999; SNAPSHOT VIRTUAL TEMPLATING, Prov. No. 60/157,728, filed on Oct. 5, 1999; SNAPSHOT RESTORE OF APPLICATION CHAINS AND APPLICATIONS, Prov. No. 60/157,833, filed on Oct. 5, 1999; VIRTUAL RESOURCE-ID MAPPING, Prov. No. 60/157,727, filed on Oct. 5, 1999; and VIRTUAL PORT MULTIPLEXING, Prov. No. 60/157,834, filed on Oct. 5, 1999.
  • FIELD OF THE INVENTION
  • The present invention relates broadly to client server computer architectures. Specifically, the present invention relates to creating virtual application templates for the purpose of propagating a single application snapshot into multiple, distinct images.
  • BACKGROUND
  • Global computer networks such as the Internet have allowed electronic commerce (“e-commerce”) to flourish to a point where a large number of customers purchase goods and services over websites operated by online merchants. Because the Internet provides an effective medium to reach this large customer base, online merchants who are new to the e-commerce marketplace are often flooded with high customer traffic from the moment their websites are rolled out. In order to effectively serve customers, online merchants are charged with the same responsibility as conventional merchants: they must provide quality service to customers in a timely manner. Often, insufficient computing resources are the cause of a processing bottleneck that results in customer frustration and loss of sales. This phenomena has resulted in the need for a new utility: leasable on-demand computing infrastructure. Previous attempts at providing computing resources have entailed leasing large blocks of storage and processing power. However, for a new online merchant having no baseline from which to judge customer traffic upon rollout, this approach is inefficient. Either too much computing resources are leased, depriving a start up merchant of financial resources that are needed elsewhere in the operation, or not enough resources are leased, and a bottleneck occurs.
  • To make an on-demand computer infrastructure possible, computer applications must be ported across computer networks to different processing locations. However, this approach is costly in terms of overhead for the applications to be moved across the network must be saved, shut down, stored, ported and then restored and re-initialized with the previously running data. The overhead is prohibitive and negates any performance improvements realized by transferring the application to another computer. Thus, there remains a heartfelt need for a system and method for effecting a transfer of applications across computer networks without incurring costly processing overhead.
  • SUMMARY
  • The present invention solves the problems described above by creating virtual application templates for the purpose of propagating a single application snapshot into multiple, distinct images. Snapshot virtual templates allow multiple application instances to use the same fixed resource identifier by making the resource identifier virtual, privatizing it, and dynamically mapping it to a unique system resource identifier. When a snapshot is cloned from a virtual template, the common or shared data is used exactly as is, whereas the non-sharable data is either copied-on-write, multiplexed, virtualized, or customized-on-duplication. The present invention greatly reduces the required administrative setup per application instance. Snapshot virtual templating works by noting access to modified resources, fixed system IDs/keys and unique process-related identifies and automatically inserting a level of abstraction between these resources and the application. The resources contained in a snapshot virtual template can be dynamically redirected at restore time. Access to memory and storage is managed in a copy-on-write fashion.. System resource handles are managed in a virtualize-on-allocate fashion or by a multiplex-on-access mechanism. Process-unique resources are managed in a redirect-on-duplicate fashion. Rules may be defined through an application configurator that allows some degree of control over the creation of non-sharable data.
  • The snapshot virtual template is constructed by dividing the snapshot image into sharable and non-sharable data. Knowledge of which system resources can be shared is encoded in the application snapshot/restore framework.
  • These and many other attendant advantages of the present invention will be understood upon reading the following detailed description in conjunction with the drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a high level block diagram illustrating the various components of a computer network used in connection with the present invention;
  • FIG. 2 is a high level block diagram illustrating the various components of a computer used in connection with the present invention;
  • FIG. 3 illustrates how application state is tracked using library and operating system kernel interposition;
  • FIG. 4 illustrates the capture of an application's run-time state;
  • FIG. 5 is a flow chart illustrating the logical sequence of steps executed to create a snapshot image of an application instance;
  • FIG. 6 is a flow chart illustrating the logical sequence of steps executed to restore an application instance from a snapshot image.;
  • FIG. 7 is an illustration of the format of a snapshot virtual template;
  • FIG. 8 is a flowchart illustrating the logical sequence of steps executed to create a snapshot virtual template;
  • FIG. 9 is a flowchart illustrating the logical sequence of steps executed to clone a snapshot virtual template;
  • FIG. 10 illustrates the registration of an application using virtual resource identifiers;
  • FIG. 11 illustrates the allocation of a virtual resource;
  • FIG. 12 illustrates the translation of a virtual resource to a system resource;
  • FIG. 13 illustrates the translation of a system resource to a virtual resource;
  • FIG. 14 is a flowchart illustrating the logical sequence of steps executed to create a virtual translation table; and
  • FIG. 15 is a flowchart illustrating the logical sequence of steps executed to translate a virtual resource.
  • DETAILED DESCRIPTION
  • A. Snapshot Restore
  • FIG. 1 illustrates in high level block diagram form the overall structure of the present invention as used in connection with a global computer network 100 such as the Internet. Remote users 102-1 and 102-2 can connect through the computer network 100 to a private network of computers 106 protected by firewall 104. Computer network 106 is a network comprising computers 150-1, 150-2, through 150-n, where n is the total number of computers in network 106. Computers 150 are used to run various applications, as well as host web sites for access by remote users 102. The present invention is implemented on computer network 106 in the form of virtual environments 110-1 and 110-2. While only two virtual environments are illustrated, it is to be understood that any number of virtual environments may be utilized in connection with the present invention.
  • FIG. 2 illustrates in high level block diagram form a computer that may be utilized in connection with the present invention. Computer 150 incorporates a processor 152 utilizing a central processing unit (CPU) and supporting integrated circuitry. Memory 154 may include RAM and NVRAM such as flash memory, to facilitate storage of software modules executed by processor 152, such as application snapshot/restore framework 200. Also included in computer 150 are keyboard 158, pointing device 160, and monitor 162, which allow a user to interact with computer 150 during execution of software programs. Mass storage devices such as disk drive 164 and CD ROM 166 may also be in computer 150 to provide storage for computer programs and associated files. Computer 150 may communicate with other computers via modem 168 and telephone line 170 to allow the computer 150 to be operated remotely, or utilize files stored at different locations. Other media may also be used in place of modem 168 and telephone line 170, such as a direct connection or high speed data line. The components described above may be operatively connected by a communications bus 172.
  • FIG. 3 shows how application states are tracked via library and kernel interposition. The application snapshot/restore framework 200 is a software module that processes transactions between the operating system 206 and the applications 208. Requests for system resources or changes to process state are routed internally and the application snapshot/restore framework 200 tracks these events in anticipation of a snapshot. The application snapshot/restore framework 200 is transparent to running (and snapshotted) applications. From an application's perspective, the application is always running. An application snapshot may consist of multiple processes and multiple threads and includes shared resources in use by a process, such as shared memory or semaphores. A process may be snapshotted & restored more than once. The computer on which a process is restored on must be identically configured and have an identical environment (hardware, software, and files) that matches the environment of the computer where the process was snapshotted. All processes that are snapshotted together in the form of an application chain share the same application ID (“AID”). As used herein, an application chain is the logical grouping of a set of applications and processes that communicate with each other and share resources to provide a common function.
  • The virtual environment 204 is a layer that surrounds application(s) 208 and resides between the application and the operating system 206. Resource handles are abstracted to present a consistent view to the application although the actual system resource handles may change as an application is snapshot/restored more than once. The virtual environment also allows multiple applications to compete for the same resources where exclusion would normally prohibit such behavior to allow multiple snapshots to coexist without reconfiguration. Preload library 214 is an application library that interposes upon an application for the express purpose of intercepting and handling library called and system calls. Once the library has been preloaded it is attached to the process address space. Preload library 214 interposes between application 208 and operating system 206. It is distinguished from kernel interposition in that it operates in “user mode” (i.e., non-kemel and non-privileged mode). Application 208 can make application programming interface (API) calls that modify the state of the application. These calls are made from the application 208 to the operating system API interfaces 210 via the application snapshot restore framework 200 or the preload library 214. The preload library can save the state of various resources by intercepting API interface calls and then saves the state at a pre-arranged memory location. When the process' memory is saved as part of the snapshot/restore mechanism, this state is saved since it resides in memory. The state as it is modified is saved to non-volatile storage (i.e. a file on disk). The preload library notify the snapshot/restore framework through one of its private interface.
  • FIG. 4 illustrates the capture of an application's run time state. The OS API interfaces 210 are standard programming interfaces defined by international standards organizations such as XOPEN. The openO system call which allows an application to open a file for reading is an example of an API interface. The process management system 216 is a component of the operating system 206 that allows one process to examine or alter the state of another process. The interfaces that are provided by this component are usually not standardized interfaces (not part of a recognized standard API) and are OS-implementation dependent. However, such interfaces usually allow access to more state than standardized API interfaces. The run-time information captured from a process is used by the snapshot driver 218.
  • An application needs to be snapshotted if it is idle and is not currently in use or there are higher priority requests that require the application be scheduled out and preempted in favor of another application. A snapshot request is initiated by an application scheduler that determines when an application needs to be restored on-demand and when the application is no longer needed (can be snapshotted to free up resources). The application scheduler does this based on web traffic, server load, request response time, and a number of other factors. An application needs to be restored if there is an incoming request (i.e. a web browser request) and the application required to handle that request (ie a particular web site) is not currently running. Alternatively, an application needs to be restored if there is an incoming request (i.e. a web browser request) and the application required to handle that request (ie a particular web site) is currently overloaded, so another instance of that application is restored to handle that request.
  • FIG. 5 illustrates the logical sequence of steps executed by Snapshot driver 218 to make a snapshot image of a process. Beginning at step 250, an snapshot image of a runnable application is requested. The AID is looked up (decision step 252) in a table in memory 154 containing a list of every AID present on computer 150. If the AID is not found control returns at step 254. However, if the AID is found, control continues to decision step 256 where the snapshot/restore framework 200 searches for a process belonging to the application having the matched AID. If a process is found, control continues to step 258, where the process is suspended. For a process to be snapshotted, it must be completely suspended with no activity present and no ambiguous state (i.e., in a transitory state). Since a process may be represented by asynchronous threads of activity in the operating system that are not formally part of the process state, any activity in the operating system that is executing on behalf of the process must be stopped (i.e. disk I/O activity). In other words, there may be moments where temporarily a process cannot be snapshotted. This is a finite and short period of time, but it can occur. If the state is consistent and the threads are quiesced (decision step 260), control loops to step 256 and the remaining processes belonging to the application are located and suspended. However, if a process is located that does not have a consistent state or a thread is not quiesced, suspended processes are resumed and the snapshot cannot be completed.
  • Once all related processes are suspended, for each state of each suspended process, the state is checked to see if it is virtualized (step 264). A virtualized state is any process state that reflects a virtualized resource. If the state is virtualized, it is retrieved at step 266; otherwise the non-virtualized state is retrieved at step 268 State retrieval is performed as described above by the snapshot driver 218 querying the application snapshot/restore framework 200, operating system API interfaces 210, and process management subsystem 216. If the state has changed since the last snapshot (step 270), the new state is recorded. Control then loops to step 264 and executes through the above sequence of steps until all states of all processes are checked. Once completed, control proceeds to step 278, the registered global state, such as semaphores, is removed. Registered global state is state that is not specifically associated with any one process (ie private state). Global state is usually exported (accessible) to all processes and its state can be modified (shared) by all processes. Control proceeds to step 280, where the process is terminated. If there are remaining processes (step 282), these are also terminated. This sequence of steps is concluded to create a snapshot image which is stored as a file and made available for transmission to another computer within public computer network 100 or private computer network 106.
  • FIG. 6 illustrates the sequence of steps executed by the restore driver 220 to restore a snapshot image. The snapshot image is accessed via a shared storage mechanism and a restore call is made at step 300. The restore driver 220 looks up the AID for the snapshot image and (decision step 302) if not found control returns and the snapshot image cannot be restored. However, if the AID is found, control continues to decision step 304 where, if the snapshotted image matching the AID is located, the global/shared state for each process associated with the snapshot are found. Control then continues to step 308, where remaining global or shared state for the processes are recreated. Since global and shared state is not associated with a single process and may be referenced by multiple processes, it is created first. Recreating the state entails creating a global resource that is functionally identical to the resource at the time of the snapshot. For example if during a snapshot, a semaphore with id 5193 is found with a value of 7, then to recreate the state at restore time a new semaphore must be created having the exact same ID as before (ie 5193) and it also must have the same state (ie value 7) as before. Then, for each image, a process is created that inherits the global/shared state restored in step 308, and each created process is isolated to prevent inter-process state changes. When a process is being restored, process state is being registered with the kernel, inter-process mechanisms are being restored and reconnected and I/O buffers in the kernel may be being restored. Some of these actions in one process may have the unintended side effect of disturbing another process that is also being restored. For example if an I/O buffer that is in the operating system as a result of a process performing a write to a socket connection, then processy could unintentionally be delivered an asynchronous signal that notifies it of I/O being present (for reading) prior to the process being fully restored. At step 314, for each type of state within the processes, the process-private resources are recreated to their state at the time the snapshot image was taken. If the state is virtualized (decision step 316), the system state is bound to a virtual definition. As part of the restore an extra step must be done to create a virtual mapping. This is done by taking the system resource that was created in step 314 and binding it to the virtual definition that was saved during the snapshot in step 266. This allows the application to see a consistent view of resources, since it cannot be guaranteed that at restore time the exact same system resource will be available. If the state is shared with another process, such as via a pipe (decision state 320), the shared state is reconnected with the other process at step 322. If there are more states (decision step 324) steps 314 through 322 are repeated. Once steps 314 through 322 have been executed for all states, control continues to step 326, where the process is placed in synchronized wait. If there are remaining images in the snapshot image (decision step 328), steps 310 through 326 are repeated. Once all images have been processed, control continues to step 330, where traces and states induced during restore of the process are removed, and a synchronized resume of all processes occurs at step 332.
  • Once steps 300 through 332 have executed without error on whatever computer the restore driver 220 was executed, the restored application can continue to run without interruption. Thus, the present invention avoids the overhead and delay of shutting down an application, storing data to a separate file, moving both the application and data file elsewhere, and restarting the program.
  • B. Snapshot Virtual Templating
  • In another aspect, the present invention provides a system, method, and computer program product for creating snapshot virtual application templates for the purpose of propagating a single application snapshot into multiple distinct instances. Snapshot virtual templates allow multiple application instances to use the same fixed resource ID (“RID”) by making the resource ID virtual, privatizing the virtual RID, and dynamically mapping it to a unique system resource ID. A RID is the identifier assigned to represent a specific system resource and acts as a handle when referencing that system resource. Anonymous resources are resources that are read-only or functionally isolated from other applications. Anonymous resources are also shareable resources. An anonymous resource is a non-fixed resource allocated by the operating system and identified by a per-process handle. These are functionally-isolated since the operating system allocates it anonymously and one is as food as another. Examples of this are non-fixed TCP ports or file descriptors. A resource is said to be network-wide unique if there can only be one instance of that resource with its corresponding identifier on computer network or subnetwork. An example of this is an network IP address (i.e. 10.1.1.1). Snapshot virtual templates allow snapshots to be described in a manner that separates shareable data from non-sharable data. Data is loosely defined to mean any system resource (memory, files, sockets, handles, etc.). When a snapshot is cloned from a virtual template, the common or shared data is used exactly as is, whereas the non-sharable data is either copied-on-write, multiplexed, virtualized, or customized-on-duplication. The present invention greatly reduces the required administrative setup per application instance. Snapshot virtual templating works by noting access to modified resources, fixed system IDs/keys and unique process-related identifies and automatically inserting a level of abstraction between these resources and the application. The resources contained in a snapshot virtual template can be dynamically redirected at restore time. Access to memory and storage is managed in a copy-on-write fashion. System resource handles are managed in a virtualize-on-allocate fashion or by a multiplex-on-access mechanism. Process-unique resources are managed in a redirect-on-duplicate fashion. Rules may be defined through an application configurator that allows some degree of control over the creation of non-sharable data.
  • The application configurator is a software component that resides in the application domain and communicates configuration information about the application on its behalf such as the DSL specifications. Since this component operates without assistance from the application, it may exist in the form of an application library, or may be placed in the applications environment (via inheritance at execution time), ir it can be implemented as a server process that proxies application information to the operating system as necessary.
  • A resource duplicator is a software component that fields requests for non-shareable resources and duplicates or virtualizes resources so that applications receive their own private copies and can co-exist transparently with multiple instances of the same application forged from the same virtual template. The resource duplicator also processes duplication rules fed by the application configurator or application snapshot/restore framework 200.
  • As used herein, non-sharable data refers to any resource that is modified and globally visible to other application instances is non-sharable (i.e. files). Process-related identifiers that are system-wide unique are also non-shareable since conflicts will arise if two instances use the same identifier at the same time (uniqueness is no longer preserved). References to unique resources by fixed handles (i.e. fixed TCP port numbers or IPC keys) are also not shareable. Memory pages that are specific to an application instance (i.e. the stack) are another example of a non-shareable resource. For illustrative purposes, examples of non-sharable data include application config files that must be different per application instance as well as modified application data files if the application is not written to run multiple copies simultaneously. Other examples include stack memory segments or heap segments may also be non-sharable data, shared memory keys that are a fixed value, usage of fixed well-known (to the application) TCP port numbers, and process identifiers (two distinct processes cannot share the same PID).
  • The snapshot virtual template is constructed automatically by dividing a snapshot process into shareable and non-shareable data. The knowledge of which system resources can be shared is encoded in the snapshot virtual templating framework itself. If an application has non-shareable internal resources (as opposed to system resources), it may not be possible to construct a virtual-template for that application.
  • Snapshot virtual templates are node-independent as well as application-instance dependent. Snapshot virtual templates cannot be created for applications that use non-shareable physical devices. Snapshot virtual templates must save references to non-shareable resources in their pre- customized form, rather than their evaluated form. All access by an application to non-shareable resources must be via the operating system. Internal or implicit dependencies by the application itself cannot be virtually-templated. A snapshot virtual template may be created from an application instance that was originally forged from a different virtual template.
  • Snapshot virtual templating is an alternate method of creating an application instance. The snapshot restore method described above requires creating unique instances of an application to create unique “snapshots” of that application. Virtual templating allows the creation of a generic application instance from which unique instances may be spawned. Every unique instance that is created from the original virtual template starts out as an exact copy (referred to herein as “clone”) but has been personalized just enough to make it a fully-finctioning independent copy. Differences between copies may be due to the way resources are named or identified.
  • FIG. 7 illustrates in block diagram form the contents of a snapshot virtual template. The main components are resource name size, resource descriptor size, resource type, resource name, and resource data. Resource data includes many different types of information, as illustrated.
  • FIG. 8 describes the sequence of steps executed by the application snapshot/restore framework 200 to create a snapshot virtual template. As the application runs, every request for a new operating system resource (file, memory, semaphore, etc.) is checked for an existing rule. When the application is started under the virtual templating framework, a set of rules may be supplied at that time. The rule will state the type of resource, the type of access (i.e., create, read, write, destroy, etc), and the action to be taken. If a rule is found (decision step 360), the rule is saved as part of the process state and recorded with the resource as auxiliary state at step 362. Rules may be added to the template that control the creation of application-instance specific resources. For example, environment variables or pathnames that incorporate an AID to differentiate and customize a particular resource among multiple instances. The following syntax created for illustration purposes:
    Define <APPL-ID> as PROPERTY application-ID
    REDIR PATH “/user/app/config” to “/usr/app/<APPL-ID>/config”
    SET ENV “HOME” = “/usr/app/<APPL-ID>”
  • If rules are created, they should also be specified via the application configurator. If no rule is found, the resource is checked using a standard set of criteria that determine whether the resource needs to be abstracted or virtualized in order to be cloned at step 364. The criteria is again checked at steps 366, 370, 372, 378, 380 and 386. In most cases, no action is taken. Resources are simply classified into their correct types so that when an instance is cloned the correct action can be taken. If the resource is shared, i.e. shared memory (decision step 366), the resource is marked as shared (step 368) so that during the subsequent snapshot all references to the shared object will be noted. If the resource can be modified (decision step 370), it must be isolated from the original during cloning so that the original remains untouched. If the resource is a large object and has a notion of an underlying object, such as i.e. mapped memory (decision step 372), it is marked for copy-on-write (step 374). Otherwise, the entire resource must be duplicated and marked accordingly (step 376). A resource is said to be systemwide unique if the identifier used to represent that resource cannot represent more than one instance of that resource at a single point in time on the same node or computer. If the resource is systemwide unique (decision step 378), and is exported as an external interface, as is the case when another client application that is not running on the platform has a dependency on the resource, such as a TCP port number (decision step 380), it is marked to be multiplexed (step 382). Multiplexing allows multiple independent connections to transparently co-exist over the same transport using only a single identifiable resource. If it isn't externally exported, the resource is marked for virtualize at step 384. Continuing to decision step 386, if the resource is network-unique, it is marked for allocation at step 388. Control proceeds to step 390, where the resource request is processed. Steps 360 through 390 are repeated for every resource request occurring during application execution.
  • FIG. 9 illustrates the sequence of steps executed to perform cloning or replication of a process from a snapshot virtual template. This sequence of steps can be performed by a replication program that creates a new snapshot image from an existing template, or by the restore driver 220. When an application instance is restored from a snapshot that is a virtual template, a new instance is automatically cloned from the template using the rules that were gathered during the creation of the template. For every resource included in the snapshot virtual template, rules for the resource and access type are looked up. Any resource that requires special handling as part of the templating effort has the rule described inside the snapshot template as part of the auxiliary state associated with the resource. If no rule is found (decision step 400), the resource is recreated using the existing saved information in the snapshot (step 402). Otherwise, if a resource is marked for duplicate (decision step 404), then a copy of the original resource is made at step 406. If a resource is marked for copy-on-write (decision step 408), then at step 410 a reference to the original underlying object (in the original template) is kept, and any modifications to the original force a copy-on-write action so that the modifications are kept in an application-instance private location and the two form a composite view that is visible to the application instance.
  • If a resource is marked for virtualization (decision step 412), the original resource is allocated or duplicated in blank form at step 414. At step 416, the resource is mapped dynamically to the new resource at run-time by binding the system resource to the saved resource in the snapshot image. If a resource is marked for multiplex (decision step 418), the original resource is duplicated and then spliced among other application instances that share it (step 420). If the resource is a network unique resource (decision step 422), a unique resource must be allocated (step 424) by communicating with another component of the network, i.e. network map or registry, that assigns a resource to this instance. Then this new resource is bound to the fixed resource that was saved in the virtual template (step 426), in a manner similar to virtualization.
  • C. Virtual Resource ID Mapping
  • The present invention provides virtual mapping of system resource identifiers in use by a software application for the purpose of making the running state of an application node independent. By adding a layer of indirection between the application and the resource, new system resources are reallocated and then can be mapped to the application's existing resource requirements while it is running, without the application detecting a failure or change in resource handles.
  • This layer of indirection makes the application's system RID transparent to the application. RID's are usually numeric in form, but can also be alphanumeric. RID's are unique to a machine, and can be reused once all claims to a specific RID have been given up. Some examples of RID's include process ID's, shared memory ID's, and semaphore ID's. Only the virtual RID is visible to the application. Conversely, the virtual RID is transparent to the OS, and only the system RID is visible to the OS. Every application has a unique identifier that distinguishes it from every other running application. There exists a one to one mapping between the AID: resource type: virtual RID combination and the node ID: system RID. Virtual RID's are only required to be unique within their respective applications, along with their corresponding system RID's may be shared among multiple programs and processes that have the same AID. System RID's that have been virtualized are accessed through their virtual ID's to ensure consistent states.
  • AID's are farm-wide unique resources and are allocated atomically by the AID generator. Because in the present invention applications aren't uniquely bound to specific names, process ID's, machine hostnames or points in time, the AID is the sole, definitive reference to a running application and its processes. Typically, an AID is defined in reference to a logical task that the application is performing or by the logical user that is running the application.
  • Virtual resource mapping comprises several basic steps: application registration, allocation of the RID, and resolution of the RID. During registration of the application, the AID is derived if preallocated or the application existed previously, or it may be allocated dynamically by an AID generator. The AID is then made known for later use. Allocation of a RID happens when an application requests access to a system resource (new or existing) and the OS returns a handle to a resource in the form of a RID. The virtual resource layer intercepts the system returned RID, allocates a virtual counterpart by calling the resource specific resource allocator, establishes mapping between the two, and returns a new virtual RID to the application.
  • Resolution of a RID may occur in two different directions. A RID may be passed from the application to the OS, in which case the RID is mapped from virtual ID to system ID. Conversely, the RID may be passed from the OS to the application, in which case the transition is from system ID to virtual ID. Requests for translation are passed from the framework to the virtual RID translation unit and the corresponding mapping is returned once it has been fetched from the appropriate translation table. Multiple translation tables may exist if there are multiple resource types.
  • FIG. 10 illustrates the steps executed to register an application. The AppShot harness 500 exists to aid in the creation of the appropriate runtime environment for the application prior to launching the application. The appshot harness 500 initializes the runtime environment for an application by first priming its own environment with the appropriate settings and then launching the application which inherits all these settings. The appshot harness 500 is provided because the application cannot be recompiled or rewritten to initialize its own environment. Some of the settings that are established by the appshot harness 500 include the AID, assigned process ID range, DSL specifications, application virtual ID's, and snapshot templating rules. The DSL specifications are registered as part of the environment. A process is an in-memory instantiation of a software program. Processx is the in-memory image of the AppShot harness 500 and processy is the in-memory image of the application. At step 510, the appshot harness 500 registers an AID ai, such as “dbserver.” with the application snapshot/restore framework 200 within the OS kernel 206. The application snapshot/restore framework 200 then creates virtual translation tables 502 for the AID at step 512. Virtual translation tables 502 are data units that contain translation information related to RID's, such as AID's or process ID's, virtual RID'S, and system RID's. Separate tables can be implemented per resource type or a table can be shared if a unique resource type is stored per table entry. A translation unit maps the system RID's to the virtual RID's by storing and fetching translation information in the appropriate translation table. Once the virtual translation tables 502 are created, Processx is linked to the AID ai at step 514. At this point, processy is created when the appshot harness 500 launches the application at step 516. Processy then inherits processy's link to ai and its tables at step 518.
  • FIG. 11 shows the allocation of a virtual resource such as a semaphore in accordance with the present invention. At step 520, an application requests that a semaphore resource is allocated for its processy. In response (step 522), the application snapshot/restore framework 200 looks up the AID in memory 154, and returns AID ai. At step 524, in response to a request from the application snapshot/restore framework 200, the system semaphore pool returns semaphore si. At step 526, the application snapshot/restore framework 200 scans the virtual resource translation table 502 for an available slot and allocates the virtual semaphore. At step 528, the application snapshot/restore framework 200 inserts the translation si=ai:v3 and the virtual resource translation table 502 now contains the mapping. At step 530, the virtual semaphore v3 is returned to the application.
  • FIG. 12 illustrations translation of a virtual resource to a system resource in accordance with the present invention. At step 532, the application calls the semaphore interface and supplies the virtual RID v3 to the application snapshot/restore framework 200. At step 534, the application snapshot/restore framework 200 looks up the AID for the calling application and returns ai. At step 536, the application snapshot/restore framework 200 then looks up the translation for ai:v3 in the virtual resource translation table 502, which returns si at step 538. At step 540, the OS semaphore implementation is achieved when the application snapshot/restore framework 200 forwards the application's request by substituting si for v3.
  • FIG. 13 illustrates translation of a system resource to a virtual resource. Beginning at step 542, the application calls the semaphore interface and expects the RID as a result. At step 544, the application snapshot/restore framework 200 looks up the AID for the calling application and returns ai. At step 546, the application snapshot/restore framework 200 forwards the application request to the OS semaphore implementation, which returns the system semaphore si at step 548. At step 550, the application snapshot/restore framework 200 then looks up the translation for ai:s1 in the virtual resource translation table 502, which returns v3 at step 552. At step 554, the application snapshot/restore framework 200 returns the virtual RID V3 to the calling application.
  • FIG. 14 illustrates the logical sequence of steps executed to create the virtual translation table 502. Beginning at step 556, and attempt is made to register AID ai. If the AID hasn't already been registered (decision step 558), a virtual resource translation table space for ai is created in table 502 (step 560). Translation tables are then added for each type of resource associated with the application at step 562. At step 564, the processx is linked to ai. At step 566, the processy is created and the application is launched. Steps 568 and 570 show the parallel paths of execution. The flow of control continues on to step 568 and halts shortly thereafter. The new flow of execution continues on from 566 to 570, where the process inherits context from the process at step 568.
  • FIG. 15 illustrates in greater detail the sequence of steps executed to translate a virtual resource. For illustrative purposes, the resource in this example is a semaphore. Beginning at decision step 580, if an AID is found upon lookup, and the interface uses the RID as a parameter (decision step 582), the application snapshot/restore framework 200 performs a lookup of the translation for a1:v1 at step 584. If a system resource s1 is found, the system RID is substituted for the virtual RID at step 586 and passed to the semaphore interface of the OS 206 (step 588). If the semaphore was not allocated by the semaphore interface (decision step 590), and the interface returns a semaphore (decision step 592) control proceeds to step 594 where a reverse lookup for the translation of the AID with a system RID is performed. The returned virtual RID is then substituted for the virtual ID at step 596. Returning to decision step 590, if a semaphore was allocated by the semaphore interface, control proceeds to step 598 where the virtual semaphore is allocated and a translation for v2=a1:s2 is inserted into the translation table 502 at step 600. V2 is then substituted for s2 at step 602.
  • In another aspect, the present invention provides communication between at least two applications through virtual port multiplexing. The communication is achieved by accepting a connection from a second application on a first port and allocating a second port to receive the communication from the second application. Once the second port has been allocated the second port translation is recorded. The communication is sent to the first port from the second application and received on the second port. The communication is then delivered to a first application from the second port. In one embodiment the first application requests the communication from the first port and the first port is translated to determine the second port such that the communication is delivered to the first application in the step of delivering the communication to the first application.
  • In one embodiment, the communication is received on the first port following the step of sending the data to the first port, the first port is translated to determine the second port prior to the step of receiving the communication on the second port, and the step of receiving the communication on the second port includes queuing the communication on the second port from the first port.
  • In one embodiment, the second application requests to connect with the first port prior to the step of accepting the connection. Once the second port is allocated, the second port is negotiated including negotiating the second port between a first and second virtual port multiplexer. Further, the second application is connected with the second port following the step of allocating the second port. The step of recording the translation including, first, recording the translation of the second port in association with the first application, and second, recording the translation of the second port in association with the second application.
  • The present invention also provides for a dynamic symbolic link (DSL) and the resolution of that DSL. The pathname of a first application is renamed to a target pathname, a variable within the target pathname, the first pathname is defined as a symbolic link and the symbolic link is associated with a virtual pathname. The method and apparatus further defines a specification is further defined that is associated with the virtual pathname including associating the variable with the virtual pathname. In associating the symbolic link with the virtual pathname, a declaration is defined within the virtual pathname.
  • Having disclosed exemplary embodiments and the best mode, modifications and variations may be made to the disclosed embodiments while remaining within the scope of the present invention as defined by the following claims.

Claims (29)

1-8. (canceled)
9. A method comprising:
executing a first instance of an application;
during execution of the first instance, recording access by the application to one or more system resources and classifying each system resource as either a shareable resource or a nonshareable resource;
creating a template describing which of the system resources are shareable resources and which of the system resources are nonshareable resources;
snapshotting a state of the first instance to a snapshot image;
creating a second instance of the application; and
restoring the snapshot image to the second instance, wherein the restoring comprises:
using the template to identify the shareable and nonshareable resources;
providing the shareable resources to the second instance from the snapshot image; and
mapping each nonshareable resource to a corresponding system resource.
10. The method as recited in claim 9 wherein mapping each nonshareable resource is dependent on a type of the nonshareable resource.
11. The method as recited in claim 10 wherein the mapping comprises copying the nonshareable resource on write to the corresponding system resource.
12. The method as recited in claim 11 wherein the type comprises memory or storage data.
13. The method as recited in claim 10 wherein the mapping comprises virtualizing the nonshareable resource on allocation of the nonshareable resource.
14. The method as recited in claim 13 wherein the type comprises a systemwide unique resource that is not externally exported.
15. The method as recited in claim 10 wherein the mapping comprises customizing the nonshareable resource for the second instance.
16. The method as recited in claim 15 wherein the type comprises a process-unique resource.
17. The method as recited in claim 10 wherein the mapping comprises multiplexing the nonshareable resource.
18. The method as recited in claim 17 wherein the type comprises a systemwide unique resource that is externally exported.
19. The method as recited in claim 10 wherein the mapping comprises allocating the corresponding system resource in place of the nonshareable resource.
20. The method as recited in claim 19 wherein the type comprises a network-wide unique resource.
21. The method as recited in claim 10 wherein the classifying is responsive to one or more user-defined rules, and wherein the mapping is responsive to a first rule of the one or more rules that the nonshareable resource matches.
22. The method as recited in claim 9 further comprising:
creating a third instance of the application; and
restoring the snapshot image to the third instance, wherein the restoring comprises:
using the template to identify the shareable and nonshareable resources;
providing the shareable resources to the third instance from the snapshot image; and
mapping each nonshareable resource to a corresponding system resource, wherein the second instance and the third instance do not interfere with each other.
23. A computer readable medium storing a plurality of instructions including instructions which, when executed:
during execution of a first instance of an application, record access by the application to one or more system resources and classify each system resource as either a shareable resource or a nonshareable resource;
create a template describing which of the system resources are shareable resources and which of the system resources are nonshareable resources;
snapshot a state of the first instance to a snapshot image; and
restore the snapshot image to a second instance of the application that is distinct from the first instance, wherein the restore comprises:
using the template to identify the shareable and nonshareable resources;
providing the shareable resources to the second instance from the snapshot image; and
mapping each nonshareable resource to a corresponding system resource.
24. The computer readable medium as recited in claim 23 wherein mapping each nonshareable resource is dependent on a type of the nonshareable resource.
25. The computer readable medium as recited in claim 24 wherein the mapping comprises copying the nonshareable resource on write to the corresponding system resource.
26. The computer readable medium as recited in claim 25 wherein the type comprises memory or storage data.
27. The computer readable medium as recited in claim 24 wherein the mapping comprises virtualizing the nonshareable resource on allocation of the nonshareable resource.
28. The computer readable medium as recited in claim 27 wherein the type comprises a systemwide unique resource that is not externally exported.
29. The computer readable medium as recited in claim 24 wherein the mapping comprises customizing the nonshareable resource for the second instance.
30. The computer readable medium as recited in claim 29 wherein the type comprises a process-unique resource.
31. The computer readable medium as recited in claim 24 wherein the mapping comprises multiplexing the nonshareable resource.
32. The computer readable medium as recited in claim 31 wherein the type comprises a systemwide unique resource that is externally exported.
33. The computer readable medium as recited in claim 24 wherein the mapping comprises allocating the corresponding system resource in place of the nonshareable resource.
34. The computer readable medium as recited in claim 33 wherein the type comprises a network-wide unique resource.
35. The computer readable medium as recited in claim 24 wherein the classifying is responsive to one or more user-defined rules, and wherein the mapping is responsive to a first rule of the one or more rules that the nonshareable resource matches.
36. A computer system comprising:
a first module configured, during execution of a first instance of an application, to record access by the application to one or more system resources; to classify each system resource as either a shareable resource or a nonshareable resource; and to create a template describing which of the system resources are shareable resources and which of the system resources are nonshareable resources; a snapshot driver configured to snapshot a state of the first instance to a snapshot image; and
a second module, wherein the first module is configured to restore the snapshot image to a second instance of the application that is distinct from the first instance, wherein the restore comprises the first module using the template to identify the shareable and nonshareable resources; the first module providing the shareable resources to the second instance from the snapshot image; and the second module mapping each nonshareable resource to a corresponding system resource.
US11/096,747 1999-10-05 2005-04-01 Snapshot virtual-templating Abandoned US20050198647A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/096,747 US20050198647A1 (en) 1999-10-05 2005-04-01 Snapshot virtual-templating

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US15783399P 1999-10-05 1999-10-05
US15772999P 1999-10-05 1999-10-05
US15772799P 1999-10-05 1999-10-05
US15772899P 1999-10-05 1999-10-05
US15783499P 1999-10-05 1999-10-05
US09/684,373 US6917963B1 (en) 1999-10-05 2000-10-05 Snapshot image for the application state of unshareable and shareable data
US11/096,747 US20050198647A1 (en) 1999-10-05 2005-04-01 Snapshot virtual-templating

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/684,373 Continuation US6917963B1 (en) 1999-10-05 2000-10-05 Snapshot image for the application state of unshareable and shareable data

Publications (1)

Publication Number Publication Date
US20050198647A1 true US20050198647A1 (en) 2005-09-08

Family

ID=34743994

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/684,373 Expired - Lifetime US6917963B1 (en) 1999-10-05 2000-10-05 Snapshot image for the application state of unshareable and shareable data
US11/096,747 Abandoned US20050198647A1 (en) 1999-10-05 2005-04-01 Snapshot virtual-templating

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/684,373 Expired - Lifetime US6917963B1 (en) 1999-10-05 2000-10-05 Snapshot image for the application state of unshareable and shareable data

Country Status (1)

Country Link
US (2) US6917963B1 (en)

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040103221A1 (en) * 2002-11-21 2004-05-27 International Business Machines Corporation Application-level access to kernel input/output state
US20060195688A1 (en) * 2005-02-28 2006-08-31 International Business Machines Corporation Method, system and program product for managing applications in a shared computer infrastructure
US20060212512A1 (en) * 2005-02-28 2006-09-21 International Business Machines Corporation Method, system, and program product for optimizing monitoring and discovery services for a grid computing environment
US20060282837A1 (en) * 2005-06-08 2006-12-14 John Almeida method for global resource sharing having logically linked means and integrated functionality for building solutions
US20070033636A1 (en) * 2005-08-03 2007-02-08 Novell, Inc. Autonomous policy discovery
US20070209034A1 (en) * 2006-03-01 2007-09-06 International Business Machines Corporation Method, system, and program product for deploying a platform dependent application in a grid environment
US20100037206A1 (en) * 2008-08-07 2010-02-11 Code Systems Corporation Method and system for configuration of virtualized software applications
US20100037235A1 (en) * 2008-08-07 2010-02-11 Code Systems Corporation Method and system for virtualization of software applications
US20110185043A1 (en) * 2010-01-27 2011-07-28 Code Systems Corporation System for downloading and executing a virtual application
US20130007227A1 (en) * 2011-06-28 2013-01-03 Hitomi Arthur S Local streaming proxy server
US8468175B2 (en) 2010-07-02 2013-06-18 Code Systems Corporation Method and system for building a streaming model
US8539496B1 (en) * 2005-12-12 2013-09-17 At&T Intellectual Property Ii, L.P. Method and apparatus for configuring network systems implementing diverse platforms to perform business tasks
US20130339945A1 (en) * 2007-04-09 2013-12-19 Sugarcrm Inc. Multi-instance "shadow" system and method for automated resource redundancy reduction across dynamic language applications utilizing application of dynamically generated templates
US8763009B2 (en) 2010-04-17 2014-06-24 Code Systems Corporation Method of hosting a first application in a second application
US8954958B2 (en) 2010-01-11 2015-02-10 Code Systems Corporation Method of configuring a virtual application
US9021015B2 (en) 2010-10-18 2015-04-28 Code Systems Corporation Method and system for publishing virtual applications to a web server
US9032199B1 (en) * 2012-12-28 2015-05-12 Google Inc. Systems, devices, and methods for capturing information, creating loadable images, and providing for restarts in a computer system
US9106425B2 (en) 2010-10-29 2015-08-11 Code Systems Corporation Method and system for restricting execution of virtual applications to a managed process environment
US9104517B2 (en) 2010-01-27 2015-08-11 Code Systems Corporation System for downloading and executing a virtual application
GB2526088A (en) * 2014-05-12 2015-11-18 Sony Comp Entertainment Europe Apparatus and method of data capture
US9229748B2 (en) 2010-01-29 2016-01-05 Code Systems Corporation Method and system for improving startup performance and interoperability of a virtual application
US9386057B2 (en) 2012-01-18 2016-07-05 Numecent Holdings, Inc. Application streaming and execution system for localized clients
US9485304B2 (en) 2012-04-30 2016-11-01 Numecent Holdings, Inc. Asset streaming and delivery
US9575740B2 (en) * 2015-01-21 2017-02-21 Samsung Electronics Co., Ltd. Apparatus and method for running multiple instances of a same application in mobile devices
US9661048B2 (en) 2013-01-18 2017-05-23 Numecent Holding, Inc. Asset streaming and delivery
EP3327586A1 (en) * 2016-11-28 2018-05-30 Sap Se Physio-logical logging for in-memory row-oriented database system
US10021168B2 (en) 2012-09-11 2018-07-10 Numecent Holdings, Inc. Application streaming using pixel streaming
US11544234B2 (en) 2020-11-12 2023-01-03 International Business Machines Corporation Virtualizing specific values in a guest configuration based on the underlying host symbol repository
US11740992B2 (en) 2007-11-07 2023-08-29 Numecent Holdings, Inc. Deriving component statistics for a stream enabled application
EP4239474A4 (en) * 2020-11-26 2024-04-10 Huawei Technologies Co., Ltd. Serverless container starting method and related device
US12081548B2 (en) 2006-10-23 2024-09-03 Numecent Holdings, Inc. Rule-based application access management

Families Citing this family (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001026267A1 (en) * 1999-10-05 2001-04-12 Ejasent Inc. Virtual port multiplexing
US6917963B1 (en) * 1999-10-05 2005-07-12 Veritas Operating Corporation Snapshot image for the application state of unshareable and shareable data
US7320033B2 (en) * 2001-07-27 2008-01-15 Intel Corporation Dynamic local drive and printer sharing
US20130024812A1 (en) 2011-07-13 2013-01-24 Z124 Foreground/background assortment of hidden windows
US9047102B2 (en) 2010-10-01 2015-06-02 Z124 Instant remote rendering
US9152582B2 (en) 2010-10-01 2015-10-06 Z124 Auto-configuration of a docked system in a multi-OS environment
US8933949B2 (en) 2010-10-01 2015-01-13 Z124 User interaction across cross-environment applications through an extended graphics context
US8819705B2 (en) 2010-10-01 2014-08-26 Z124 User interaction support across cross-environment applications
US8966379B2 (en) 2010-10-01 2015-02-24 Z124 Dynamic cross-environment application configuration/orientation in an active user environment
US8726294B2 (en) 2010-10-01 2014-05-13 Z124 Cross-environment communication using application space API
US20030055965A1 (en) * 2001-09-20 2003-03-20 International Business Machines Corporation User-defined units of context in a distributed computer environment
US7171470B2 (en) * 2003-02-20 2007-01-30 International Business Machines Corporation Grid service scheduling of related services using heuristics
US9164540B2 (en) 2010-10-01 2015-10-20 Z124 Method and apparatus for moving display during a device flip
US7472391B2 (en) * 2004-02-20 2008-12-30 Microsoft Corporation Resource loader for applications that utilize relative uniform resource identifiers
US7484220B2 (en) * 2004-05-26 2009-01-27 Qualcomm Incorporated Method, software and apparatus for using application state history information when re-launching applications
US7581220B1 (en) * 2005-11-22 2009-08-25 Symantec Operating Corporation System and method for modifying user memory from an arbitrary kernel state
KR100737521B1 (en) 2005-11-24 2007-07-10 한국전자통신연구원 Method and system for collecting and restoring application states
US8260924B2 (en) * 2006-05-03 2012-09-04 Bluetie, Inc. User load balancing systems and methods thereof
US8056082B2 (en) * 2006-05-31 2011-11-08 Bluetie, Inc. Capacity management and predictive planning systems based on trended rate change of monitored factors and methods thereof
US8327350B2 (en) * 2007-01-02 2012-12-04 International Business Machines Corporation Virtual resource templates
US8108855B2 (en) * 2007-01-02 2012-01-31 International Business Machines Corporation Method and apparatus for deploying a set of virtual software resource templates to a set of nodes
US10019570B2 (en) * 2007-06-14 2018-07-10 Microsoft Technology Licensing, Llc Protection and communication abstractions for web browsers
US8370802B2 (en) 2007-09-18 2013-02-05 International Business Machines Corporation Specifying an order for changing an operational state of software application components
US8473918B2 (en) 2008-01-21 2013-06-25 International Business Machines Corporation Method for singleton process control
WO2010042109A1 (en) * 2008-10-07 2010-04-15 Hewlett-Packard Development Company, L.P. Creating snapshots of data using a selected one of different snapshot algorithms
US8291261B2 (en) * 2008-11-05 2012-10-16 Vulcan Technologies Llc Lightweight application-level runtime state save-and-restore utility
US7941700B2 (en) 2009-03-02 2011-05-10 Microsoft Corporation Operating system-based application recovery
US8832684B2 (en) * 2009-06-18 2014-09-09 The Johns Hopkins University Methods for improving atomicity of runtime inspections
US8566640B2 (en) 2010-07-19 2013-10-22 Veeam Software Ag Systems, methods, and computer program products for instant recovery of image level backups
CN103262057B (en) 2010-10-01 2016-02-10 Flex Electronics ID Co.,Ltd. Cross-environment communication framework
US8842080B2 (en) 2010-10-01 2014-09-23 Z124 User interface with screen spanning icon morphing
US8761831B2 (en) 2010-10-15 2014-06-24 Z124 Mirrored remote peripheral interface
US9552215B2 (en) 2011-03-08 2017-01-24 Rackspace Us, Inc. Method and system for transferring a virtual machine
US20130067349A1 (en) * 2011-09-12 2013-03-14 Microsoft Corporation Efficiently providing data from a virtualized data source
US8878794B2 (en) 2011-09-27 2014-11-04 Z124 State of screen info: easel
US9027024B2 (en) 2012-05-09 2015-05-05 Rackspace Us, Inc. Market-based virtual machine allocation
US9621650B2 (en) * 2014-09-30 2017-04-11 Google Inc Mobile application state identifier framework
US10303782B1 (en) 2014-12-29 2019-05-28 Veritas Technologies Llc Method to allow multi-read access for exclusive access of virtual disks by using a virtualized copy of the disk
US10198252B2 (en) 2015-07-02 2019-02-05 Microsoft Technology Licensing, Llc Transformation chain application splitting
US9712472B2 (en) 2015-07-02 2017-07-18 Microsoft Technology Licensing, Llc Application spawning responsive to communication
US9785484B2 (en) 2015-07-02 2017-10-10 Microsoft Technology Licensing, Llc Distributed application interfacing across different hardware
US9733915B2 (en) 2015-07-02 2017-08-15 Microsoft Technology Licensing, Llc Building of compound application chain applications
US10261985B2 (en) 2015-07-02 2019-04-16 Microsoft Technology Licensing, Llc Output rendering in dynamic redefining application
US9658836B2 (en) 2015-07-02 2017-05-23 Microsoft Technology Licensing, Llc Automated generation of transformation chain compatible class
US9860145B2 (en) 2015-07-02 2018-01-02 Microsoft Technology Licensing, Llc Recording of inter-application data flow
US9733993B2 (en) 2015-07-02 2017-08-15 Microsoft Technology Licensing, Llc Application sharing using endpoint interface entities
US10198405B2 (en) 2015-07-08 2019-02-05 Microsoft Technology Licensing, Llc Rule-based layout of changing information
US10031724B2 (en) 2015-07-08 2018-07-24 Microsoft Technology Licensing, Llc Application operation responsive to object spatial status
US10277582B2 (en) 2015-08-27 2019-04-30 Microsoft Technology Licensing, Llc Application service architecture
US10417142B2 (en) * 2016-06-17 2019-09-17 Red Hat Israel, Ltd. Operating system integrated application isolation
US10324803B1 (en) * 2016-09-27 2019-06-18 Amazon Technologies, Inc. Storage snapshot management
US10901781B2 (en) 2018-09-13 2021-01-26 Cisco Technology, Inc. System and method for migrating a live stateful container
CN118605960A (en) * 2023-02-28 2024-09-06 华为技术有限公司 Instance starting acceleration method and related device

Citations (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5067072A (en) * 1987-11-06 1991-11-19 Visystems, Inc. Virtual software machine which preprocesses application program to isolate execution dependencies and uses target computer processes to implement the execution dependencies
US5088031A (en) * 1985-02-20 1992-02-11 Hitachi, Ltd. Virtual machine file control system which translates block numbers into virtual addresses then into real addresses for accessing main storage
US5109510A (en) * 1986-01-17 1992-04-28 International Business Machines Corporation System concurrently running application programs and selectively routing device input to resource controller created virtual terminals and real physical devices
US5365606A (en) * 1991-11-27 1994-11-15 Visystems, Inc. Virtual software machine running multiple program modules in a single address space of a target computer
US5403639A (en) * 1992-09-02 1995-04-04 Storage Technology Corporation File server having snapshot application data groups
US5530795A (en) * 1994-02-15 1996-06-25 Wan; Hong K. Computer conferencing
US5608720A (en) * 1993-03-09 1997-03-04 Hubbell Incorporated Control system and operations system interface for a network element in an access system
US5649452A (en) * 1995-04-11 1997-07-22 Grand Haven Stamped Products, A Division Of Jsj Corp. Shifter with means for actuating cable to key mechanism
US5666553A (en) * 1992-04-10 1997-09-09 Puma Technology, Inc. Method for mapping, translating, and dynamically reconciling data between disparate computer platforms
US5678042A (en) * 1993-11-15 1997-10-14 Seagate Technology, Inc. Network management system having historical virtual catalog snapshots for overview of historical changes to files distributively stored across network domain
US5734865A (en) * 1995-06-07 1998-03-31 Bull Hn Information Systems Inc. Virtual local area network well-known port routing mechanism for mult--emulators in an open system environment
US5758355A (en) * 1996-08-07 1998-05-26 Aurum Software, Inc. Synchronization of server database with client database using distribution tables
US5790114A (en) * 1996-10-04 1998-08-04 Microtouch Systems, Inc. Electronic whiteboard with multi-functional user interface
US5822523A (en) * 1996-02-01 1998-10-13 Mpath Interactive, Inc. Server-group messaging system for interactive applications
US5889945A (en) * 1995-12-27 1999-03-30 Intel Corporation System for dynamically updating information in panels within an attendee bar corresponding to a conference session when selected information regarding to conferencing participants changes
US5896500A (en) * 1993-10-01 1999-04-20 Collaboration Properties, Inc. System for call request which results in first and second call handle defining call state consisting of active or hold for its respective AV device
US6131148A (en) * 1998-01-26 2000-10-10 International Business Machines Corporation Snapshot copy of a secondary volume of a PPRC pair
US6173332B1 (en) * 1996-03-06 2001-01-09 Paul L. Hickman Method and apparatus for computing over a wide area network
US6205450B1 (en) * 1997-10-31 2001-03-20 Kabushiki Kaisha Toshiba Computer system capable of restarting system using disk image of arbitrary snapshot
US6212531B1 (en) * 1998-01-13 2001-04-03 International Business Machines Corporation Method for implementing point-in-time copy using a snapshot function
US6269431B1 (en) * 1998-08-13 2001-07-31 Emc Corporation Virtual storage and block level direct access of secondary storage for recovery of backup data
US6324690B1 (en) * 1993-09-30 2001-11-27 Intel Corporation Installation of application software through a network from a source computer system on to a target computer system
US6363421B2 (en) * 1998-05-31 2002-03-26 Lucent Technologies, Inc. Method for computer internet remote management of a telecommunication network element
US6385613B1 (en) * 1996-06-25 2002-05-07 Oracle Corporation Resource management using resource domains
US6442663B1 (en) * 1998-06-19 2002-08-27 Board Of Supervisors Of Louisiana University And Agricultural And Mechanical College Data collection and restoration for homogeneous or heterogeneous process migration
US6457849B2 (en) * 2000-02-21 2002-10-01 Koito Manufacturing Co., Ltd. Vehicle head lamp
US6848106B1 (en) * 1999-10-05 2005-01-25 Veritas Operating Corporation Snapshot restore of application chains and applications
US6917963B1 (en) * 1999-10-05 2005-07-12 Veritas Operating Corporation Snapshot image for the application state of unshareable and shareable data

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5649152A (en) * 1994-10-13 1997-07-15 Vinca Corporation Method and system for providing a static snapshot of data stored on a mass storage system
US5909545A (en) * 1996-01-19 1999-06-01 Tridia Corporation Method and system for on demand downloading of module to enable remote control of an application program over a network
US6567849B2 (en) * 1998-08-17 2003-05-20 International Business Machines Corporation System and method for configuring and administering multiple instances of web servers

Patent Citations (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5088031A (en) * 1985-02-20 1992-02-11 Hitachi, Ltd. Virtual machine file control system which translates block numbers into virtual addresses then into real addresses for accessing main storage
US5109510A (en) * 1986-01-17 1992-04-28 International Business Machines Corporation System concurrently running application programs and selectively routing device input to resource controller created virtual terminals and real physical devices
US5067072A (en) * 1987-11-06 1991-11-19 Visystems, Inc. Virtual software machine which preprocesses application program to isolate execution dependencies and uses target computer processes to implement the execution dependencies
US5365606A (en) * 1991-11-27 1994-11-15 Visystems, Inc. Virtual software machine running multiple program modules in a single address space of a target computer
US5666553A (en) * 1992-04-10 1997-09-09 Puma Technology, Inc. Method for mapping, translating, and dynamically reconciling data between disparate computer platforms
US5403639A (en) * 1992-09-02 1995-04-04 Storage Technology Corporation File server having snapshot application data groups
US5608720A (en) * 1993-03-09 1997-03-04 Hubbell Incorporated Control system and operations system interface for a network element in an access system
US6324690B1 (en) * 1993-09-30 2001-11-27 Intel Corporation Installation of application software through a network from a source computer system on to a target computer system
US5896500A (en) * 1993-10-01 1999-04-20 Collaboration Properties, Inc. System for call request which results in first and second call handle defining call state consisting of active or hold for its respective AV device
US5678042A (en) * 1993-11-15 1997-10-14 Seagate Technology, Inc. Network management system having historical virtual catalog snapshots for overview of historical changes to files distributively stored across network domain
US5530795A (en) * 1994-02-15 1996-06-25 Wan; Hong K. Computer conferencing
US5649452A (en) * 1995-04-11 1997-07-22 Grand Haven Stamped Products, A Division Of Jsj Corp. Shifter with means for actuating cable to key mechanism
US5734865A (en) * 1995-06-07 1998-03-31 Bull Hn Information Systems Inc. Virtual local area network well-known port routing mechanism for mult--emulators in an open system environment
US5889945A (en) * 1995-12-27 1999-03-30 Intel Corporation System for dynamically updating information in panels within an attendee bar corresponding to a conference session when selected information regarding to conferencing participants changes
US5822523A (en) * 1996-02-01 1998-10-13 Mpath Interactive, Inc. Server-group messaging system for interactive applications
US6173332B1 (en) * 1996-03-06 2001-01-09 Paul L. Hickman Method and apparatus for computing over a wide area network
US6385613B1 (en) * 1996-06-25 2002-05-07 Oracle Corporation Resource management using resource domains
US5758355A (en) * 1996-08-07 1998-05-26 Aurum Software, Inc. Synchronization of server database with client database using distribution tables
US5790114A (en) * 1996-10-04 1998-08-04 Microtouch Systems, Inc. Electronic whiteboard with multi-functional user interface
US6205450B1 (en) * 1997-10-31 2001-03-20 Kabushiki Kaisha Toshiba Computer system capable of restarting system using disk image of arbitrary snapshot
US6212531B1 (en) * 1998-01-13 2001-04-03 International Business Machines Corporation Method for implementing point-in-time copy using a snapshot function
US6131148A (en) * 1998-01-26 2000-10-10 International Business Machines Corporation Snapshot copy of a secondary volume of a PPRC pair
US6363421B2 (en) * 1998-05-31 2002-03-26 Lucent Technologies, Inc. Method for computer internet remote management of a telecommunication network element
US6442663B1 (en) * 1998-06-19 2002-08-27 Board Of Supervisors Of Louisiana University And Agricultural And Mechanical College Data collection and restoration for homogeneous or heterogeneous process migration
US6269431B1 (en) * 1998-08-13 2001-07-31 Emc Corporation Virtual storage and block level direct access of secondary storage for recovery of backup data
US6848106B1 (en) * 1999-10-05 2005-01-25 Veritas Operating Corporation Snapshot restore of application chains and applications
US6917963B1 (en) * 1999-10-05 2005-07-12 Veritas Operating Corporation Snapshot image for the application state of unshareable and shareable data
US6457849B2 (en) * 2000-02-21 2002-10-01 Koito Manufacturing Co., Ltd. Vehicle head lamp

Cited By (82)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7117501B2 (en) * 2002-11-21 2006-10-03 International Business Machines Corporation Application-level access to kernel input/output state
US20040103221A1 (en) * 2002-11-21 2004-05-27 International Business Machines Corporation Application-level access to kernel input/output state
US20060195688A1 (en) * 2005-02-28 2006-08-31 International Business Machines Corporation Method, system and program product for managing applications in a shared computer infrastructure
US20060212512A1 (en) * 2005-02-28 2006-09-21 International Business Machines Corporation Method, system, and program product for optimizing monitoring and discovery services for a grid computing environment
US8286157B2 (en) * 2005-02-28 2012-10-09 International Business Machines Corporation Method, system and program product for managing applications in a shared computer infrastructure
US20060282837A1 (en) * 2005-06-08 2006-12-14 John Almeida method for global resource sharing having logically linked means and integrated functionality for building solutions
US7971198B2 (en) 2005-06-08 2011-06-28 Unoweb Inc. Method for global resource sharing having logically linked means and integrated functionality for building solutions
US7774822B2 (en) * 2005-08-03 2010-08-10 Novell, Inc. Autonomous policy discovery
US20070033636A1 (en) * 2005-08-03 2007-02-08 Novell, Inc. Autonomous policy discovery
US8539496B1 (en) * 2005-12-12 2013-09-17 At&T Intellectual Property Ii, L.P. Method and apparatus for configuring network systems implementing diverse platforms to perform business tasks
US7904547B2 (en) 2006-02-21 2011-03-08 International Business Machines Corporation Method, system, and program product for optimizing monitoring and discovery services for a grid computing environment
US20070209034A1 (en) * 2006-03-01 2007-09-06 International Business Machines Corporation Method, system, and program product for deploying a platform dependent application in a grid environment
US8117611B2 (en) 2006-03-01 2012-02-14 International Business Machines Corporation Method, system, and program product for deploying a platform dependent application in a grid environment
US12081548B2 (en) 2006-10-23 2024-09-03 Numecent Holdings, Inc. Rule-based application access management
US20130339945A1 (en) * 2007-04-09 2013-12-19 Sugarcrm Inc. Multi-instance "shadow" system and method for automated resource redundancy reduction across dynamic language applications utilizing application of dynamically generated templates
US11740992B2 (en) 2007-11-07 2023-08-29 Numecent Holdings, Inc. Deriving component statistics for a stream enabled application
US20100037206A1 (en) * 2008-08-07 2010-02-11 Code Systems Corporation Method and system for configuration of virtualized software applications
US8434093B2 (en) 2008-08-07 2013-04-30 Code Systems Corporation Method and system for virtualization of software applications
US9207934B2 (en) 2008-08-07 2015-12-08 Code Systems Corporation Method and system for virtualization of software applications
US8776038B2 (en) * 2008-08-07 2014-07-08 Code Systems Corporation Method and system for configuration of virtualized software applications
US20100037235A1 (en) * 2008-08-07 2010-02-11 Code Systems Corporation Method and system for virtualization of software applications
US20140344315A1 (en) * 2008-08-07 2014-11-20 Code Systems Corporation Method and system for configuration of virtualized software applications
US9779111B2 (en) * 2008-08-07 2017-10-03 Code Systems Corporation Method and system for configuration of virtualized software applications
US9864600B2 (en) 2008-08-07 2018-01-09 Code Systems Corporation Method and system for virtualization of software applications
US8954958B2 (en) 2010-01-11 2015-02-10 Code Systems Corporation Method of configuring a virtual application
US9773017B2 (en) 2010-01-11 2017-09-26 Code Systems Corporation Method of configuring a virtual application
US9104517B2 (en) 2010-01-27 2015-08-11 Code Systems Corporation System for downloading and executing a virtual application
US10409627B2 (en) 2010-01-27 2019-09-10 Code Systems Corporation System for downloading and executing virtualized application files identified by unique file identifiers
US20110185043A1 (en) * 2010-01-27 2011-07-28 Code Systems Corporation System for downloading and executing a virtual application
US8959183B2 (en) 2010-01-27 2015-02-17 Code Systems Corporation System for downloading and executing a virtual application
US9749393B2 (en) 2010-01-27 2017-08-29 Code Systems Corporation System for downloading and executing a virtual application
US9569286B2 (en) 2010-01-29 2017-02-14 Code Systems Corporation Method and system for improving startup performance and interoperability of a virtual application
US11196805B2 (en) 2010-01-29 2021-12-07 Code Systems Corporation Method and system for permutation encoding of digital data
US11321148B2 (en) 2010-01-29 2022-05-03 Code Systems Corporation Method and system for improving startup performance and interoperability of a virtual application
US9229748B2 (en) 2010-01-29 2016-01-05 Code Systems Corporation Method and system for improving startup performance and interoperability of a virtual application
US8763009B2 (en) 2010-04-17 2014-06-24 Code Systems Corporation Method of hosting a first application in a second application
US9626237B2 (en) 2010-04-17 2017-04-18 Code Systems Corporation Method of hosting a first application in a second application
US10402239B2 (en) 2010-04-17 2019-09-03 Code Systems Corporation Method of hosting a first application in a second application
US9208004B2 (en) 2010-04-17 2015-12-08 Code Systems Corporation Method of hosting a first application in a second application
US8626806B2 (en) 2010-07-02 2014-01-07 Code Systems Corporation Method and system for managing execution of virtual applications
US10114855B2 (en) 2010-07-02 2018-10-30 Code Systems Corporation Method and system for building and distributing application profiles via the internet
US9984113B2 (en) 2010-07-02 2018-05-29 Code Systems Corporation Method and system for building a streaming model
US8468175B2 (en) 2010-07-02 2013-06-18 Code Systems Corporation Method and system for building a streaming model
US9218359B2 (en) 2010-07-02 2015-12-22 Code Systems Corporation Method and system for profiling virtual application resource utilization patterns by executing virtualized application
US9639387B2 (en) 2010-07-02 2017-05-02 Code Systems Corporation Method and system for prediction of software data consumption patterns
US9251167B2 (en) 2010-07-02 2016-02-02 Code Systems Corporation Method and system for prediction of software data consumption patterns
US8762495B2 (en) 2010-07-02 2014-06-24 Code Systems Corporation Method and system for building and distributing application profiles via the internet
US8769051B2 (en) 2010-07-02 2014-07-01 Code Systems Corporation Method and system for prediction of software data consumption patterns
US9483296B2 (en) 2010-07-02 2016-11-01 Code Systems Corporation Method and system for building and distributing application profiles via the internet
US8782106B2 (en) 2010-07-02 2014-07-15 Code Systems Corporation Method and system for managing execution of virtual applications
US9208169B2 (en) 2010-07-02 2015-12-08 Code Systems Corportation Method and system for building a streaming model
US10158707B2 (en) 2010-07-02 2018-12-18 Code Systems Corporation Method and system for profiling file access by an executing virtual application
US8914427B2 (en) 2010-07-02 2014-12-16 Code Systems Corporation Method and system for managing execution of virtual applications
US10108660B2 (en) 2010-07-02 2018-10-23 Code Systems Corporation Method and system for building a streaming model
US10110663B2 (en) 2010-10-18 2018-10-23 Code Systems Corporation Method and system for publishing virtual applications to a web server
US9021015B2 (en) 2010-10-18 2015-04-28 Code Systems Corporation Method and system for publishing virtual applications to a web server
US9106425B2 (en) 2010-10-29 2015-08-11 Code Systems Corporation Method and system for restricting execution of virtual applications to a managed process environment
US9209976B2 (en) 2010-10-29 2015-12-08 Code Systems Corporation Method and system for restricting execution of virtual applications to a managed process environment
US9747425B2 (en) 2010-10-29 2017-08-29 Code Systems Corporation Method and system for restricting execution of virtual application to a managed process environment
US9497280B2 (en) 2011-06-28 2016-11-15 Numecent Holdings, Inc. Local streaming proxy server
US9838449B2 (en) 2011-06-28 2017-12-05 Numecent Holdings, Inc. Local streaming proxy server
US20140201387A1 (en) * 2011-06-28 2014-07-17 Numecent Holdings, Inc. Local streaming proxy server
US8676938B2 (en) * 2011-06-28 2014-03-18 Numecent Holdings, Inc. Local streaming proxy server
US8874699B2 (en) * 2011-06-28 2014-10-28 Numecent Holdings, Inc. Local streaming proxy server
US20130007227A1 (en) * 2011-06-28 2013-01-03 Hitomi Arthur S Local streaming proxy server
US9083774B2 (en) 2011-06-28 2015-07-14 Numecent Holdings, Inc. Local streaming proxy server
US9826014B2 (en) 2012-01-18 2017-11-21 Numecent Holdings, Inc. Application streaming and execution for localized clients
US9386057B2 (en) 2012-01-18 2016-07-05 Numecent Holdings, Inc. Application streaming and execution system for localized clients
US9485304B2 (en) 2012-04-30 2016-11-01 Numecent Holdings, Inc. Asset streaming and delivery
US10009399B2 (en) 2012-04-30 2018-06-26 Numecent Holdings, Inc. Asset streaming and delivery
US10021168B2 (en) 2012-09-11 2018-07-10 Numecent Holdings, Inc. Application streaming using pixel streaming
US9032199B1 (en) * 2012-12-28 2015-05-12 Google Inc. Systems, devices, and methods for capturing information, creating loadable images, and providing for restarts in a computer system
US9661048B2 (en) 2013-01-18 2017-05-23 Numecent Holding, Inc. Asset streaming and delivery
US9552224B2 (en) 2014-05-12 2017-01-24 Sony Computer Entertainment Europe Limited Apparatus and method of data capture
GB2526088A (en) * 2014-05-12 2015-11-18 Sony Comp Entertainment Europe Apparatus and method of data capture
GB2526088B (en) * 2014-05-12 2016-03-30 Sony Comp Entertainment Europe Apparatus and method of data capture
US9575740B2 (en) * 2015-01-21 2017-02-21 Samsung Electronics Co., Ltd. Apparatus and method for running multiple instances of a same application in mobile devices
USRE48311E1 (en) * 2015-01-21 2020-11-17 Samsung Electronics Co., Ltd. Apparatus and method for running multiple instances of a same application in mobile devices
EP3327586A1 (en) * 2016-11-28 2018-05-30 Sap Se Physio-logical logging for in-memory row-oriented database system
US10949310B2 (en) 2016-11-28 2021-03-16 Sap Se Physio-logical logging for in-memory row-oriented database system
US11544234B2 (en) 2020-11-12 2023-01-03 International Business Machines Corporation Virtualizing specific values in a guest configuration based on the underlying host symbol repository
EP4239474A4 (en) * 2020-11-26 2024-04-10 Huawei Technologies Co., Ltd. Serverless container starting method and related device

Also Published As

Publication number Publication date
US6917963B1 (en) 2005-07-12

Similar Documents

Publication Publication Date Title
US7103625B1 (en) Virtual resource ID mapping
US6917963B1 (en) Snapshot image for the application state of unshareable and shareable data
US7210147B1 (en) IP virtualization
US9760408B2 (en) Distributed I/O operations performed in a continuous computing fabric environment
US9519795B2 (en) Interconnect partition binding API, allocation and management of application-specific partitions
US8505006B1 (en) Resource management in virtual machines using dynamic table for performing resource queries
US9823851B2 (en) Secure migratable architecture having security features
US8201170B2 (en) Operating systems are executed on common program and interrupt service routine of low priority OS is modified to response to interrupts from common program only
US8145836B2 (en) SCSI protocol emulation for virtual storage device stored on NAS device
US10635499B2 (en) Multifunction option virtualization for single root I/O virtualization
US20080098154A1 (en) Method for forking or migrating a virtual machine
US20070067366A1 (en) Scalable partition memory mapping system
US20070028244A1 (en) Computer system para-virtualization using a hypervisor that is implemented in a partition of the host system
US7552434B2 (en) Method of performing kernel task upon initial execution of process at user level
US7546600B2 (en) Method of assigning virtual process identifier to process within process domain
JP2006522971A (en) operating system
Rath Integration of LXD System Containers with OpenStack, CHEF and its Application on a 3-Tier IoT Architecture
RAsHD et al. Microkernel Operating System Architecture and Mach

Legal Events

Date Code Title Description
AS Assignment

Owner name: VERITAS OPERATING CORPORATION, CALIFORNIA

Free format text: MERGER;ASSIGNOR:EJASENT, INC.;REEL/FRAME:017779/0691

Effective date: 20040105

AS Assignment

Owner name: SYMANTEC CORPORATION, CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:VERITAS OPERATING CORPORATION;REEL/FRAME:019872/0979

Effective date: 20061030

Owner name: SYMANTEC CORPORATION,CALIFORNIA

Free format text: CHANGE OF NAME;ASSIGNOR:VERITAS OPERATING CORPORATION;REEL/FRAME:019872/0979

Effective date: 20061030

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: SYMANTEC OPERATING CORPORATION, CALIFORNIA

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ASSIGNEE PREVIOUSLY RECORDED ON REEL 019872 FRAME 979. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNEE IS SYMANTEC OPERATING CORPORATION;ASSIGNOR:VERITAS OPERATING CORPORATION;REEL/FRAME:027819/0462

Effective date: 20061030