Patents by Inventor Michael Paul DeHaan

Michael Paul DeHaan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100306347
    Abstract: A services tool can detect, monitor, and manage software providing services in and for the network. The services tool can identify different types of software that provides services for the network (“services software”) and types of software that provide support (“support software”) to the services software. The services tool can determine configuration data for both the services software and the support software. The services tool can automatically identify when particular services software needs to be linked to particular support software. The services tool can configure the services software and/or support software to link the two according to the rules.
    Type: Application
    Filed: May 29, 2009
    Publication date: December 2, 2010
    Inventor: Michael Paul DeHaan
  • Publication number: 20100306305
    Abstract: The management tool can determine and store all information that is relevant to the computing systems in the network. The management tool can generate and provide reports that are customizable by a requester. The management tool can receive a request to generate a report which specifies the information relevant to the computing systems to be included in the report. The management tool can search the stored information and generate the report with the stored information that matches the request. The reports can include network topology maps based on the request and geographic maps based on the request.
    Type: Application
    Filed: May 28, 2009
    Publication date: December 2, 2010
    Inventor: Michael Paul DeHaan
  • Publication number: 20100306767
    Abstract: A cloud management system can receive rules for altering the virtual machines based on demands on the virtual machines and/or computing resources supporting the virtual machines. The cloud management system can receive data from the internal monitoring agents and/or external monitoring agents and to determine when the conditions of the rules are met. Once the conditions are met, the cloud managements system can take the appropriate action to alter the instantiated virtual machines.
    Type: Application
    Filed: May 29, 2009
    Publication date: December 2, 2010
    Inventor: Michael Paul DEHAAN
  • Publication number: 20100306765
    Abstract: A cloud management system can utilize an abstraction library for management of clouds. The abstraction library can abstract out the differences between different cloud management schemes. The cloud management system can utilize the abstraction library to perform various processes associated with the virtual machines regardless of the cloud management scheme of the virtual machine. The cloud management system can format, configure, and convert virtual machines to the cloud management scheme of the cloud in which the virtual machine will be instantiated. The cloud management system can utilize the abstraction library to enable communication with virtual machines that are formated according to a different cloud management scheme than the communication.
    Type: Application
    Filed: May 28, 2009
    Publication date: December 2, 2010
    Inventor: Michael Paul DeHaan
  • Publication number: 20100306337
    Abstract: A provisioning server can provide and interact with a cloner agent on target machines. The cloner agent can execute on a source target machine and copy the contents of storage on the source target machine to a storage location of the provisioning server. Once copied, the provisioning server can provide the cloner agent to destination target machines. The cloner agent can copy the contents of the source target machine, stored at the provisioning server, to the destination target machines.
    Type: Application
    Filed: May 27, 2009
    Publication date: December 2, 2010
    Inventor: Michael Paul DeHaan
  • Publication number: 20100250907
    Abstract: A provisioning server can perform configuration management services on target machines served by the provisioning server. The provisioning server can maintain a set of management templates. The set of management templates can be utilized to generate management configuration files for target machines. The management configuration files, generated from the management templates, can cause the target machines to operate according to a defined role (e.g. web server, client device, application server, etc.). To enable configuration management services, the provisioning server can associate the management templates with provisioning objects (e.g. profiles, provisioning templates, system records, etc.).
    Type: Application
    Filed: March 31, 2009
    Publication date: September 30, 2010
    Inventor: Michael Paul DeHaan
  • Publication number: 20100223367
    Abstract: A provisioning server can cooperate with configuration management systems to deliver provisioning processes integrated with configuration management services. The provisioning server can associate provisioning objects for the various provisioning processes with management classes supported by the configuration management systems. The management classes can include data for configuring the resources of a target machine (hardware, software, data, etc.). As the provisioning server performs the provisioning process for a particular provisioning object on a target machine, the provisioning server can apply the management class, associated with the particular provisioning object, to the target machine.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventor: Michael Paul DeHaan
  • Publication number: 20100220584
    Abstract: Embodiments relate to systems and methods for automatically generating a system restoration order for network recovery. A set of managed machines, such as personal computers or servers, can be managed by a network management platform communicating with the machines via a secure channel. The network management platform can access a dependency map indicating a required order for restoration of machines or nodes on a network. The network management platform likewise access a reverse kickstart file for each machine to be automatically restored in order to ensure proper functioning of the network, and extract a current configuration of that machine for purposes of restoring the overall network.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventors: Michael Paul DeHAAN, Adrian Karstan Likins, Seth Kelby Vidal
  • Publication number: 20100223274
    Abstract: Embodiments relate to systems and methods for generating a change log for files in managed network. A set of managed machines, such as personal computers or servers, can be managed by a network management platform communicating with the machines via a secure channel. The network management platform can employ a package management tool to manage files stored or hosted in the managed network. The network management platform can further employ a change monitor or other logic to locate additional files located in the managed network but that may not be under the control of or registered to the package management tool. A systems administrator or other user can invoke both the package management tool and the change monitor logic to initiate a discovery process and locate all available files associated with the network, and generate a unified change log recording all available files and/or their changes.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventors: Michael Paul DeHaan, Adrian Karstan Likins, Seth Kelby Vidal
  • Publication number: 20100223369
    Abstract: Embodiments relate to systems and methods for depopulation of user data from a network. A network management platform can communicate with a set of managed machines in a network, and generally manage user accounts including user lDs, associated network processes, services, application files, data files, and/or other user data. In embodiments, a user may have a change in status, such as departing from the organization operating the network, changing their name or user name, or other updates. In such cases, a systems administrator may need to update or delete files, processes, services, and/or other user data associated with the user from the network. The network management platform can interrogate the network for files, processes, or other resources associated with the user ID of interest. The search can exhaustively interrogate every available node in the network, to update or purge all files associated with the subject user ID(s).
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventors: Michael Paul DeHaan, Adrian Karstan Likins, Seth Kelby Vidal
  • Publication number: 20100223607
    Abstract: To provision software content from the different software repositories and manage updates to the repositories, a provisioning server can maintain a repository record. The repository record can include an identification of the repositories associated with the provisioning server. Additionally, the repository record can associate, with each identification of a repository, the type of repository, the software content contained in the repository, and provisioning objects associated with the software content contained in the repository. The provisioning server can be configured to utilize the repository record during provisioning processes for software content and for updating software content of target machines.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventor: Michael Paul DeHaan
  • Publication number: 20100223504
    Abstract: Embodiments relate to systems and methods for interrogating one or more diagnostic targets using a remotely loaded image. A set of managed machines, such as personal computers or servers, can be managed by a network management engine communicating with the machines via a secure channel. The network management engine can access a selected diagnostic target to temporarily deactivate the installed native operating system on that target, insert a substitute operating environment, and remotely interrogate the target to perform hardware, software, security, or other diagnostics or installs. The network management engine can connect to the diagnostic target, extract security keys from the native operating environment, remotely load the substitute environment, and then perform diagnostic or provisioning activities while the native environment is deactivate and the diagnostic target is effectively off-network.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventors: Michael Paul DeHaan, Adrian Karstan Likins, Seth Kelby Vidal
  • Publication number: 20100223609
    Abstract: Embodiments relate to systems and methods for automatic discovery of network software relationships. A set of managed machines, such as personal computers or servers, can be managed by a network management platform communicating with the machines via a secure channel. The network management platform can issue a set of discovery commands interrogating nodes of the network to report software or services which they consume. The network management platform can build a dependency map encoding the dependency or other relationships between nodes in the managed network based on their use of software resources. Network restorations can therefore be conducted in a rational order, maintaining stability in the restored nodes and network.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventors: Michael Paul DeHaan, Adrian Karstan Likins, Seth Kelby Vidal
  • Publication number: 20100223610
    Abstract: A provisioning server can maintain a library of virtual images. The virtual images can be a disk image of software that has been previously installed according to metadata. The metadata can represent parameters utilized to create the virtual image and the parameters required to provision the virtual image on a target machine. The provisioning server can maintain the metadata for a virtual image in a virtual image record associated with the virtual image. The provisioning server can provision a virtual image to one or more target machines. To provision the virtual image, the provisioning server can copy the virtual image to a storage device on the one or more target machines and configure the target machine according to metadata in the associated virtual image record.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventors: Michael Paul DEHAAN, Bryan M. Kearney
  • Publication number: 20100223473
    Abstract: Embodiments relate to systems and methods for network management using a secure mesh command and control framework. A network management server can communicate with a set of supervisory hosts, which in turn communicate with an underlying set of targets. The set of targets can have associated digital certificates which can be authenticated by common certificate authorities. A controlled target can authenticate one or more other target requesting access to the controlled target via the trusted common certificate authority. One authenticated target can therefore mesh on a trusted basis with another target to perform installation, monitoring, testing, or other activities directly on the target of interest, without channeling commands through an intervening supervisory host.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventors: MICHAEL PAUL DEHAAN, Adrian Karstan Likins, Seth Kelby Vidal
  • Publication number: 20100223375
    Abstract: A network management server can be configured to search the components of computing systems and devices in a managed network for specified settings and configurations in order to determine if the computing systems or devices contain the specified settings and configurations. The network management server can receive a request containing search parameters. The search parameters can identify specific settings and configurations to search for in the components of the systems and devices of the managed network. The network management server can initiate a search of the components of all the systems and devices in the managed network based on the search parameters.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Inventors: Michael Paul Dehaan, Adrian Karstan Likins, Seth Kelby Vidal
  • Publication number: 20100217944
    Abstract: A provisioning server can provide and interact with a storage device tool on target machines. The storage device tool can communicate with the storage devices of the target machines, independent of the types of the storage devices. To communicate independent of the type of the storage device, the storage device tool can include a translation library. The translation library enables the storage device tool to receive common commands and/or instructions for interacting with the storage devices and convert those common commands and/or instructions into specific commands and/or instructions that are compatible with different types of the storage devices.
    Type: Application
    Filed: February 26, 2009
    Publication date: August 26, 2010
    Inventors: Michael Paul DeHaan, Adrian Karstan Likins, Seth Kelby Vidal
  • Publication number: 20100217848
    Abstract: A provisioning server can utilize an inventory tool on new target machines in order to collect specification data from the target machines, prior to provisioning software. The inventory tool can be configured to operate on the new target machines without software, such as an operating system, being installed on the new target machines. The inventory tool can be configured to communicate with the hardware of the new target machines and collect data representing the specifications of the new target machines. The inventory tool can be configured to operate and execute on any new target machine regardless of the type and configuration of the new target machine.
    Type: Application
    Filed: February 24, 2009
    Publication date: August 26, 2010
    Inventors: Michael Paul DeHaan, Adrian Karstan Likins, Seth Kelby Vidal
  • Publication number: 20100217840
    Abstract: A software provisioning environment can include several provisioning servers for providing software provisioning to one or more target machines. In the environment, one of the provisioning servers can initiate a replication action. The replication action can transfer and apply the metadata from one provisioning server to another provisioning server. Additionally, the replication action can transfer and apply portions of an inventory of provisioning objects from one provisioning server to another provisioning server. During the replication action, the provisioning server can utilize the interfaces and protocols of standard provisioning processes to transfer the metadata and portions of the inventory.
    Type: Application
    Filed: February 25, 2009
    Publication date: August 26, 2010
    Inventors: Michael Paul Dehaan, Scott Jared Henson
  • Publication number: 20100218243
    Abstract: A software provisioning server can be configured to communicate with a certificate authority to evaluate security credential requests received from one or more target machines prior to a software installation. The certificate authority can issue certificates to the one or more target machines and notify an administrator and the software provisioning server of the issued certificates. The software provisioning server can manage the software installation to the one or more target machines based on the issued certificates and other specifications.
    Type: Application
    Filed: February 26, 2009
    Publication date: August 26, 2010
    Inventors: Michael Paul DeHaan, Adrian Karstan Likins, Seth Kelby Vidal