Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Exploitation of Sets in the Refresh of File Objects in a Network Installation Program

IP.com Disclosure Number: IPCOM000115891D
Original Publication Date: 1995-Jul-01
Included in the Prior Art Database: 2005-Mar-30
Document File: 2 page(s) / 108K

Publishing Venue

IBM

Related People

Shrader, TJ: AUTHOR

Abstract

Disclosed is a design for exploiting the use of sets in a refresh of response and customization file objects in their corresponding response file category and customization file container objects. The burdens on network administrators have been rapidly growing both in volume and in complexity. Chief among them is the need for administrators to easily plan and execute the installation and configuration of software products on a group of workstation on a LAN. This process for exploiting the use of sets for file objects can be used with any network planning, installation, and configuration program.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 50% of the total text.

Exploitation of Sets in the Refresh of File Objects in a Network
Installation Program

      Disclosed is a design for exploiting the use of sets in a
refresh of response and customization file objects in their
corresponding response file category and customization file container
objects.  The burdens on network administrators have been rapidly
growing both in volume and in complexity.  Chief among them is the
need for administrators to easily plan and execute the installation
and configuration of software products on a group of workstation on a
LAN.  This process for exploiting the use of sets for file objects
can be used with any network planning, installation, and
configuration program.

      In the planning stage of a network installation program,
administrators can create, modify, and manipulate a number of objects
to construct an install plan for applications on a group of
workstations.  There are two file objects that can be used during the
construction of the install plan:
  1.  Response files - These ASCII files are in a
keyword-equals-value
       format.  These files allow for unattended or lightly attended
       installation for programs that support the Configuration,
       Installation, and Distribution (CID) guidelines.  Response
files
       take the place of a user or administrator needing to
physically
       respond to a graphical user interface (GUI) or prompted
interface
       for installation or configuration.
  2.  Customization files - These ASCII files are in a matrix-like,
       comma-delineated format.  Administrators can use customization
       files to make mass changes to response files without needing
to
       manually edit each file.  The administrator can add a
       customization file to an application in plan or group in plan
       object.
  o  The X-axis of the matrix lists keywords that would be present in
      the response files to which the customization file would
modify.
      The Y-axis lists the workstations to which the response files
      applied to.  The values to substitute in the application
response
      file for a workstation reside at the intersection of the X- and
      Y-axes.

      Groups of response files are stored in a response file
category.  These categories reflect actions an application can take,
such as install or configure.  Groups of customization files are
stored in customization file containers.  In the network installation
user interface, the files are shown as objects under their respective
containers.  Both file container objects have a refresh directory
from which files in the container can be populated, and here is where
sets can be exploited to help in the refresh and use of response and
customization files.

      When the administrator initiates a refresh on a file container
object, the network installation program will perform the f...