System for transactionally deploying content across multiple machines
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-009/44
G06F-009/445
G06F-009/46
출원번호
UP-0000573
(2004-11-30)
등록번호
US-7657887
(2010-03-31)
발명자
/ 주소
Kothandaraman, Vijayakumar
Cuan, William G.
Scallan, Todd
출원인 / 주소
Interwoven, Inc.
대리인 / 주소
Glenn, Michael A.
인용정보
피인용 횟수 :
69인용 특허 :
61
초록▼
A system for transactionally deploying content across multiple machines in a network environment automates and synchronizes secure and reliable distribution of digital assets to multiple network locations, allowing controlled provisioning and synchronization of code and content updates to live appli
A system for transactionally deploying content across multiple machines in a network environment automates and synchronizes secure and reliable distribution of digital assets to multiple network locations, allowing controlled provisioning and synchronization of code and content updates to live applications. A distributed architecture includes at least one receiver—a secure listener configured to process incoming distribution jobs—and at least one base server—a sender that may also act as a receiver. An administration interface allows administrative and reporting services and deployment management. Using the administrative interface, users are enabled to launch, simulate, schedule and monitor activities for any network location at any time. The system provides fan-out and multi-tiered deployment topologies expandable to hundreds of servers. Each deployment is fully transactional, permitting rollback of the system to it “last known good” state in the case of failure.
대표청구항▼
The invention claimed is: 1. A computer readable storage medium encoded with instructions, which when loaded into a digital computational device establishes a content deployment system comprising: a plurality of nodes connected in a network topology wherein each node communicates with at least one
The invention claimed is: 1. A computer readable storage medium encoded with instructions, which when loaded into a digital computational device establishes a content deployment system comprising: a plurality of nodes connected in a network topology wherein each node communicates with at least one other node via a secure connection, said plurality of nodes including: at least one sender configured both to receive content and deploy content to other nodes across network domains and platforms; and at least one receiver configured to receive deployed content; an administration module for management of content deployments; a base server, said base server comprising a sender, configured to receive content for deployment to any network touchpoint from at least one content repository; a module for defining and implementing routed and/or multi-tiered content deployments, said module for defining and implementing routed and/or multi-tiered content deployments comprising a deployment configuration composer; means for making transactional content deployments and rolling them back in case of failure; and an intelligent delivery module, wherein said intelligent delivery module enables a base server to use content attributes for smart distribution and syndication, wherein said intelligent delivery module comprises an offer/subscription management layer, said offer/subscription management layer including: means for creating an offer, wherein an offer defines a content source and a metadata query for identifying relevant assets; and means for creating a subscription, wherein a subscription completes deployment rules for an offer, including any of target nodes, schedule, and delivery mechanism; wherein a deployment is defined by means of a deployment configuration, said deployment configuration comprising a file that describes a deployment strategy and wherein said deployment configuration defines multi-tiered deployments by chaining deployments from one tier to the next; wherein said content is transactionally deployed across a plurality of computing devices. 2. The system of claim 1, wherein said at least one sender is configured to receive content deployed from another sender. 3. The system of claim 1, wherein deployments are pushed from one node to another. 4. The system of claim 1, wherein deployments are pulled from one node to another. 5. The system of claim 1, wherein said deployed content comprises any of: data files; database updates; markup code; media files; and application code. 6. The system of claim 1, wherein said connection is secured by means of an authentication process that ensures that communication is with a known machine in a known manner and that data is received from the known machine without interception by a third party. 7. The system of claim 6, wherein a receiver is configured to listen on a specific port for connection from a firewall's specific IP (Internet Protocol) address. 8. The system of claim 7, wherein said receiver is configured to receive content only from a known, trusted source. 9. The system of claim 6, wherein said connection is secured by a certificate-based authentication process. 10. The system of claim 1, wherein content deployed over said secure connection is encrypted. 11. The system of claim 1, wherein said administration module includes a user interface for accessing a plurality of administrative services included in said module, said user interface including any of event-driven and command-line capabilities. 12. The system of claim 11, wherein said plurality of administrative services includes at least one service for managing user rights and authentication. 13. The system of claim 12, wherein said system provides single sign-on capability, so that a user authenticates on said system using authentication credentials for an underlying operating system or user directory. 14. The system of claim 11, wherein said plurality of administrative services includes: at least one service for managing deployments; at least one service for creating and viewing schedule entries for automated deployments; at least one service for any of viewing, editing and uploading deployment configurations; at least one service for viewing and managing base servers and receivers; at least one service for creating and running deployment report queries; at least one service for assigning access rights to base servers and receivers and restricting users' rights to initiate deployments; at least one service for configuring database auto-synchronization; and managing syndicated content offers and subscriptions. 15. The system of claim 1, further comprising a module for providing event triggers for integrating external programs into a deployment, wherein external tasks are launched on source and/or target systems. 16. The system of claim 1, further comprising a module that invokes a payload adapter module at the start of a deployment for integrating a sender with an arbitrary source, and wherein said payload adaptor prepares a payload of files to be returned to said sender from the source. 17. The system of claim 1, further comprising a module that invokes a delivery adaptor after files are deployed to a target, wherein said delivery adapter is invoked with a manifest of deployed files, and wherein said adapter processes said deployed files. 18. The system of claim 1, further comprising an interface for programmatic access to system services. 19. The system of claim 1, wherein said system is scalable to include multi-tiered development topologies including servers inside and outside of firewalls. 20. The system of claim 1, wherein deployments distribute only incremental changes between a source and each target. 21. The system of claim 1, wherein a sender is configured to deploy to multiple targets in parallel. 22. The system of claim 21, wherein said deployment configuration defines logical nodes and replication farms that are independent of a physical topology. 23. The system of claim 1, wherein said deployment configuration defines routed deployments by computing a route from a pre-defined set of route segments. 24. The system of claim 1, wherein said deployment configuration specifies rules for including and excluding files and directories. 25. The system of claim 1, wherein said deployment configuration specifies transfer rules to describe how data is to be handled during transfer. 26. The system of claim 1, wherein said deployment configuration specifies permission and ownership rules for deployed files and directories. 27. The system of claim 1, wherein said means for tracking and rolling back transactional deployments comprises a deployment configuration, wherein said deployment configuration specifies that a deployment is transactional, and system services that roll back a deployment transaction and restores each target to its last known good state in the event of failure. 28. The system of claim 27, wherein each leg of a parallel deployment is synchronized with all other legs. 29. The system of claim 27, wherein said deployment configuration specifies a quorum for a parallel deployment, wherein said quorum comprises a defined sub-set of a total number of targets. 30. The system of claim 29, wherein if a deployment to the quorum succeeds, successful targets are committed and failed targets are rolled back. 31. The system of claim 1, further comprising a logging facility, said logging facility providing means for creating log files on sender and receiver systems. 32. The system of claim 31, said logging facility further including a log viewer for viewing said log files. 33. The system of claim 1, further comprising means for any of: locking down command line invocations to specific hosts; and confining user authentication for the administration module to one or more specific access services. 34. The system of claim 1, further comprising a module for synchronizing automated deployments of content from a plurality of repositories. 35. The system of claim 1, further comprising a data deployment module for deploying data updates to relational databases. 36. The system of claim 35, wherein said data deployment module comprises means for any of: specifying type and location of source files; which schema mapping to use; and a target database specification. 37. The system of claim 35, wherein said data deployment module comprises means for any of: mapping document type definition to a target database schema; and creating a wrapper configuration. 38. The system of claim 35, wherein said data deployment module synchronizes delivery of structured content to a target database with delivery of code and unstructured content file to multiple servers. 39. The system of claim 1, wherein said intelligent delivery module comprises means for any of: specifying deployment criteria in the form of a metadata query; and a payload adapter that supports use of a JDBC-compliant database as a metadata repository. 40. The system of claim 1, further comprising a web change management hub for automating secure provisioning of web updates. 41. The system of claim 40, wherein said web change management hub comprises any of: means for aggregating and coordinating change sets from multiple code and content repositories; means for aggregating code, content and configuration files that are ready to be provisioned into editions, wherein an edition is deployed to a target. 42. The system of claim 41, wherein an edition deploys incremental changes to a target server, and wherein said edition provides an efficient mechanism for recording current state of said target server at any time. 43. The system of claim 42, wherein said content deployment system rolls back said target server to a previous state based on said recorded current state by deploying files that differ between previous and current editions. 44. The system of claim 41, wherein an edition preserves accurate snapshots of a web application as it existed at specific points in time, so that audit requirements are satisfied. 45. A computer-implemented method for transactionally deploying content comprising steps of: providing a plurality of nodes in a network topology wherein each node communicates with at least one other node via a secure connection; said plurality of nodes including: at least one sender configured both to receive content and deploy content to other nodes across network domains and platforms; and at least one receiver configured to receive deployed content; providing centralized management of content deployments in a system including said plurality of nodes by means of an administration module; configuring at least one base server, said base server comprising a sender, to receive content for deployment to any type of network touchpoint from at least one content repository; using a deployment configuration composer, defining and implementing routed and/or multi-tiered content deployments; wherein a deployment is defined by means of a deployment configuration, said deployment configuration comprising a script that describes a deployment strategy and wherein said deployment configuration defines multi-tiered deployments by chaining deployments from one tier to the next; distributing and syndicating content based on content attributes by means of an intelligent delivery module, wherein said intelligent delivery module enables a base server to use content attributes for smart distribution and syndication wherein distributing and syndicating content based on content attributes by means of an intelligent delivery module comprises: creating an offer, wherein an offer defines a content source and a metadata query for identifying relevant assets; and creating a subscription, wherein a subscription completes deployment rules for an offer, including any of target nodes, schedule, and delivery mechanism by means of an offer/subscription management layer; and making transactional content deployments and rolling them back in case of failure; wherein said content is transactionally deployed across a plurality of computing devices. 46. The method of claim 45, further comprising a step of configuring said at least one sender to receive content deployed from another sender. 47. The method of claim 45, further comprising a step of pushing deployments from one node to another. 48. The method of claim 45, further comprising a step of pulling deployments from one node to another. 49. The method of claim 45, wherein said deployed content comprises any of: data files; database updates; markup code; media files; and application code. 50. The method of claim 45, further comprising a step of securing said connection by means of an authentication process that ensures that communication is with a known machine in a known manner and that data is received from the known machine without interception by a third party. 51. The method of claim 50, further comprising a step of configuring a receiver to listen on a specific port for connection from a firewall's specific IP (Internet Protocol) address. 52. The method of claim 51, further comprising a step of configuring a receiver to receive content only from a known, trusted source. 53. The method of claim 50, further comprising a step of securing said connection by a certificate-based authentication process. 54. The method of claim 45, further comprising a step of encrypting content deployed over said secure connection. 55. The method of claim 45, further comprising a step of accessing plurality of services included in said administration module by means of a user interface, said user interface including any of event-driven and command-line capabilities. 56. The method of claim 55, wherein said plurality of services includes at least one service for managing user rights and authentication. 57. The method of claim 56, wherein said system provides single sign-on capability, so that a user authenticates on said system using authentication credentials for an underlying operating system or user directory. 58. The method of claim 55, wherein said plurality of services includes: at least one service for managing deployments; at least one service for creating and viewing schedule entries for automated deployments; at least one service for any of viewing, editing and uploading deployment configurations; at least one service for viewing and managing base servers and receivers; at least one service for creating and running deployment report queries; at least one service for assigning access rights to base servers and receivers and restricting users rights to initiate deployments; at least one service for configuring database auto-synchronization; and managing syndicated content offers and subscriptions. 59. The method of claim 45, further comprising a step of providing event triggers for integrating external programs into a deployment, wherein external tasks are launched on source and/or target systems. 60. The method of claim 45, further comprising a step of invoking a payload adapter module at the start of a deployment for integrating a sender with an arbitrary source, wherein said payload adaptor prepares a payload of files to be returned to said sender from the source. 61. The method of claim 45, further comprising a step of invoking a delivery adaptor after files are deployed to a target, wherein said delivery adapter is invoked with a manifest of deployed files, and wherein said adapter processes said deployed files. 62. The method of claim 45, further comprising an interface for programmatic access to system services. 63. The method of claim 45, wherein said system is scalable to include multi-tiered development topologies including servers inside and outside of firewalls. 64. The method of claim 45, further comprising a step of distributing only incremental changes between a source and each target in a deployment. 65. The method of claim 45, wherein a sender is configured to deploy to multiple targets in parallel. 66. The method of claim 65, wherein said deployment configuration defines logical nodes and replication farms that are independent of a physical topology. 67. The method of claim 45, wherein said deployment configuration defines routed deployments by computing a route from a pre-defined set of route segments. 68. The method of claim 45, wherein said deployment configuration specifies rules for including and excluding files and directories. 69. The method of claim 45, wherein said deployment configuration specifies transfer rules to describe how data is to be handled during transfer. 70. The method of claim 45, wherein said deployment configuration specifies permission and ownership rules for deployed files and directories. 71. The method of claim 45, wherein said step of tracking and rolling back transactional deployments comprises steps of: defining a deployment by means of a deployment configuration, wherein said deployment configuration specifies that a deployment is transactional; and rolling back a deployment transaction by means of system services to restore each target to its last known good state in the event of failure. 72. The method of claim 71, wherein each leg of a parallel deployment is synchronized with all other legs. 73. The method of claim 71, wherein said deployment configuration specifies a quorum for a parallel deployment, wherein said quorum comprises a defined sub-set of a total number of targets. 74. The method of claim 73, further comprising a step of, if a deployment to the quorum succeeds, committing successful targets and rolling back failed targets. 75. The method of claim 45, further comprising a step of creating log files on sender and receiver systems by means of a logging facility. 76. The method of claim 75, further comprising a step of viewing said log files by means of a log viewer, said log viewer included in said logging facility. 77. The method of claim 45, further comprising any of the steps of: locking down command line invocations to specific hosts; and confining user authentication for the administration module to one or more specific access services. 78. The method of claim 45, further comprising a step of synchronizing automated deployments of content from a plurality of repositories. 79. The method of claim 45, further comprising a step of deploying data updates to relational databases by means of a data deployment module. 80. The method of claim 79, wherein said step of deploying data updates to relational databases comprises any of the steps of: specifying type and location of source files; specifying which schema mapping to use; specifying a target database. 81. The method of claim 79, wherein said step of deploying data updates to relational databases comprises any of the steps of: mapping document type definition to a target database schema; and creating a wrapper configuration. 82. The method of claim 79, wherein said step of deploying data updates to relational databases comprises a step of: synchronizing delivery of structured content to a target database with delivery of code and unstructured content file to multiple servers. 83. The method of claim 45, wherein said step of distributing and syndicating content based on content attributes by means of an intelligent delivery module comprises any of the steps of: specifying deployment criteria in the form of a metadata query; and providing a payload adapter that supports use of a JDBC-compliant database as a metadata repository. 84. The method of claim 45, further comprising a step of automating secure provisioning of web updates by means of a web change management hub. 85. The method of claim 84, wherein said step of automating secure provisioning of web updates by means of a web change management hub comprises any of the steps of: aggregating and coordinating change sets from multiple code and content repositories; aggregating code, content and configuration files that are ready to be provisioned into editions, wherein an edition is deployed to a target. 86. The method of claim 85, wherein an edition deploys incremental changes to a target server, and wherein said edition provides an efficient mechanism for recording current state of said target server at any time. 87. The method of claim 86, wherein said content deployment system rolls back said target server to a previous state based on said recorded current state by deploying files that differ between previous and current editions. 88. The method of claim 85, wherein an edition preserves accurate snapshots of a web application as it existed at specific points in time, so that audit requirements are satisfied.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (61)
Abe Kenichi,JPX ; Imafuku Yukiharu,JPX ; Kirita Hitoshi,JPX ; Inoue Toshiyuki,JPX ; Takahashi Hiroaki,JPX ; Shigehata Yoji,JPX ; Konno Yuichi,JPX ; Narata Kazuaki,JPX ; Odanaka Tadao,JPX, Accurate completion of transaction in cooperative type distributed system and recovery procedure for same.
Freivald Matthew P. ; Richards Mark S. ; Noble Alan C., Checksum-comparing change-detection tool indicating degree and location of change of internet documents.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
Duyanovich Linda Marie (Saratoga CA) Micka William Frank (Tucson AZ) Shomler Robert Wesley (Morgan Hill CA), Data backup copying with delayed directory updating and reduced numbers of DASD accesses at a back up site using a log s.
Orr Michael B. ; Brintzenhofe Keith S. ; King Joseph D. ; McDonald Marc B. ; von Limbach Geoffrey ; Weil Steven E., Design engine for automatic reformatting for design and media.
Almond Kenneth ; Wait Robert ; Thombre Atul ; Shaw Richung, Development system providing methods for managing different versions of objects with a meta model.
Oulid-Aissa Mourad ; Cole Charles Allen ; Tavanyar Simon Edwin, Distributed database architecture and distributed database management system for open network evolution.
Oulid-Aissa Mourad ; Cole Charles Allen ; Tavanyar Simon Edwin, Distributed database management system for servicing application requests in a telecommunications switching system.
Khotimsky, Dennis Andreyevich; Fayet, Vincent Georges Pierre; Przygienda, Antoni Bronislaw, Hop-by-hop routing with node-dependent topology information.
Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Kleppner Paul ; Finnegan Neal ; Morrisey Craig ; Crowley Patrick, Method and apparatus for facilitating communication between collaborators in a networked environment.
Chung Pi-Yu ; Huang Yennun ; Liang Deron,CNX ; Shih Chia-Yen ; Yajnik Shalini, Method and apparatus for providing failure detection and recovery with predetermined degree of replication for distributed applications in a network.
Astley, Mark; Strom, Robert E.; Sturman, Daniel C., Method and system for matching consumers to events employing content-based multicast routing using approximate groups.
Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Dennie Andy ; Kleppner Paul ; Finnegan Neal ; Morrissey Craig ; Steele Alan ; Crowley Patrick, Method and system for providing a networked collaborative work environment.
Kisor Greg, Method and system including a central computer that assigns tasks to idle workstations using availability schedules and computational capabilities.
Beizer Mordechai M. ; Berg Daniel ; Scullard Rand ; Simha Pradeep R. ; Solomon Mark A., Method of resolving data conflicts in a shared data environment.
Muller P. Keith ; Chow Kit M. ; Meyer Michael W., Name service for multinode system segmented into I/O and compute nodes, generating guid at I/O node and exporting guid to compute nodes via interconnect fabric.
Carley, Kevin W.; Harrington, Lisa Marie; Dikeman, Jennifer Scot; Moody, Megan Davies; Gregory, Mary Michelle, Providing a notification when a plurality of users are altering similar data in a health care solution environment.
Alex Holtz ; David E. Buehnemann ; Gilberto Fres ; Harrison T. Hickenlooper, III ; Charles M. Hoeppner ; Kevin K. Morrow ; Bradley E. Neider ; Loren J. Nordin, III ; Todd D. Parker ; Robert , Real time video production system and method.
Bly Sara A. (Mountain View CA) Farrand A. Brady (Berkeley CA) Hodges Jeffery D. (Newark CA) Kupfer Michael D. (Mountain View CA) Lewis Brian T. (Palo Alto CA) Maybury William J. (Torrance CA) Tallan , Representation of collaborative multi-user activities relative to shared structured data objects in a networked workstat.
Challenger James Robert Harold ; Dantzig Paul Michael ; Iyengar Arun K. ; Spivak Gerald A., Scaleable method for maintaining and making consistent updates to caches.
Beebe Todd ; Collier Mark D. ; Conyers Doug ; Hamlett Chris ; Faustino Stephen, Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities.
Bly Sara A. (Mountain View CA) Hodges Jeffrey D. (Newark CA) Kupfer Michael D. (Mountain View CA) Lewis Brian T. (Palo Alto CA) Tallan Michael L. (Mountain View CA) Tom Stephen B. (San Francisco CA), Updating local copy of shared data in a collaborative system.
Allen Larry W. (Cambridge MA) Fernandez Gary L. (Concord MA) Kane Kenneth P. (Acton MA) Leblang David B. (Wayland MA) Minard Debra A. (Newton MA) McLean ; Jr. Gordon D. (Brookline MA), Version control system for geographically distributed software development.
Vorthmann, Scott A.; van der Rijn, Daniel J. G.; Lambert, Mark L.; Domenech, Laurent H.; Kanaley, Michael J., Capability model for deploying componentized applications.
Celli, Massimiliano; Bernardini, Gianluca; Gangemi, Rosario; Pichetti, Luigi, Centralized system management on endpoints of a distributed data processing system.
Mutisya, Hillary Mucheru; Goldsmith, Benjamin W.; Sheppard, III, Edward Griffin; Wu, Yimin; Hoover, Hubert Edward, Continuous deployment of applications.
Huynh Huu, Hanh; Wu, Zhongwei; Seeliger, Oliver N.; Pal, Shankar; Rober, Christian; Denuit, Bruno H. M.; Novik, Lev; Ellis, Nigel R.; Talius, Tomas, Logical data backup and rollback using incremental capture in a distributed database.
Bhatkhande, Mandar Ganesh; Bhattiprolu, Srikanth; Daherkar, Atul Ravindra; Pollinger, Thomas; Redlin, Charles James; Theyancheri, Chidanandan; Zhang, Kai Mike, Method and system for topology modeling.
Chigurapati, Chakravarthi S.; Uberoy, Pawan; Mani, Somnath; Madhav, Praveen; Ritchie, Duncan Stuart; Sapa, Sebastian, Methods and apparatus for performing in-service software upgrade for a network device using system virtualization.
Aaron, Jeffrey A.; Anschutz, Thomas A., Methods, systems, and computer program products for facilitating content-based selection of long-tail business models and billing.
Haskins, Gregory Matthew; Bahi, David H.; Westervelt, Daniel Edward; Bultmeyer, Jonathan Paul; Carter, Stephen R, Policy and identity based workload provisioning.
Breitenbach, Paul T.; Lee, Sih Y.; Signorelli, Paul D.; Tedesco, Daniel E.; Jorasch, James A.; Tulley, Stephen C.; Gelman, Geoffrey M.; Tedesco, Robert C., Products and processes for establishing multi-transaction relationships with customers of vending machines.
Breitenbach, Paul T.; Lee, Sih Y.; Signorelli, Paul D.; Tulley, Stephen C.; Tedesco, Daniel E.; Jorasch, James A.; Gelman, Geoffrey M.; Tedesco, Robert C., Products and processes for establishing multi-transaction relationships with customers of vending machines.
Fletcher, James C.; Lidquist, David B.; Wanderski, Michael C.; Wesley, Ajamu A., Programmatic management of software resources in a content framework environment.
Fletcher, James C.; Lindquist, David B.; Wanderski, Michael C.; Wesley, Ajamu A., Programmatic management of software resources in a content framework environment.
Li, Zhenyu; Liu, Lidan, System and method for supporting automatically deploying/undeploying application components in a transactional middleware machine environment.
Wiltamuth, Scott; Hejlsberg, Anders; Golde, Peter H.; Sollich, Peter F., System and methods for implementing an explicit interface member in a computer programming language.
Wiltamuth, Scott; Hejlsberg, Anders; Sollich, Peter F.; Abrams, Bradley M., System and methods for providing versioning of software components in a computer programming language.
Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, System, method and computer program product for validating one or more metadata objects.
Brooks, David; Jasik, Benji; Bezar, Eric David; Chasman, Douglas; Hansma, Scott; Tamm, Steven; Tucker, Lewis Wiley; Mason, Timothy; Tzuo, Tien; Gross, Adam; Wong, Simon, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
Brooks, David; Tucker, Lewis Wiley; Jasik, Benji; Mason, Timothy; Bezar, Eric David; Wong, Simon; Chasman, Douglas; Tzuo, Tien; Hansma, Scott; Gross, Adam; Tamm, Steven, Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.