Small/medium business application delivery platform

ABSTRACT

Purchase, dissemination, configuration, or provisioning of applications to a mobile device is enabled. The systems can comprise devices that receive indications from a small to medium sized businesses of a need for an application, obtain the application from an independent software vendor, configure the application for utilization on the mobile device, and thereafter dispatches the application to the mobile device.

RELATED APPLICATION

The present application is a continuation of, and claims priority toeach of, U.S. patent application Ser. No. 15/267,850, filed Sep. 16,2016, and entitled “SMALL/MEDIUM BUSINESS APPLICATION DELIVERYPLATFORM,” which is a continuation of U.S. patent application Ser. No.12/362,104 (now U.S. Pat. No. 9,489,185), filed Jan. 29, 2009, andentitled “SMALL/MEDIUM BUSINESS APPLICATION DELIVERY PLATFORM,” theentire contents of which applications are hereby incorporated byreference herein.

BACKGROUND

Mobile devices and networking technologies have transformed manyimportant aspects of everyday life. Mobile devices, such as smartphones, cell phones, and the like, have become a daily necessity ratherthan a luxury, communication tool, and/or entertainment center, and cannow provide individuals with tools to manage and perform work functionssuch as reading and/or writing emails, setting up calendaring eventssuch as meetings, providing games and entertainment aspects, and/orstore records and images in a permanent and reliable medium. Networkingtechnologies, like the Internet, have provided users with virtuallyunlimited access to remote systems, information and associatedapplications.

As mobile devices and networking technologies become robust, secure andreliable, ever more consumers, wholesalers, retailers, entrepreneurs,educational institutions, advocacy groups and the like are shiftingparadigms and employing the Internet and similar technologies toundertake business rather than traditional “brick and mortar” means ofdoing business. For example, many businesses and consumers are providingweb sites and/or on-line services (e.g., for purchasing food andclothing, searching for information, sending email and playinginteractive games).

Nevertheless, despite such advances in both mobile device technologiesand ancillary network capabilities, the current problem facing small tomedium business entities and/or individuals, is the inability toidentify, purchase, provision, and/or manage hosted applications onmultiple disparate mobile devices from a single administrative source,and further, once such applications have been disseminated to aplurality of mobile devices, adding, modifying, and managing additionalusers and/or the distribution of further applications and/or updates forpreviously deployed applications situated on the various mobile devicesfrom such an administrative source. Accordingly, the subject matter asclaimed is directed toward resolving or at the very least mitigating,one or all of the foregoing problems.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a machine-implemented system that facilitates and/oreffectuates purchase, configuration, dissemination, or provisioning ofapplications to mobile devices in accordance with the claimed subjectmatter.

FIG. 2 provides a more detailed depiction of an illustrative applicationdelivery platform that facilitates and/or effectuates purchase,configuration, dissemination, or provisioning of applications to mobiledevices in accordance with the claimed subject matter.

FIG. 3 provides a more detailed depiction of an illustrativeprovisioning component that facilitates and/or effectuates purchase,configuration, dissemination, or provisioning of applications to mobiledevices in accordance with the claimed subject matter.

FIG. 4 provides further illustration of an illustrative provisioningcomponent that facilitates and/or effectuates purchase, configuration,dissemination, or provisioning of applications to mobile devices inaccordance with the claimed subject matter.

FIG. 5 provides yet further depiction of an illustrative provisioningcomponent that facilitates and/or effectuates purchase, configuration,dissemination, or provisioning of applications to mobile devices inaccordance with the claimed subject matter.

FIG. 6 provides a further depiction of a machine implemented system thatfacilitates and/or effectuates purchase, configuration, dissemination,or provisioning of applications to mobile devices in accordance with theclaimed subject matter.

FIG. 7 illustrates a flow diagram of a machine implemented methodologythat effectuates and/or facilitates purchase, configuration,dissemination, or provisioning of applications to mobile devices inaccordance with the claimed subject matter.

FIG. 8 illustrates a flow diagram of a machine implemented method thateffectuates and/or facilitates purchase, configuration, dissemination,or provisioning of applications to mobile devices in accordance with theclaimed subject matter.

FIG. 9 illustrates a flow diagram of a machine implemented methodologythat effectuates and/or facilitates purchase, configuration,dissemination, or provisioning of applications to mobile devices inaccordance with the claimed subject matter.

FIG. 10 illustrates a block diagram of a computer operable to executethe disclosed system in accordance with an aspect of the claimed subjectmatter.

DETAILED DESCRIPTION

The subject matter as claimed is now described with reference to thedrawings, wherein like reference numerals are used to refer to likeelements throughout. In the following description, for purposes ofexplanation, numerous specific details are set forth in order to providea thorough understanding thereof. It may be evident, however, that theclaimed subject matter can be practiced without these specific details.In other instances, well-known structures and devices are shown in blockdiagram form in order to facilitate a description thereof.

The subject application in accordance with various aspects is directedtowards providing small to medium sized business entities and/orindividual users the capability to find, buy, provision, and/or managehosted applications. Further, the claimed matter is also directedtowards enabling small to medium sized business entities and/orindividuals the ability, once hosted applications have been deployed, toundertake routine maintenance tasks to add/manage additional usersand/or applications from a single administrative facility.

FIG. 1 illustrates a system 100 that effectuates and/or facilitatesmobile application delivery to a plethora of disparate mobile devices.As illustrated system 100 can include application delivery platform 102that can provide network and/or system administrators employed by smallto medium sized business entities and/or organizations, as well asindividuals of their own volition, the ability to identify, purchase,provision, and/or manage hosted applications from a single source (e.g.,application delivery platform 102). Moreover, application deliveryplatform 102 can make available facilities and/or functionalities thatallow network and/or system administrators associated with such small tomedium sized business entities and/or organizations, as well asindividual users, as circumstances dictate, to add additional usersand/or applications to a multitude of disparately configured mobiledevices upon which the hosted applications or solutions have beendeployed. Furthermore, application delivery platform 102 can providetools that can be utilized by cellular telecommunications provider salesand/or marketing personnel to sell and/or provision applications to thevarious and/or disparate mobile devices associated and/or utilized bysmall to medium sized business organizations and/or entities andindividual users. In this manner, application delivery platform 102 canprovide opportunity for network and/or system administrators associatedwith small to medium sized business entities and/or organizations, aswell as individual users to find suitable solutions or applications thatsatisfy their business or personal needs and to thereafter purchase,deploy, and/or manage these distributed solutions from a single point ofpresence.

Application delivery platform 102, as illustrated, via network topologyand/or cloud 104, can be in continuous and/or operative or sporadicand/or intermittent communication with small to medium sized businesscomponent 106 and independent software vendor component 108.Additionally, application delivery platform 102 can also be incontinuous and/or operative or sporadic and/or intermittentcommunication with a plurality of mobile devices 110 utilizing over theair (OTA) data interchange technologies and/or mechanisms. As will beappreciated by those of reasonable skill in the art, mobile devices 110can include a disparity of different, diverse and/or disparate portabledevices including Tablet PC's, server class portable computing machinesand/or databases, laptop computers, notebook computers, cell phones,smart phones, transportable handheld consumer appliances and/orinstrumentation, portable industrial devices and/or components, personaldigital assistants, multimedia Internet enabled phones, multimediaplayers, and the like. Moreover, as will be further appreciated by thoseof ordinary skill in the art mobile devices 110 can be assigned orallocated to individual users within a particular business organizationbased at least in part on job function. For instance, the chieftechnology officer (CTO) of a small company can be assigned or allocateda mobile device that is commensurate with his/her job functions.Similarly, marketing personnel of the same small company can be assignedor allocated mobile devices more suited to their particular jobfunctionalities. Additionally, in regard to mobile devices 110, evenwhere similar (or a homogeneity of) mobile devices are provided to allemployees in the organization the applications deployed on such devicescan be diverse and based for, the most part, on the users' jobfunctionality within the organization.

Application delivery platform 102 can be implemented entirely inhardware and/or a combination of hardware and/or software in execution.Further, application delivery platform 102 can be incorporated withinand/or associated with other compatible components. Additionally,application delivery platform 102 can be, but is not limited to, anytype of machine that includes a processor and/or is capable of effectivecommunication with network topology and/or cloud 104. Illustrativemachines that can comprise application delivery platform 102 can includedesktop computers, server class computing devices, laptop computers,notebook computers, Tablet PCs, consumer and/or industrial devicesand/or appliances, hand-held devices, and the like.

Network topology and/or cloud 104 can include any viable communicationand/or broadcast technology, for example, wired and/or wirelessmodalities and/or technologies can be utilized to effectuate the claimedsubject matter. Moreover, network topology and/or cloud 104 can includeutilization of Personal Area Networks (PANs), Local Area Networks(LANs), Campus Area Networks (CANs), Metropolitan Area Networks (MANs),extranets, intranets, the Internet, Wide Area Networks (WANs)—bothcentralized and/or distributed—and/or any combination, permutation,and/or aggregation thereof. Furthermore, as those skilled in the artwill appreciate and understand various data communications protocols(e.g., TCP/IP, Ethernet, Asynchronous Transfer Mode (ATM), FiberDistributed Data Interface (FDDI), Fibre Channel, Fast Ethernet, GigabitEthernet, Wi-Fi, Token Ring, Frame Relay, etc.) can be utilized toimplement suitable data communications.

Small to medium sized business component 106 can include and encompassutilization of a myriad of diverse devices and/or components thattypically can be employed by and within small to medium sized businessorganizations and or by individuals. As those moderately conversant inthis field of endeavor will appreciate small to medium sized businessorganizations as referred to herein can include sole proprietorships,partnerships, limited liability corporations, or small to medium sizedcorporate entities. For example, a small to medium sized businessorganization can be a medical practice, shopping establishment,management consulting partnership, architecture firm, manufacturingfoundry, marketing management consultancy, and the like. Moreover, aswill also be appreciated, such small to medium sized organizations canmake use of a wide variety of components such as those implementedentirely in hardware and/or as a combination of hardware and/or softwarein execution. Thus, small to medium sized business component 106 can be,but is not limited to, any type of mechanism, machine, device, facility,and/or instrument that includes a processor and/or is capable ofeffective and/or operative communications with network topology and/orcloud 104. Mechanisms, machines, devices, facilities, and/or instrumentsthat can comprise small to medium sized business component 106 caninclude one or more of Tablet PC's, server class computing machinesand/or databases, laptop computers, notebook computers, desktopcomputers, cell phones, smart phones, consumer appliances and/orinstrumentation, industrial devices and/or components, hand-helddevices, personal digital assistants, multimedia Internet enabledphones, multimedia players, and the like. Additionally, it should alsobe noted, without loss of generality, that while small to medium sizedbusiness component 106 is depicted for the sake of simplicity ofexplanation as being a single monolithic corpus, small to medium sizedbusiness component 106 can be an aggregation of a multiplicity ofindependently operating small to medium sized commercial ventures,individuals, single business entities operating for their ownindependent benefit, or an agglomeration of the foregoing that havetemporarily united to achieve economies of scale.

Independent software vendor component 108, like small to medium sizedbusiness component 106, can encompass and include utilization ofnumerous disparate devices and/or components that can generally beemployed by software vendors and/or application developers in thecreation, development, and/or maintenance of applications that canultimately be deployed on various processing platforms, such as mobiledevices (e.g., mobile devices 110), industrial and consumer appliances,computing platforms, and the like. Once again as will be appreciated bythose conversant in this field of endeavor, independent software vendorcomponent 108 can be implemented entirely in hardware and/or as acombination of hardware and/or software in execution. Further,independent software vendor component 108 can be, but is not limited to,any type of engine, machine, instrument of conversion, or mode ofproduction that includes a processor and/or is capable of effectiveand/or operative communications with network topology and/or cloud 104.Illustrative instruments of conversion, modes of production, engines,mechanisms, devices, and/or machinery that can comprise and/or embodyindependent software vendor component 108 can include desktop computers,server class computing devices and/or databases, cell phones, smartphones, laptop computers, notebook computers, Tablet PCs, consumerand/or industrial devices and/or appliances and/or processes, hand-helddevices, personal digital assistants, multimedia Internet enabled mobilephones, multimedia players, and the like.

As will be appreciated independent software vendor component 108 caninclude a plurality of disparate software vendors each software vendorcreating developing, and/or maintaining applications directed towardsdisparate segments of the mobile device market. For example, a firstsoftware vendor can produce applications for mobile devices that arebased on a first operating system whereas a second software vendor canbe in the business of developing applications for use on a second mobiledevice platform. Moreover, a third software vendor can developapplications that are directed towards applications that can be executedon all, or almost all, mobile devices regardless of platform oroperating system, or the software vendor can create applicationsdirected towards applications that are specific to particular businessfunctionalities or utilities (e.g., accounting software, time managementsoftware, . . . ).

FIG. 2 provides a more detailed illustration of application deliveryplatform 102 in accordance with various aspects of the claimed subjectmatter. As depicted application delivery platform 102 can include portalcomponent 202 that can provide an initial interface between small tomedium sized business component 106 and application delivery platform102. Portal component 202 can provide users (e.g. system administrators)associated with small to medium sized business organizations the abilityto identify, locate, purchase, provision, and manage applications thathave been deployed or will be deployed to the various mobile devices110. Additionally, portal component 202 can provide users the ability toselectively provision and manage applications that have been deployed orwill be deployed to the various mobile devices 110 based on, forexample, the job functionality of the user associated with theindividual mobile device or on the applications that have been, or willbe deployed, on each mobile device 110. Moreover, portal component 202can be utilized to acquire or retrieve customer specific information(e.g., billing information, customer identification information, dataregarding the various and disparate mobile devices that a customer needsto provision, the assorted applications that need to be provisioned tothe various mobile devices owned/leased by the small to medium businessestablishment, the applications and/or versions of applications that arecurrently present on extant mobile devices owned/leased by the small tomedium business establishment, the user profiles associated with each ofmobile devices owned/leased by the small to medium businessorganization, . . . ) as well as telecommunication vendor (or carrier)specific information. Where a customer has never utilized applicationdelivery platform 102, further information necessary to establish anaccount and/or a presence with application delivery platform 202 canalso be obtained by portal component 202. It is to be appreciated bythose ordinarily skill in the art, without limitation or loss ofgenerality, that the information (or portions thereof) acquired orretrieved by portal component 202 can also be a obtained from one ormore databases that can be associated with a particulartelecommunications vendor/carrier or from mobile device manufacturers,for example.

Additionally, portal component 202 can also be employed to create andrecommend bundles of applications that can be utilized for the variousjob functionalities performed within a small or medium sized businessentity. For instance, application bundles can be created and recommendedby portal component 202 for use by a wide variety of personnel that canmake up a small to medium sized business organization. For example, oneapplication bundle created and/or suggested by portal component 202 canbe directed towards management and/or accounting tools that can beutilized by administrative personnel, whereas another bundle ofapplications can be directed towards marketing or sales personnel, and afurther bundle of applications can be directed to system administrativeor computer support employees.

Furthermore, portal component 202 can be employed to provide a singlepoint of sale for the purchase and/or acquisition of the various and/ordisparate applications provisioned to the plurality of mobile devices110. For example, a system administrator associated with a small tomedium sized business entity or organization (e.g., small to mediumsized business component 106) can utilize portal component 202 to enterinformation related to multiple distinct mobile devices (e.g., mobiledevice 110), each of which can be associated with (or is to beassociated with) disparate job functionalities within the small tomedium sized business entity. Portal component 202, based at least inpart on the received or solicited information regarding the disparatedevices (e.g., mobile devices 110), various job functionalities, andassorted applications (e.g., deduced and/or bundled by portal component202 utilizing one or more artificial intelligence or machine learningfacilities) to be delivered to each of these disparate devices, canestablish how the small to medium business entity or organization shouldbe billed for provisioning each of the identified mobile devices withthe appropriate applications that fulfill the requirements set forth bythe system administrator associated with small to medium sized businessor as determined by portal component 202. For instance, portal component202, in conjunction with independent software vendor component 108, candetermine or establish the payment terms or tariffs for each applicationdelivered to each of the mobile devices 110.

Additionally application delivery platform 102 can include provisioningcomponent 204 that based at least in part on input received from portalcomponent 202 can automatically configure and/or provision the variousdisparate mobile devices with appropriate applications. In accordancewith an aspect of the claimed subject matter, provisioning component 204can provide indication to independent software vendor component 108 thata particular application is needed to provision a particular mobiledevice 110. Upon dispatch of such indication provisioning component 204can wait for the application to be delivered to it by independentsoftware vendor component 108 at which point provisioning component 204can configure the application and thereafter disseminate it to themobile device. Alternatively and/or additionally, provisioning component204 can forward to independent software vendor component 108 thenecessary configuration details needed to configure the application fora particular mobile device, at which point independent software vendorcomponent 108 can return the applications that are configured for themobile device which provisioning component 204 can subsequentlydisseminate to the appropriate mobile device(s). This latter facilitycan, for example, be utilized where provisioning component 204 isunaware of current applications from an independent software vendor thatmeet the requirements deduced by portal component 202 or requested byadministrators associated with small to medium sizes business component106. For example, a mobile device new to the market may not have aversion of a business software that runs on it, so provisioningcomponent 204 can send a request to an independent software vendorassociated with independent software vendor component 108 indicatingthat there is a need and/or requirement for a version of businesssoftware capable of running on the new mobile device. In this manner thesoftware vendor can be apprised of an impending need or requirement forits applications and thus develop business software for new to themarket mobile devices. As a further addition and/or alternative,independent software vendor component 108 can, if necessary, dispatchconfigured applications directly to the mobile device therebycircumventing provisioning component 204 altogether.

Additionally, application delivery platform 102 can include store 206that can include any suitable data necessary for application deliveryplatform 102 to facilitate it aims, such as customer information (e.g.,unique identifiers for existing mobile devices), billing accountinformation linked to each and every device associated with thecustomer, etc. For instance, store 206 can include information regardinguser data, data related to a portion of a transaction, creditinformation, historic data related to a previous transaction, a portionof data associated with purchasing a good and/or service, a portion ofdata associated with selling a good and/or service, geographicallocation, online activity, previous online transactions, activity acrossdisparate networks, activity across a network, credit card verification,membership, duration of membership, communication associated with anetwork, buddy lists, contacts, questions answered, questions posited,response time for questions, blog data, blog entries, endorsements,items bought, items sold, products on the network, information gleanedfrom a disparate website, information obtained from a disparate network,ratings from a website, a credit score, a donation to charity, or anyother information related to software, applications, web conferencing,and/or any suitable data related to transactions, etc.

It is to be appreciated that store 206 can be, for example, volatilememory or non-volatile memory, or can include both volatile andnon-volatile memory. By way of illustration, and not limitation,non-volatile memory can include read-only memory (ROM), programmableread only memory (PROM), electrically programmable read only memory(EPROM), electrically erasable programmable read only memory (EEPROM),or flash memory. Volatile memory can include random access memory (RAM),which can act as external cache memory. By way of illustration ratherthan limitation, RAM is available in many forms such as static RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink® DRAM (SLDRAM),Rambus® direct RAM (RDRAM), direct Rambus® dynamic RAM (DRDRAM) andRambus® dynamic RAM (RDRAM). Store 206 of the subject systems andmethods is intended to comprise, without being limited to, these and anyother suitable types of memory. In addition, it is to be appreciatedthat store 206 can be a server, a database, a hard drive, and the like.

FIG. 3 provides further illustration of provisioning component 204 inaccordance with further aspects of the claimed subject matter. Asillustrated, provisioning component 204 can include sales component 302that can facilitate and/or effectuate purchase, dissemination,configuration, and/or provisioning of different and/or disparateapplications reposited locally to provision component 204 or persistedremotely from provisioning component 204 (e.g., stored or obtained fromindependent software vendor component 108) to one of more diverse mobiledevice included in the plurality of mobile device 110. In accordancewith one or more aspects of the claimed subject matter, sales component302 can receive or elicit details regarding a small to medium sizedbusiness organization and/or entity. Information that can be obtained orrequested from such a small to medium sized business organization and/orentity can include what types of mobile devices 110 that are beingemployed by the small to medium sized organization and/or entity, thevarious types of functionalities to which the various mobile devices 110are being employed or are to be utilized, the current status the smallto medium sized business entity and/or organization has with applicationdelivery platform 102 (e.g., whether small to medium sized businessentity and/or organization is a current customer of application deliveryplatform 102, billing information, payment details, configurationinformation of all the mobile devices that a particular small to mediumsized business entity and/or organization might have ordered or currentowns or leases, . . . ). Based at least in part on such received and/orelicited information, sales component 302 can retrieve variousrecommended application bundles that can be suitable for the varioustasks and/or functionalities and the capabilities of the mobile devicesassociated with the small to medium sized business entity. Furthermore,sales component 302 can provide suggestions or recommendations as toother applications that might not have been previously considered orcontemplated but that nevertheless can be used by small to medium sizedbusiness to fulfill or enhance one or more job functionalities or tasksundertaken by personnel in possession of the mobile devices. Moreover,sales component 302 can make note of functionalities that may beperformed by small to medium size business or organization for whichthere currently are no applications, or where a particular mobile deviceis incapable of executing applications that address the notedfunctionality (e.g., the independent software vendor has applicationsthat address the noted functionality, but the applications do notexecute on the particular mobile device platforms possessed by the smallto medium sized business organization).

Once sales component 302 has obtain all necessary information, it cancause other aspects of provisioning component 204 to effectuatedissemination, configuration, and provisioning of the various mobiledevices owned, ordered, or leased by small to medium sized businessorganization with appropriate applications. For example, provisioningcomponent 204, at the instigation of sales component 302, can initiallydeploy an agent to the mobile devices associated with the small tomedium size business at issue, the agent can perform an analysis of themobile device to which it is deployed and further perform any necessarysetup, initialization, and/or cleanup in preparation to receiving theone or more application subsequently disseminated from provisioningcomponent 204. It should be noted that specific configuration ofallocated and/or disseminated applications can be performed locally onthe mobile device by the agent or can be performed by provisioningcomponent 204 prior to the application being dispatched fromprovisioning component 204. Additionally and/or alternatively, the agentcan also provide configuration facilities and/or functionalities when,and if, applications are sent directly from independent software vendorcomponent 108. This latter facility and/or functionality can beemployed, for example, when independent software vendor component 108disseminates application updates, security patches, etc. or when anextant application, available on other mobile devices but currently notavailable on a particular mobile device, is sent from independentsoftware vendor component 108 to the affected mobile device therebycircumventing the facilities of provisioning component 108.

FIG. 4 provides yet further illustration of provisioning component 204in accordance with an aspect of the claimer subject matter. Asillustrated, in addition to sales component 302 the functionalities andfacilities of which have been elucidated above in connection with FIG.3, provisioning component 204 can also include discovery component 402that can permit small to medium sized businesses and/or individuals todiscover applications that they want to purchase and provision to theirvarious and diverse mobile devices. Discovery component 402 can allowsmall to medium sized businesses (or more particularly, systemadministrators associated with such small to medium sized businessorganizations) to connect with so that they can identify and/or purchaseapplications to be executed on one or more mobile devices associatedwith the small to medium sized business entities. Discovery component402 can, like sales component 302, receive and/or solicit informationfrom small to medium sized business organization, such as, whether thesmall to medium sized business entity is a current customer (if notdiscovery component 402, like sales component 302, can establish acustomer presence for the small to medium sized business organization),billing information, payment details, configuration information of theproposed mobile devices to which the application is to be applied, theproposed usage of such applications, etc. Based at least in part oninformation gathered and/or deduced or inferred (e.g., throughutilization of artificial intelligence or machine learning techniques)discovery component 402 can cause identified and/or purchasedapplications to be delivered to the various selected mobile devicesassociated with small to medium sized business organization.

FIG. 5 illustrates a further aspect of provisioning component 204 inaccordance with further aspects of the claimed subject matter. Asdepicted provisioning component 204 can further include replicatingcomponent 502 that can allow small to medium sized business entities orindividuals associated with small to medium sized business organizationsto add applications or users to an existing customer profile establishedfor the small to medium sized business entity. As will be appreciated bythose of reasonable skill in the art, this aspect of the claimed subjectmatter, will typically require that the small to medium sized businessentity to have previously established a customer profile withapplication delivery platform 102.

In addition, replicating component 502 can also be utilized in instanceswhen personnel at small to medium sized business entity requestapplications that are not available for provisioning by provisioningcomponent 204 (e.g., applications that have yet to be written for aparticular business functionality, applications that are currently noavailable for a particular mobile device platform, and the like). Herefor example, replicating component 502, once the details of the desiredapplication has been noted, can communicate with independent softwarevendor component 108 to inform it that an application that current doesnot exist is required. When independent software vendor component 108receives this indication from replicating component 502 it can commencedeveloping the necessary application which upon completion can bedispatched to application delivery component 102 where the newlydeveloped application can be distributed, configured, and/or provisionedto the requesting small to medium sized business organization as well aspersisted for future distribution and configuration to other requestingsmall to medium sized business entities that might require the recentlydeveloped application.

FIG. 6 depicts a system 600 that employs artificial intelligence tofacilitate and/or effectuate application delivery to a variety ofdisparate mobile devices in accordance with an aspect of the claimedsubject matter. Accordingly, as illustrated, system 600 can include anintelligence component 602 that can employ a probabilistic based orstatistical based approach, for example, in connection with makingdeterminations or inferences. Inferences can be based in part uponexplicit training of classifiers (not shown) or implicit training basedat least in part upon system feedback and/or users previous actions,commands, instructions, and the like during use of the system.Intelligence component 602 can employ any suitable scheme (e.g., neuralnetworks, expert systems, Bayesian belief networks, support vectormachines (SVMs), Hidden Markov Models (HMMs), fuzzy logic, data fusion,etc.) in accordance with implementing various automated aspectsdescribed herein. Intelligence component 602 can factor historical data,extrinsic data, context, data content, state of the user, and cancompute cost of making an incorrect determination or inference versusbenefit of making a correct determination or inference. Accordingly, autility-based analysis can be employed with providing such informationto other components or taking automated action. Ranking and confidencemeasures can also be calculated and employed in connection with suchanalysis.

In view of the illustrative systems shown and described supra,methodologies that may be implemented in accordance with the disclosedsubject matter will be better appreciated with reference to the flowcharts of FIGS. 7-9. While for purposes of simplicity of explanation,the methodologies are shown and described as a series of blocks, it isto be understood and appreciated that the claimed subject matter is notlimited by the order of the blocks, as some blocks may occur indifferent orders and/or concurrently with other blocks from what isdepicted and described herein. Moreover, not all illustrated blocks maybe required to implement the methodologies described hereinafter.Additionally, it should be further appreciated that the methodologiesdisclosed hereinafter and throughout this specification are capable ofbeing stored on an article of manufacture to facilitate transporting andtransferring such methodologies to computers.

The claimed subject matter can be described in the general context ofcomputer-executable instructions, such as program modules, executed byone or more components. Generally, program modules can include routines,programs, objects, data structures, etc. that perform particular tasksor implement particular abstract data types. Typically the functionalityof the program modules may be combined and/or distributed as desired invarious aspects.

FIG. 7 illustrates a methodology 700 that facilitates the disseminating,configuring, and/or provisioning applications to one or more mobiledevice in accordance with an aspect of the claimed subject matter. Asillustrated methodology 700 can commence at 702 where a retail salesagent can sell a device (or a set or series of disparate devices) to asmall to medium sized business entity or organization. At 704 the salesagent can log onto an application delivery platform. At 706 a decisioncan be made as to whether or not the small to medium sized businessentity falls within a target vertical (e.g., whether or not there existsa predefined set of applications that substantially or totally satisfiesthe needs of a particular small or mediums sized business).

Where, at 706 the response to the query is positive (e.g., YES)methodology 700 can proceed to 708 whereupon a recommended bundle ofapplications can be retrieved (e.g., from local and/or remote storagedevices and/or databases, or from repositories associated with one ormore independent software vendors) or can be deduced through use of oneor more artificial intelligence or machine learning techniques afterwhich methodology 700 can proceed to 712. Where at 706 the response tothe query is negative (e.g., NO) methodology 700 can proceed to 710where a generic list of applications can be presented after which themethod can progress to 712. It should be noted without limitation orloss of generality, that in providing the generic list of applications,machine learning and artificial intelligence methodologies can beutilized to infer a more constrained list of applications more suited tothe small to medium sized business organization at issue. For instance,where a small to medium sized business organization is in the field ofmarketing, artificial intelligence and/or machine learning techniquescan be employed to whittle down the generic list of applications tothose that would better suit business organizations in the field ofmarketing.

At 712 depending upon whether a recommended bundle was retrieved or ageneric application list is presented, the recommended bundle or thegeneric application list can be customized to suit the particular smallto medium sized business at issue. Customization of either therecommended bundle or the generic application list can includeaugmenting applications to the list or bundle, or removing applicationsfrom the bundle or list as circumstances dictate. Once the applicationbundle or list has been suitably customized to the small to medium sizedbusiness' satisfaction, methodology 700 can proceed to 714 where anotherdecision block can be encountered.

At 714 the query can be posited as to whether or not the small to mediumsized business organization currently use a previously suggested orexisting solution. If the response to the query at 714 is affirmative(e.g., YES) methodology 700 can progress to 716 where a password for thesolution can be added, for example to an existing or establishedcustomer profile, thereby associating the solution to the applicationplatform 102 after which method 700 can proceed to 718. If on the otherhand the response to the query at 714 is negative (e.g., NO) methodology700 can proceed directly to 718 at which point solutions selected fromthe generic application list can be added to the customer profile and,if necessary, new passwords can be established and associated with thecustomer profile.

At 720 connection can be made to a hosted solution (e.g., a solutionobtained from an independent software vendor 108, or from a datarepository associated with application delivery platform 102) and anacknowledgement can be received in return. At 722 the applicationdelivery platform 102 can collect the provisioning information necessary(e.g., mobile device configuration data, password information, etc.) andfurther, if applicable adds application delivery platform specificinformation to the collected provisioning information. At 724 once allthe provisioning information has been collect and the solution ready fordeployment, the provisioning information together with the solution(application package) can be sent to a previously deployed agentsituated on mobile devices 110, the previously deployed agent then cango about correctly installing and configuring the application package onthe mobile device to which the solution has been deployed,

FIG. 8 depicts a machine implemented method 800 for disseminating,configuring, and/or provisioning applications to mobile devices inaccordance with an aspect of the claimed subject matter. As depictedmethod 800 can commence at 802 where a customer visits the applicationdelivery platform 102 (e.g., through utilization of the Internet and itsassociated protocols and technologies). At 804 the customer can selectand purchase a solution. At 806 a query can be addressed as to whetheror not the selected and purchased solution is an individual application.If the response to the query is affirmative (e.g., YES) then method 800can proceed to 808 where the selected or identified application can bepurchased at which point the method can terminate. If on the other handthe response to the query posited at 806 is negative (e.g., NO) thenmethod 800 can proceed to 810 wherein because the user/customer wasallowed to select and purchase the solution this implies that thesolution (e.g., application) currently exists, and based on thisimplication methodology 800 can proceed to 812. At 812 appropriateinformation can be gathered for billing and configuration purposes,after which method 800 can proceed to decision block 814. At 814 a querycan be addressed as to whether or not the customer (e.g., small tomedium sized business organization or entity 106) has a billing account.If the response to the query at 814 is affirmative (e.g., YES) method800 can proceed to 816 where the billing account can be setup or furtheramended/updated. If the response to query at 814 is negative (e.g., NO)method 800 can proceed to 818. At 818 the customer can be informed thatthe utility effectuated by method 800 is only available for existingcustomer accounts, at which point method 800 can terminate.

Returning to act 816, once the billing account and login informationsetup has been performed at 816, method 800 can proceed to 820 where acustomer can select and add one or more application solutions to thebilling account as well as assign the one or more selected applicationsolutions to those users within the small to medium sized business thatrequire such solutions. At 822 network administrators or systemadministrators affiliated with the small to medium-sized businessassociated with the billing account can be provided access toapplication delivery platform 102. At 824 the one more selectedapplication solutions can be dispatched, configured, and provisioned toidentified mobile devices 110 associated with the small to medium-sizedbusiness organization.

FIG. 9 illustrates a machine implemented methodology 900 fordistributing, configuring, and/or provisioning applications to mobiledevices in accordance with an aspect of the claimed subject matter. Asdepicted methodology 900 can commence at 902 where a customer can logininto an application delivery platform (e.g., application deliveryplatform 102). At 904 a customer can identify and locate one or more newapplications appropriate for the small to medium-sized business' needs(e.g., from a presented list), after which method 900 can proceed todecision block 906. At 906 a query can be posited regarding whether ornot the identified and selected one or more new applications arecurrently extant, known to, and/or persisted on the application deliveryplatform. If the response to the query posed at 906 is affirmative(e.g., YES), then methodology 900 can proceed to 908. At 908 thecustomer (e.g., small to medium-sized business) can sign up for deliveryof the new application or can add or associate a new user to theapplication if the application has previously been selected by thecustomer. At 910 the identified or selected solution can be delivered ordispatched to the mobile device that requires the application and/or isassociated with the new user, at which point method 900 can terminate.If on the other hand, the response to the query posited at 906 isnegative (e.g. NO) then methodology 900 can proceed to 912 whereupon arequest can be made to a software vendor/provider (e.g., one of the manysoftware providers or vendors included in independent software vendorcomponent 108) for the software vendor/provider to mobilize a solution,after which method 900 can proceed to another decision block 914. Adecision block 914 application delivery platform (e.g., applicationdelivery platform 102) can query the software vendor/provider (e.g., thesoftware/application vendor/provider that is to supply the solution) asto whether or not it wishes to collaborate with application deliveryplatform (e.g. application delivery platform 102). If the response tothis query is negative (e.g. NO) method 900 proceeds 916 where thecustomer can be informed that their desired application cannot bedelivered to them and/or is not available after which method 900 canhalt. If on the other hand, the response to the query posited 914 ispositive (e.g., YES) method 900 can proceed to 918 whereupon theapplication delivery platform (e.g., the vendor since the purchase andsale of the application solution is being facilitated throughapplication delivery platform 102) can inform the software provider(e.g., the software/application vendor/provider that is to supply thesolution included in independent software vendor component 108) of theprotocols and/or procedures on how to mobilize the solution (e.g., howthe identified and selected application should be supplied and to whomit should be supplied). At 920 the software provider can mobilize thesolution according to the protocols and procedures specified or outlinedat 918, after which method 900 can proceed to 922. At 922 the requestingcustomer can be notified of the delivery of the identified and selectedapplication solution and the mobile device upon which the selectedapplication solution is to execute appropriately provisioned and theapplication configured to run on the mobile device.

The claimed subject matter can be implemented via object orientedprogramming techniques. For example, each component of the system can bean object in a software routine or a component within an object. Objectoriented programming shifts the emphasis of software development awayfrom function decomposition and towards the recognition of units ofsoftware called “objects” which encapsulate both data and functions.Object Oriented Programming (OOP) objects are software entitiescomprising data structures and operations on data. Together, theseelements enable objects to model virtually any real-world entity interms of its characteristics, represented by its data elements, and itsbehavior represented by its data manipulation functions. In this way,objects can model concrete things like people and computers, and theycan model abstract concepts like numbers or geometrical concepts.

As used in this application, the terms “component” and “system” areintended to refer to a computer-related entity, either hardware, acombination of hardware and software, or software in execution. Forexample, a component can be, but is not limited to being, a processrunning on a processor, a processor, a hard disk drive, multiple storagedrives (of optical and/or magnetic storage medium), an object, anexecutable, a thread of execution, a program, and/or a computer. By wayof illustration, both an application running on a server and the servercan be a component. One or more components can reside within a processand/or thread of execution, and a component can be localized on onecomputer and/or distributed between two or more computers.

Artificial intelligence based systems (e.g., explicitly and/orimplicitly trained classifiers) can be employed in connection withperforming inference and/or probabilistic determinations and/orstatistical-based determinations as in accordance with one or moreaspects of the claimed subject matter as described hereinafter. As usedherein, the term “inference,” “infer” or variations in form thereofrefers generally to the process of reasoning about or inferring statesof the system, environment, and/or user from a set of observations ascaptured via events and/or data. Inference can be employed to identify aspecific context or action, or can generate a probability distributionover states, for example. The inference can be probabilistic—that is,the computation of a probability distribution over states of interestbased on a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources. Various classification schemes and/or systems(e.g., support vector machines, neural networks, expert systems,Bayesian belief networks, fuzzy logic, data fusion engines . . . ) canbe employed in connection with performing automatic and/or inferredaction in connection with the claimed subject matter.

Furthermore, all or portions of the claimed subject matter may beimplemented as a system, method, apparatus, or article of manufactureusing standard programming and/or engineering techniques to producesoftware, firmware, hardware or any combination thereof to control acomputer to implement the disclosed subject matter. The term “article ofmanufacture” as used herein is intended to encompass a computer programaccessible from any computer-readable device or media. For example,computer readable media can include but are not limited to magneticstorage devices (e.g., hard disk, floppy disk, magnetic strips . . . ),optical disks (e.g., compact disk (CD), digital versatile disk (DVD) . .. ), smart cards, and flash memory devices (e.g., card, stick, key drive. . . ). Additionally it should be appreciated that a carrier wave canbe employed to carry computer-readable electronic data such as thoseused in transmitting and receiving electronic mail or in accessing anetwork such as the Internet or a local area network (LAN). Of course,those skilled in the art will recognize many modifications may be madeto this configuration without departing from the scope or spirit of theclaimed subject matter.

Some portions of the detailed description have been presented in termsof algorithms and/or symbolic representations of operations on data bitswithin a computer memory. These algorithmic descriptions and/orrepresentations are the means employed by those cognizant in the art tomost effectively convey the substance of their work to others equallyskilled. An algorithm is here, generally, conceived to be aself-consistent sequence of acts leading to a desired result. The actsare those requiring physical manipulations of physical quantities.Typically, though not necessarily, these quantities take the form ofelectrical and/or magnetic signals capable of being stored, transferred,combined, compared, and/or otherwise manipulated.

It has proven convenient at times, principally for reasons of commonusage, to refer to these signals as bits, values, elements, symbols,characters, terms, numbers, or the like. It should be borne in mind,however, that all of these and similar terms are to be associated withthe appropriate physical quantities and are merely convenient labelsapplied to these quantities. Unless specifically stated otherwise asapparent from the foregoing discussion, it is appreciated thatthroughout the disclosed subject matter, discussions utilizing termssuch as processing, computing, calculating, determining, and/ordisplaying, and the like, refer to the action and processes of computersystems, and/or similar consumer and/or industrial electronic devicesand/or machines, that manipulate and/or transform data represented asphysical (electrical and/or electronic) quantities within the computer'sand/or machine's registers and memories into other data similarlyrepresented as physical quantities within the machine and/or computersystem memories or registers or other such information storage,transmission and/or display devices.

Referring now to FIG. 10, there is illustrated a block diagram of acomputer operable to execute the disclosed system. In order to provideadditional context for various aspects thereof, FIG. 10 and thefollowing discussion are intended to provide a brief, generaldescription of a suitable computing environment 1000 in which thevarious aspects of the claimed subject matter can be implemented. Whilethe description above is in the general context of computer-executableinstructions that may run on one or more computers, those skilled in theart will recognize that the subject matter as claimed also can beimplemented in combination with other program modules and/or as acombination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the claimed subject matter may also bepracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and non-volatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media includes both volatileand non-volatile, removable and non-removable media implemented in anymethod or technology for storage of information such ascomputer-readable instructions, data structures, program modules orother data. Computer storage media includes, but is not limited to, RAM,ROM, EEPROM, flash memory or other memory technology, CD-ROM, digitalvideo disk (DVD) or other optical disk storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by the computer.

With reference again to FIG. 10, the illustrative environment 1000 forimplementing various aspects includes a computer 1002, the computer 1002including a processing unit 1004, a system memory 1006 and a system bus1008. The system bus 1008 couples system components including, but notlimited to, the system memory 1006 to the processing unit 1004. Theprocessing unit 1004 can be any of various commercially availableprocessors. Dual microprocessors and other multi-processor architecturesmay also be employed as the processing unit 1004.

The system bus 1008 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1006includes read-only memory (ROM) 1010 and random access memory (RAM)1012. A basic input/output system (BIOS) is stored in a non-volatilememory 1010 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1002, such as during start-up. The RAM 1012 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1002 further includes an internal hard disk drive (HDD)1014 (e.g., EIDE, SATA), which internal hard disk drive 1014 may also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1016, (e.g., to read from or write to aremovable diskette 1018) and an optical disk drive 1020, (e.g., readinga CD-ROM disk 1022 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1014, magnetic diskdrive 1016 and optical disk drive 1020 can be connected to the systembus 1008 by a hard disk drive interface 1024, a magnetic disk driveinterface 1026 and an optical drive interface 1028, respectively. Theinterface 1024 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE 1094 interfacetechnologies. Other external drive connection technologies are withincontemplation of the claimed subject matter.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1002, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, may also be used in the illustrative operating environment, andfurther, that any such media may contain computer-executableinstructions for performing the methods of the disclosed and claimedsubject matter.

A number of program modules can be stored in the drives and RAM 1012,including an operating system 1030, one or more application programs1032, other program modules 1034 and program data 1036. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1012. It is to be appreciated that the claimed subjectmatter can be implemented with various commercially available operatingsystems or combinations of operating systems.

A user can enter commands and information into the computer 1002 throughone or more wired/wireless input devices, e.g., a keyboard 1038 and apointing device, such as a mouse 1040. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1004 through an input deviceinterface 1042 that is coupled to the system bus 1008, but can beconnected by other interfaces, such as a parallel port, an IEEE 1094serial port, a game port, a USB port, an IR interface, etc.

A monitor 1044 or other type of display device is also connected to thesystem bus 1008 via an interface, such as a video adapter 1046. Inaddition to the monitor 1044, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1002 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1048. The remotecomputer(s) 1048 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1002, although, for purposes of brevity, only a memory/storage device1050 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1052 and/orlarger networks, e.g., a wide area network (WAN) 1054. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich may connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1002 isconnected to the local network 1052 through a wired and/or wirelesscommunication network interface or adapter 1056. The adaptor 1056 mayfacilitate wired or wireless communication to the LAN 1052, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adaptor 1056.

When used in a WAN networking environment, the computer 1002 can includea modem 1058, or is connected to a communications server on the WAN1054, or has other means for establishing communications over the WAN1054, such as by way of the Internet. The modem 1058, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1008 via the serial port interface 1042. In a networkedenvironment, program modules depicted relative to the computer 1002, orportions thereof, can be stored in the remote memory/storage device1050. It will be appreciated that the network connections shown areillustrative and other means of establishing a communications linkbetween the computers can be used.

The computer 1002 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE 802.11x (a,b, g, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE 802.3 or Ethernet).

Wi-Fi networks can operate in the unlicensed 2.4 and 5 GHz radio bands.IEEE 802.11 applies to generally to wireless LANs and provides 1 or 2Mbps transmission in the 2.4 GHz band using either frequency hoppingspread spectrum (FHSS) or direct sequence spread spectrum (DSSS). IEEE802.11a is an extension to IEEE 802.11 that applies to wireless LANs andprovides up to 54 Mbps in the 5 GHz band. IEEE 802.11a uses anorthogonal frequency division multiplexing (OFDM) encoding scheme ratherthan FHSS or DSSS. IEEE 802.11b (also referred to as 802.11 High RateDSSS or Wi-Fi) is an extension to 802.11 that applies to wireless LANsand provides 11 Mbps transmission (with a fallback to 5.5, 2 and 1 Mbps)in the 2.4 GHz band. IEEE 802.11g applies to wireless LANs and provides20+ Mbps in the 2.4 GHz band. Products can contain more than one band(e.g., dual band), so the networks can provide real-world performancesimilar to the basic 10BaseT wired Ethernet networks used in manyoffices.

What has been described above includes examples of the disclosed andclaimed subject matter. It is, of course, not possible to describe everyconceivable combination of components and/or methodologies, but one ofordinary skill in the art may recognize that many further combinationsand permutations are possible. Accordingly, the claimed subject matteris intended to embrace all such alterations, modifications andvariations that fall within the spirit and scope of the appended claims.Furthermore, to the extent that the term “includes” is used in eitherthe detailed description or the claims, such term is intended to beinclusive in a manner similar to the term “comprising” as “comprising”is interpreted when employed as a transitional word in a claim.

What is claimed is:
 1. A system, comprising: a processor; and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: in responseto receiving, from a network device, a request for a first application,determining, based on a user identity and data representing historicaldata, extrinsic data, context data, and state data associated with theuser identity, that a benefit associated with making a correct decisionin regard to selecting the first application associated with a firstdistinguishable application functionality rather than selecting apreviously sent second application associated with a seconddistinguishable application functionality outweighs a cost associatedwith not making the correct decision in regard to not selecting thefirst application rather than selecting the previously sent secondapplication; and in response to the determining, sending the firstapplication to a user device or the second application to the userdevice.
 2. The system of claim 1, wherein the request from the networkdevice comprises account information regarding a business identity, andwherein the account information comprises employee and financialinformation associated with the business identity.
 3. The system ofclaim 1, wherein the request from the network device comprisesinformation regarding a configuration of the user device.
 4. The systemof claim 2, wherein the user device is assigned to a user role withinthe business identity.
 5. The system of claim 1, wherein the operationsfurther comprise utilizing over the air data interchange with the userdevice to send the first application.
 6. The system of claim 1, whereinthe network device is associated with a business identity ofindependently operating business identities.
 7. The system of claim 1,wherein the operations further comprise updating the first applicationin response to identifying that an update to the first application hasbeen received from a vendor device.
 8. The system of claim 1, whereinthe operations further comprise: enabling additional user devices, otherthan the user device and affiliated with the network device associatedwith a business identity, to utilize the previously sent secondapplication deployed on the additional user devices; and providingconfiguration information to the additional user devices to configurethe additional user devices to utilize the previously sent secondapplication.
 9. The system of claim 1, wherein the user device is afirst user device, and wherein the operations further comprisefacilitating a device affiliated with a service provider device tomanage the first application requested by the network device.
 10. Thesystem of claim 1, wherein the operations further comprise facilitatinga device to identify a third application functionality currently notextant with respect to the user identity.
 11. The system of claim 10,wherein the operations further comprise sending the third applicationfunctionality to a vendor device that employs the third applicationfunctionality to enhance the first application resulting in anapplication update.
 12. The system of claim 11, wherein the applicationupdate is received from the vendor device by the user device, andwherein the operations further comprise receiving a notification thatthe application update has been received from the vendor device.
 13. Thesystem of claim 11, wherein the operations further comprise: receivingthe application update that is received from the vendor device; andsending the application update to the user device.
 14. A method,comprising: determining, by a system comprising a processor, adifference between facilitating execution on a device of a firstdistinct application functionality associated with a first applicationand facilitating execution on the device of a second distinctapplication functionality associated with a second application, whereinthe difference is determined as a function of data representinghistorical data, extrinsic data, context data, and state data associatedwith an identity associated with the device and a utility basedinference that determines that a benefit associated with making adecision correctly in relation to the first distinct applicationfunctionality and the second distinct application functionalityoutweighs a cost associated with making the decision incorrectly inrelation to the first distinct application functionality and the seconddistinct application functionality; configuring, by the system, thefirst application for execution on the device; and sending, by thesystem, the first application to the device.
 15. The method of claim 14,further comprising: determining, by the system, that a vendor device isnot affiliated with a service provider device; and requesting, by thesystem, that the vendor device join with the service provider deviceprior to the sending of the first application to the device.
 16. Themethod of claim 14, further comprising utilizing, by the system, overthe air data communication with the device during the sending of thefirst application.
 17. The method of claim 14, further comprisingidentifying, by the system, an application functionality not currentlyfacilitated by the first distinct application functionality and thesecond distinct application functionality, wherein the applicationfunctionality is associated with data representative of a user role. 18.The method of claim 14, further comprising, in response to a vendordevice sending an update for the device, augmenting, by the system, thefirst application with a distinguishable application functionality notfacilitated by the first distinct application functionality and thesecond distinct application functionality, wherein the update comprisesthe distinguishable application functionality.
 19. A non-transitorymachine-readable storage medium, comprising executable instructionsthat, when executed by a processor, facilitate performance ofoperations, comprising: in response to receiving a request, facilitatedby an agent executing on a remote device, for an application and asfunction of an operation associated with a first applicationfunctionality previously initiated on the remote device, performing acost versus benefit analysis to identify the application, whereinfacilitating on the remote device of the first application functionalitydiffers from facilitating on the remote device of a second applicationfunctionality associated with the application, and wherein the costversus benefit analysis uses data, representative of historical data,extrinsic data, context data, and state data associated with anidentity, to determine a benefit associated with a decision relating tothe first application functionality and the second applicationfunctionality being greater than a cost associated with not making thedecision relating to the first application functionality and the secondapplication functionality; and as a function of the cost versus benefitanalysis, sending the application with the first applicationfunctionality, or sending the application with the second applicationfunctionality, to the remote device.
 20. The non-transitorymachine-readable storage medium of claim 19, wherein the operationsfurther comprise identifying a functionality currently not extant withrespect to a job functionality of the identity associated with theremote device.