Automated desktop placement
First Claim
1. A computer-implemented method, the method comprising:
- as implemented by one or more computing devices configured with specific computer-executable instructions,receiving a request from a computing device of an entity to access a computing resource;
determining an access rule for accessing the computing resource based at least partially on an identity of the entity, wherein the access rule includes at least a first rule for limiting access to the computing resource at a particular data center to a first subset of users from a first set of users while permitting one or more users from a second set of users to access the computing resource at the particular data center, or a second rule that scales the number of users from the first set of users that can access the computing resource at the particular data center, wherein each of the users from the first set of users are permitted to access the computing resource and wherein the first rule further comprises permitting a second subset of users from the first set of users associated with the entity to access the computing resource at a different data center;
selecting a data center from a plurality of data centers based at least in part on the access rule;
identifying an instance of the computing resource at the data center based at least partially on the access rule; and
providing the computing device with access to the instance of the computing resource.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are presented for enabling a user to provide rules for the placement of computing resources at a data center for an entity that employs or is associated with the user. The data center can use the placement rules to select a data center computer system to host computing resources for a user. The rules can be used to establish diversity in computing resource placement at the data center thereby reducing the number of users who lose access to computing resources when a specific data center computer suffers a failure. Further, the placement rules can be used to facilitate configuration of the computer resources for the user based, for example, on the user'"'"'s employment responsibilities.
221 Citations
20 Claims
-
1. A computer-implemented method, the method comprising:
as implemented by one or more computing devices configured with specific computer-executable instructions, receiving a request from a computing device of an entity to access a computing resource; determining an access rule for accessing the computing resource based at least partially on an identity of the entity, wherein the access rule includes at least a first rule for limiting access to the computing resource at a particular data center to a first subset of users from a first set of users while permitting one or more users from a second set of users to access the computing resource at the particular data center, or a second rule that scales the number of users from the first set of users that can access the computing resource at the particular data center, wherein each of the users from the first set of users are permitted to access the computing resource and wherein the first rule further comprises permitting a second subset of users from the first set of users associated with the entity to access the computing resource at a different data center; selecting a data center from a plurality of data centers based at least in part on the access rule; identifying an instance of the computing resource at the data center based at least partially on the access rule; and providing the computing device with access to the instance of the computing resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A system comprising:
-
an electronic data store configured to at least store one or more access rules; and a hardware processor in communication with the electronic data store, the hardware processor configured to execute computer-executable instructions to at least; receive a request from a computing device of an entity to access a computing resource; determine an access rule for accessing the computing resource based at least partially on an identity of the entity, wherein the access rule includes at least a first rule for limiting access to the computing resource at a particular data center to a first subset of users from a first set of users while permitting one or more users from a second set of users to access the computing resource at the particular data center, or a second rule that scales the number of users from the first set of users that can access the computing resource at the particular data center, wherein each of the users from the first set of users are permitted to access the computing resource and wherein the first rule further comprises permitting a second subset of users from the first set of users associated with the entity to access the computing resource at a different data center; select a data center from a plurality of data centers based at least in part on the access rule; identify an instance of the computing resource at the data center based at least partially on the access rule; and provide the computing device with access to the instance of the computing resource. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer-readable, non-transitory storage medium storing computer executable instructions that, when executed by one or more computing devices, configure the one or more computing devices to perform operations comprising:
-
receiving a request from a computing device of an entity to access a computing resource; determining an access rule for accessing the computing resource based at least partially on an identity of the entity, wherein the access rule includes at least a first rule for limiting access to the computing resource at a particular data center to a first subset of users from a first set of users while permitting one or more users from a second set of users to access the computing resource at the particular data center, or a second rule that scales the number of users from the first set of users that can access the computing resource at the particular data center, wherein each of the users from the first set of users are permitted to access the computing resource and wherein the first rule further comprises permitting a second subset of users from the first set of users associated with the entity to access the computing resource at a different data center; selecting a data center from a plurality of data centers based at least in part on the access rule; identifying an instance of the computing resource at the data center based at least partially on the access rule; and providing the computing device with access to the instance of the computing resource. - View Dependent Claims (18, 19, 20)
-
Specification