Techniques for providing and obtaining research and development information technology on remote computing resources
First Claim
1. A business model for research and development remote information technology computing comprising:
- (a) Installing a client computer hardware system in a centrally located facility with other client computer systems, (b) Installing client software onto said computer hardware system, (c) Connecting said computer hardware system to a fast secure network link, (d) Maintaining and supporting said computer hardware system, (e) Permitting the client to have secure access to said computer hardware system over a fast secure network link, (f) Performing nightly backups of data on said computer hardware system.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention describes a novel business model for performing Research and Development Information Technology Application Software Hosting using remote computing resources. A client computer user is provided access to a state-of-the-art remote computing facility and applications running on servers at this remote computing facility, which are secure, environmentally stabilized and properly managed. The computer user'"'"'s application is available via a secure data line either through a private Intranet link or using encrypted data over the Internet, using a thin-client type environment. This environment can be expanded wherein access to extremely fast processors can be managed by porting the user environment to a fast processor system employing a means that is essentially transparent to the user. The model provides hardware, software and data product installation, maintenance, support, backup and other services for the client.
-
Citations
20 Claims
-
1. A business model for research and development remote information technology computing comprising:
-
(a) Installing a client computer hardware system in a centrally located facility with other client computer systems, (b) Installing client software onto said computer hardware system, (c) Connecting said computer hardware system to a fast secure network link, (d) Maintaining and supporting said computer hardware system, (e) Permitting the client to have secure access to said computer hardware system over a fast secure network link, (f) Performing nightly backups of data on said computer hardware system. - View Dependent Claims (2, 3, 4, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
5. A business model according to claim l wherein the said computer software and data products can be selected from the group consisting of the University of Wisconsin Genetics Computer Group software, SwissProt, Sequence Retrieval Software.
-
15. A method for providing secure information processing resources at a secure facility controlled by a service provider to a plurality of subscribers, the information processing resources including a plurality of software applications controlled by the service provider and computer system resources, the computer system resources including a plurality of processors and a plurality of computer readable medium devices, the method comprising:
-
establishing the secure facility controlled by the service provider;
providing secure access to the secure facility over a network for the plurality of subscribers that excludes non-subscribers, wherein at least one subscriber is located at a remote site controlled by the at least one subscriber;
prompting a particular subscriber among the plurality of subscribers to select a particular software application among the plurality of software applications;
providing an interface that enables the particular subscriber to execute the particular software application using a particular portion of the computer system resources; and
excluding other subscribers of the plurality of subscribers from the particular portion of the computer system resources being used.
-
-
16. A method for providing secure information processing resources at a secure facility controlled by a service provider to a plurality of subscribers, the information processing resources including a plurality of software applications controlled by the service provider and computer system resources, the computer system resources including a plurality of processors and a plurality of computer readable medium devices, the method comprising:
-
providing secure access to the secure facility over a network for the plurality of subscribers that excludes non-subscribers, wherein at least one subscriber is located at a remote site controlled by the at least one subscriber;
providing an interface that enables a particular subscriber among the plurality of subscribers to execute a particular software application among the plurality of software applications using a particular portion of the computer system resources; and
excluding other subscribers of the plurality of subscribers from the particular portion of the computer system resources being used.
-
-
17. A method of obtaining secure information processing resources at a secure facility controlled by a service provider for a plurality of subscribers, the information processing resources including a plurality of software applications controlled by the service provider and computer system resources, the computer system resources including a plurality of processors and a plurality of computer readable medium devices, the method comprising:
-
securely accessing the secure facility over a network by a particular subscriber among the plurality of subscribers, from a remote site controlled by the particular subscriber; and
sending signals over the network causing a particular software application among the plurality of software applications controlled by the service provider to be executed using a particular portion of the computer system resources at the secure facility, wherein other subscribers among the plurality of subscribers are excluded from the particular portion of the computer resources.
-
-
18. A system for providing secure information processing resources by a service provider to a plurality of subscribers, the system comprising:
-
a network;
a secure facility controlled by the service provider; and
computer resources located in the secure facility including a memory medium for storing a plurality of software applications controlled by the provider and for storing data belonging to the plurality of subscribers, a communications channel connected to the network for providing secure access to the computer resources for the plurality of subscribers, wherein at least one subscriber of the plurality of subscribers is located at a remote site, and one or more processors configured for receiving signals from a particular subscriber among the plurality of subscribers over the communications channel, for executing a particular software application of the plurality of software applications using a particular portion of the computer system resources in response to the signals from the particular subscriber, and for excluding other subscribers of the plurality of subscribers from the particular portion of the computer system resources being used.
-
-
19. A computer program product for providing secure information processing resources at a secure facility controlled by a service provider to a plurality of subscribers, the information processing resources including a plurality of software applications controlled by the service provider and computer system resources, the computer system resources including a plurality of processors and a plurality of computer readable medium devices, the computer program product comprising:
-
a computer readable medium, instructions stored on the computer readable medium for causing one or more processors in the secure facility to receive signals from a particular subscriber among the plurality of subscribers over a communications channel, to execute a particular software application of a plurality of software applications controlled by the service provider using a portion of computer resources at the secure facility in response to the signals from the particular subscriber, and to exclude other subscribers among the plurality of subscribers from the particular portion of the computer resources.
-
-
20. A computer program product for obtaining information processing resources at a secure facility controlled by a service provider for a plurality of subscribers, the information processing resources including a plurality of software applications controlled by the service provider and computer system resources, the computer system resources including a plurality of processors and a plurality of computer readable medium devices, the computer program product comprising:
-
a computer readable medium; and
instructions stored on the computer readable medium for causing one or more processors, at a subscriber site controlled by a particular subscriber among the plurality of subscribers, to securely access over a network the secure facility remote from the subscriber site, and to provide signals for executing a particular software application among the plurality of software applications using a particular portion of the computer resources, wherein other subscribers among the plurality of subscribers are excluded from the particular portion of the computer resources used.
-
Specification