Architecture for a Centralized Management System
1 Assignment
0 Petitions
Accused Products
Abstract
An example of a solution provided here comprises: providing a logical design, including at least one hub containing central management tools, and a plurality of lower tiers containing local management tools; placing components according to the design; and providing, from the hub, one or more management functions. The lower tiers include one or more elements chosen from RIM'"'"'s, spokes, and POD'"'"'s.
15 Citations
54 Claims
-
1-32. -32. (canceled)
-
33. An system, comprising:
-
a processor; and a memory coupled to the processor, wherein the memory comprises instructions which, when executed by the processor, cause the processor to; determine a level of data privacy associated with a user of the user resource; responsive to the level of data privacy indicating a first level of dedicated computing resources, integrate the user resource into a first logical design that includes a shared regional infrastructure management (RIM) device, wherein the shared RIM device is shared between multiple user resources; responsive to the level of data privacy indicating a second level of dedicated computing resources, integrate the user resource into a second logical design that includes a dedicated RIM device, wherein the dedicated RIM device is dedicated for use only by the user resource; responsive to the user failing to require any level of data privacy, determine if the user resource has at least one associated unique Internet protocol (IP) address; responsive to the user resource failing to have the at least one associated unique IP address, integrate the user resource into the first logical design; responsive to the user resource having the at least one associated unique IP address, determine if the user resource utilizes a predefined percentage of a capacity of a point of deployment (POD) device; and responsive to the user resource utilizing the predefined percentage of the capacity of the POD device, integrate the user resource into a third logical design that includes at least one shared hub, the shared RIM device, a shared spoke device, and a dedicated point of deployment (POD) device. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A computer program product comprising a computer recordable medium having a computer readable program recorded thereon, wherein the computer readable program, when executed on a computing device, causes the computing device to:
-
determine a level of data privacy associated with a user of the user resource; responsive to the level of data privacy indicating a first level of dedicated computing resources, integrate the user resource into a first logical design that includes a shared regional infrastructure management (RIM) device, wherein the shared RIM device is shared between multiple user resources; responsive to the level of data privacy indicating a second level of dedicated computing resources, integrate the user resource into a second logical design that includes a dedicated RIM device, wherein the dedicated RIM device is dedicated for use only by the user resource; responsive to the user failing to require any level of data privacy, determine if the user resource has at least one associated unique Internet protocol (IP) address; responsive to the user resource failing to have the at least one associated unique IP address, integrate the user resource into the first logical design; responsive to the user resource having the at least one associated unique IP address, determine if the user resource utilizes a predefined percentage of a capacity of a point of deployment (POD) device; and responsive to the user resource utilizing the predefined percentage of the capacity of the POD device, integrate the user resource into a third logical design that includes at least one shared hub, the shared RIM device, a shared spoke device, and a dedicated point of deployment (POD) device. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
Specification