System and Method for Failsoft Headend Operation
First Claim
1. A method for failsoft headend operation in a complex, multiple location consumer communication and content delivery system, the system including a plurality of headend facilities, the system further including a central facility including a central database, and the system further including a distributed information technology (IT) architecture wherein a back office IT infrastructure is located at the central facility and wherein each headend facility includes a headend IT infrastructure, the method comprising:
- providing a policy to a headend IT infrastructure, the policy defining policy limits for transactions that normally require real-time access to the central database; and
handling real-time transactions with the headend IT infrastructure, without real-time access to the central database, in accordance with the policy limits.
2 Assignments
0 Petitions
Accused Products
Abstract
A complex, multiple location consumer communication and content delivery system includes a plurality of headend facilities and a central facility including a database. A distributed information technology (IT) architecture involves back office IT infrastructure located at the central facility, and headend IT infrastructure located at each headend facility. Headend IT infrastructure may be provided with a policy setting limits for transactions that normally require real-time access to the central database. The headend is programmed to handle real-time transactions, without real-time access to the central database, in accordance with the set policy limits.
100 Citations
21 Claims
-
1. A method for failsoft headend operation in a complex, multiple location consumer communication and content delivery system, the system including a plurality of headend facilities, the system further including a central facility including a central database, and the system further including a distributed information technology (IT) architecture wherein a back office IT infrastructure is located at the central facility and wherein each headend facility includes a headend IT infrastructure, the method comprising:
-
providing a policy to a headend IT infrastructure, the policy defining policy limits for transactions that normally require real-time access to the central database; and handling real-time transactions with the headend IT infrastructure, without real-time access to the central database, in accordance with the policy limits. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for failsoft headend operation in a complex, multiple location consumer communication and content delivery system, the system including a plurality of headend facilities, the system further including a central facility including a central database, and the system further including a distributed information technology (IT) architecture wherein a back office IT infrastructure is located at the central facility and wherein each headend facility includes a headend IT infrastructure, the method comprising:
-
for each headend facility, providing a policy to the associated headend IT infrastructure, the policy defining policy limits for transactions that normally require real-time access to the central database; and for each headend facility, in the event that access to the central database is unavailable, handling real-time transactions with the associated headend IT infrastructure, without real-time access to the central database, in accordance with the associated policy limits, thereby providing failsoft headend facility operation. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A complex, multiple location consumer communication and content delivery system, the system comprising:
-
a plurality of headend facilities; a central facility including a central database; a distributed information technology (IT) architecture wherein a back office IT infrastructure is located at the central facility and wherein each headend facility includes a headend IT infrastructure; and wherein at least one headend IT infrastructure is provided with a policy defining policy limits for transactions that normally require real-time access to the central database, and is programmed to handle real-time transactions, without real-time access to the central database, in accordance with the policy limits. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification