AUTOMATED DESKTOP PLACEMENT
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are presented for enabling a user to provide rules for the placement of computing resources at a data center for an entity that employs or is associated with the user. The data center can use the placement rules to select a data center computer system to host computing resources for a user. The rules can be used to establish diversity in computing resource placement at the data center thereby reducing the number of users who lose access to computing resources when a specific data center computer suffers a failure. Further, the placement rules can be used to facilitate configuration of the computer resources for the user based, for example, on the user'"'"'s employment responsibilities.
23 Citations
21 Claims
-
1. (canceled)
-
2. A computer-implemented method, the method comprising:
as implemented by one or more computing devices configured with specific computer-executable instructions, receiving a request at a data center comprising a plurality of computing resources to obtain access to a computing resource from the plurality of computing resources, wherein the request is received from a computing device of an entity that is separate from the one or more computing devices; determining a set of resource access rules based at least in part on an identity of the entity, wherein the set of resource access rules comprises one or more rules for providing the entity with access to the computing resource, and wherein the set of resource access rules are configured to reduce the effect of a system failure at the data center on access to the computing resource by the entity; determining whether an active instance of the computing resource associated with the entity exists; in response to determining that the active instance of the computing resource exists, determining whether the active instance satisfies the set of resource access rules; and in response to determining that the active instance satisfies the set of resource access rules, providing the entity with access to the active instance of the computing resource. - View Dependent Claims (3, 4, 5, 6, 7, 8)
-
9. A system comprising:
-
an electronic data store configured to at least store a set of resource access rules; and a management computing system comprising computer hardware in communication with the electronic data store, the management computing system configured to execute computer-executable instructions to at least; receive a request to obtain access to a computing resource from a plurality of computing resources hosted by a data center, wherein the request is received from a computing device of an entity, the computing device external to the data center; identify the set of resource access rules based at least in part on an identity of the entity, wherein the set of resource access rules comprises one or more rules for providing the entity with access to the computing resource, and wherein the set of resource access rules are configured to reduce the effect of a system failure at the data center on access to the computing resource by the entity; select, based at least in part on the identified set of resource access rules, a host computing system from a plurality of host computing systems at the data center capable of hosting the computing resource; and provide a user associated with the entity with access to the computing resource on the selected host computing system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable, non-transitory storage medium storing computer executable instructions that, when executed by one or more computing devices, configure the one or more computing devices to perform operations comprising:
-
receiving a request to obtain access to a computing resource from a plurality of computing resources hosted by at least one data center from a plurality of data centers, wherein the request is received from a computing device of an entity, the computing device external to the plurality of data centers; selecting the set of resource access rules based at least in part on an identity of the entity, wherein the set of resource access rules comprises one or more rules for providing a user from a plurality of users associated with the entity with access to the computing resource; selecting a data center from the plurality of data centers based at least in part on the computing resource and the identified set of resource access rules; selecting a host computing system from a plurality of host computing systems at the selected data center based at least in part on the set of resource access rules; and providing the user with access to the computing resource on the selected host computing system. - View Dependent Claims (19, 20, 21)
-
Specification