Architecture for a centralized management system
First Claim
Patent Images
1. A method for integrating a user resource into a managed computing resource system, the method comprising:
- determining a level of data privacy associated with a user of the user resource;
responsive to the level of data privacy indicating a first level of dedicated computing resources, integrating the user resource into a first logical design that includes a shared regional infrastructure management (RIM) device, wherein the shared RIM device is shared between multiple user resources;
responsive to the level of data privacy indicating a second level of dedicated computing resources, integrating the user resource into a second logical design that includes a dedicated RIM device, wherein the dedicated RIM device is dedicated for use only by the user resource;
responsive to the user failing to require any level of data privacy, determining if the user resource has at least one associated unique Internet protocol (IP) address;
responsive to the user resource failing to have the at least one associated unique IP address, integrating the user resource into the first logical design;
responsive to the user resource having the at least one associated unique IP address, determining if the user resource utilizes a predefined percentage of a capacity of a point of deployment (POD) device; and
responsive to the user resource utilizing the predefined percentage of the capacity of the POD device, integrating the user resource into a third logical design that includes at least one shared hub, the shared RIM device, a shared spoke device, and a dedicated point of deployment (POD) device.
2 Assignments
0 Petitions
Accused Products
Abstract
An example of a solution provided here comprises: providing a logical design, including at least one hub containing central management tools, and a plurality of lower tiers containing local management tools; placing components according to the design; and providing, from the hub, one or more management functions. The lower tiers include one or more elements chosen from RIM'"'"'s, spokes, and POD'"'"'s.
28 Citations
11 Claims
-
1. A method for integrating a user resource into a managed computing resource system, the method comprising:
-
determining a level of data privacy associated with a user of the user resource; responsive to the level of data privacy indicating a first level of dedicated computing resources, integrating the user resource into a first logical design that includes a shared regional infrastructure management (RIM) device, wherein the shared RIM device is shared between multiple user resources; responsive to the level of data privacy indicating a second level of dedicated computing resources, integrating the user resource into a second logical design that includes a dedicated RIM device, wherein the dedicated RIM device is dedicated for use only by the user resource; responsive to the user failing to require any level of data privacy, determining if the user resource has at least one associated unique Internet protocol (IP) address; responsive to the user resource failing to have the at least one associated unique IP address, integrating the user resource into the first logical design; responsive to the user resource having the at least one associated unique IP address, determining if the user resource utilizes a predefined percentage of a capacity of a point of deployment (POD) device; and responsive to the user resource utilizing the predefined percentage of the capacity of the POD device, integrating the user resource into a third logical design that includes at least one shared hub, the shared RIM device, a shared spoke device, and a dedicated point of deployment (POD) device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification