Method and system for load balancing of computing resources
First Claim
1. A method for load balancing of computing tasks in a computing system using temporarily inactive computing machines in the performance of the computing tasks and comprising the steps of:
- identifying the temporarily inactive computing machines that may be available for load balancing operations;
determining which of the temporarily inactive computing machines quality for load balancing operations, bydetermining an amount of continuous time each temporarily inactive computing machine will be inactive; and
determining a security level of each temporarily inactive computing machine, the security level being based on a sensitivity level of computing tasks performed on each temporarily inactive computing machine, a sensitivity level of data stored on each temporarily inactive computing machine and the function of a user of each temporarily inactive computing machine;
securing the current configuration of each temporarily inactive computing machine that qualifies for the load balancing operations;
prioritizing the qualifying computing machines for use during the load balancing operations;
managing a computing load of the prioritized computing machines on the computing system and assigning the computing tasks to the prioritized computing machines as part of the load balancing operations; and
installing the secured current configuration for each prioritized computing machine at the completion of the load balancing operations.
0 Assignments
0 Petitions
Accused Products
Abstract
A load balancing method incorporates temporarily inactive machines as part of the resources capable of executing tasks during heavy process requests periods to alleviate some of the processing load on other computing resources. This method determines which computing resources are available and prioritizes these resources for access by the load balancing process. A snap shot of the resource configuration and made secured along with all data on this system such that no contamination occurs between resident data on that machine and any data placed on that machine as put of the load balancing activities. After a predetermined period of time or a predetermined event, the availability of the temporary resources for load balancing activities ends. At this point, the original configuration and data is restored to the computing resource such that no trace of use of the resource in load balancing activities is detected to the user.
48 Citations
16 Claims
-
1. A method for load balancing of computing tasks in a computing system using temporarily inactive computing machines in the performance of the computing tasks and comprising the steps of:
-
identifying the temporarily inactive computing machines that may be available for load balancing operations; determining which of the temporarily inactive computing machines quality for load balancing operations, by determining an amount of continuous time each temporarily inactive computing machine will be inactive; and determining a security level of each temporarily inactive computing machine, the security level being based on a sensitivity level of computing tasks performed on each temporarily inactive computing machine, a sensitivity level of data stored on each temporarily inactive computing machine and the function of a user of each temporarily inactive computing machine; securing the current configuration of each temporarily inactive computing machine that qualifies for the load balancing operations; prioritizing the qualifying computing machines for use during the load balancing operations; managing a computing load of the prioritized computing machines on the computing system and assigning the computing tasks to the prioritized computing machines as part of the load balancing operations; and installing the secured current configuration for each prioritized computing machine at the completion of the load balancing operations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for load balancing of computing tasks in a computing system using temporarily inactive computing devices in the performance of the computing tasks comprising:
-
primary computing devices initially designated for load balancing operations; secondary computing devices determined to qualify for the load balancing operations by determining an amount of continuous time each secondary computing device will be inactive; determining a security level of each secondary computing device, the security level being based on a sensitivity level of computing tasks performed on each secondary computing device, a sensitivity level of data stored on each secondary computing device and the function of a user of each secondary computing device; a software module for determining the availability of a computing device as a secondary computing device; a storage device for storing the status of every computing device; a software program for processing said primary and secondary computing devices used in the load balancing operations; a software module for prioritizing the secondary computing devices; a software module for securing and storing the current configuration of each secondary computing device; a software module for installing the secured and stored current configuration of each secondary device; a module for monitoring the load of the computing system; a module for determining the availability of a computing device as a secondary computing device to execute a task and assigning the task to the secondary computing device to execute the task; and a software program for balancing a computer load between the primary and secondary computing devices. - View Dependent Claims (13)
-
-
14. A computer system program product stored in a non-transitory computer readable storage medium for load balancing of computing tasks in a computing system using temporarily inactive computing machines in the performance of the computing tasks and comprising instructions for:
-
identifying the temporarily inactive computing machines that may be available for load balancing operations; determining which of the temporarily inactive computing machines qualify for the load balancing operations, by determining an amount of continuous time each temporarily inactive computing machine will be inactive; determining a security level of each temporarily inactive computing machine, the security level being based on a sensitivity level of tasks performed on each temporarily inactive computing machine, a sensitivity level of data stored on each temporarily inactive computing machine and the function of a user of each temporarily inactive computing machine; securing a current configuration of each temporarily inactive computing machine that qualifies for the load balancing operations; prioritizing the qualifying computing machines for use during the load balancing operations; managing the load of the prioritized computing machines on the computing system and assigning tasks to the prioritized computing machines as part of the load balancing operations; and installing the secured current configuration for each prioritized computing machine at the completion of the load balancing operations. - View Dependent Claims (15, 16)
-
Specification