Automated desktop placement
First Claim
1. A computer-implemented method, the method comprising:
- as implemented by one or more computing devices configured with specific computer-executable instructions,receiving a request at a data center comprising a plurality of computing resources to obtain access to a computing resource from the plurality of computing resources, wherein the request is received from a computing device of an entity that is separate from the one or more computing devices;
determining a set of resource access rules based at least in part on an identity of the entity, wherein the set of resource access rules comprises one or more rules for providing the entity with access to the computing resource, and wherein the set of resource access rules are configured to reduce the effect of a system failure at the data center on access to the computing resource by the entity;
determining whether an active instance of the computing resource associated with the entity exists;
in response to determining that the active instance of the computing resource exists, determining whether the active instance satisfies the set of resource access rules; and
in response to determining that the active instance satisfies the set of resource access rules, providing the entity with access to the active instance of the computing resource,wherein the set of resource access rules are received from a user associated with the entity who is authorized to provide the set of resource access rules for a sub-entity of the entity,wherein the identity of the entity corresponds to the sub-entity and the set of resource access rules corresponds to the sub-entity, andwherein providing the entity with access to the active instance of the computing resource comprises providing the sub-entity with access to the active instance of the computing resource.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are presented for enabling a user to provide rules for the placement of computing resources at a data center for an entity that employs or is associated with the user. The data center can use the placement rules to select a data center computer system to host computing resources for a user. The rules can be used to establish diversity in computing resource placement at the data center thereby reducing the number of users who lose access to computing resources when a specific data center computer suffers a failure. Further, the placement rules can be used to facilitate configuration of the computer resources for the user based, for example, on the user'"'"'s employment responsibilities.
92 Citations
18 Claims
-
1. A computer-implemented method, the method comprising:
as implemented by one or more computing devices configured with specific computer-executable instructions, receiving a request at a data center comprising a plurality of computing resources to obtain access to a computing resource from the plurality of computing resources, wherein the request is received from a computing device of an entity that is separate from the one or more computing devices; determining a set of resource access rules based at least in part on an identity of the entity, wherein the set of resource access rules comprises one or more rules for providing the entity with access to the computing resource, and wherein the set of resource access rules are configured to reduce the effect of a system failure at the data center on access to the computing resource by the entity; determining whether an active instance of the computing resource associated with the entity exists; in response to determining that the active instance of the computing resource exists, determining whether the active instance satisfies the set of resource access rules; and in response to determining that the active instance satisfies the set of resource access rules, providing the entity with access to the active instance of the computing resource, wherein the set of resource access rules are received from a user associated with the entity who is authorized to provide the set of resource access rules for a sub-entity of the entity, wherein the identity of the entity corresponds to the sub-entity and the set of resource access rules corresponds to the sub-entity, and wherein providing the entity with access to the active instance of the computing resource comprises providing the sub-entity with access to the active instance of the computing resource. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A system comprising:
-
an electronic data store configured to at least store a set of resource access rules; and a management computing system comprising computer hardware in communication with the electronic data store, the management computing system configured to execute computer-executable instructions to at least; receive the set of resource access rules from a first user associated with an entity; determine whether the first user is authorized to provide the set of resource access rules for the entity and for a sub-entity of the entity; in response to determining that the first user is authorized to provide the set of resource access rules, associate the set of resource access rules with the entity and with the sub-entity at the electronic data store; receive a request to obtain access to a computing resource from a plurality of computing resources hosted by a data center, wherein the request is received from a computing device of the entity, the computing device external to the data center; identify the set of resource access rules based at least in part on an identity of the entity, wherein the set of resource access rules comprises one or more rules for providing the entity with access to the computing resource, and wherein the set of resource access rules are configured to reduce the effect of a system failure at the data center on access to the computing resource by the entity; select, based at least in part on the identified set of resource access rules, a host computing system from a plurality of host computing systems at the data center capable of hosting the computing resource; and provide a second user associated with the entity with access to the computing resource on the selected host computing system. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable, non-transitory storage medium storing computer executable instructions that, when executed by one or more computing devices, configure the one or more computing devices to perform operations comprising:
-
receiving a set of resource access rules from a first user associated with an entity; determining whether the first user is authorized to provide the set of resource access rules for the entity and for a sub-entity of the entity; in response to determining that the first user is authorized to provide the set of resource access rules, associating the set of resource access rules with the entity and with the sub-entity; receiving a request to obtain access to a computing resource from a plurality of computing resources hosted by at least one data center from a plurality of data centers, wherein the request is received from a computing device of an entity, the computing device external to the plurality of data centers; selecting the set of resource access rules based at least in part on an identity of the entity, wherein the set of resource access rules comprises one or more rules for providing a second user from a plurality of users associated with the entity with access to the computing resource; selecting a data center from the plurality of data centers based at least in part on the computing resource and the identified set of resource access rules; selecting a host computing system from a plurality of host computing systems at the selected data center based at least in part on the set of resource access rules; and providing the second user with access to the computing resource on the selected host computing system. - View Dependent Claims (16, 17, 18)
-
Specification