Automated desktop placement
First Claim
1. A computer-implemented method, the method comprising:
- as implemented by one or more computing devices configured with specific computer-executable instructions,receiving a request from a computing device of an entity to access a computing resource at a data center, the data center providing access to one or more computing resources;
determining an identity of a sub-entity of the entity associated with the request from the computing device, the entity comprising a plurality of sub-entities;
determining an access rule for accessing the computing resource from a plurality of access rules based at least partially on the identity of the sub-entity, wherein at least some of the plurality of access rules reduce the effect of a system failure of at least one computing resource at the data center on access to the computing resource by the entity;
identifying an instance of the computing resource at the data center based at least partially on the access rule; and
providing the computing device with access to the instance of the computing resource.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are presented for enabling a user to provide rules for the placement of computing resources at a data center for an entity that employs or is associated with the user. The data center can use the placement rules to select a data center computer system to host computing resources for a user. The rules can be used to establish diversity in computing resource placement at the data center thereby reducing the number of users who lose access to computing resources when a specific data center computer suffers a failure. Further, the placement rules can be used to facilitate configuration of the computer resources for the user based, for example, on the user'"'"'s employment responsibilities.
144 Citations
20 Claims
-
1. A computer-implemented method, the method comprising:
as implemented by one or more computing devices configured with specific computer-executable instructions, receiving a request from a computing device of an entity to access a computing resource at a data center, the data center providing access to one or more computing resources; determining an identity of a sub-entity of the entity associated with the request from the computing device, the entity comprising a plurality of sub-entities; determining an access rule for accessing the computing resource from a plurality of access rules based at least partially on the identity of the sub-entity, wherein at least some of the plurality of access rules reduce the effect of a system failure of at least one computing resource at the data center on access to the computing resource by the entity; identifying an instance of the computing resource at the data center based at least partially on the access rule; and providing the computing device with access to the instance of the computing resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. A system comprising:
-
an electronic data store configured to at least store a plurality of access rules; and a hardware processor in communication with the electronic data store, the hardware processor configured to execute computer-executable instructions to at least; receive a request from a computing device of an entity to access a computing resource at a data center; determine an identity of a sub-entity associated with a first user who is associated with the request, the entity comprising a plurality of sub-entities including the sub-entity; determine an access rule for accessing the computing resource from a plurality of access rules based at least partially on the identity of the sub-entity, wherein at least some of the plurality of access rules reduce the effect of a system failure at the data center on access to the computing resource by the entity; identify an instance of the computing resource at the data center based at least partially on the access rule; and provide the computing device with access to the instance of the computing resource. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A computer-readable, non-transitory storage medium storing computer executable instructions that, when executed by one or more computing devices, configure the one or more computing devices to perform operations comprising:
-
receiving a request associated with a first user from a computing device of the first user to access a computing resource at a data center; determining an identity of a sub-entity associated, with the first user from a plurality of sub-entities of an entity; determining an access rule for accessing the computing resource from a plurality of access rules based at least partially on the identity of the sub-entity, wherein at least some of the plurality of access rules reduce the effect of a system failure at the data center on access to the computing resource by the entity; identifying an instance of the computing resource at the data center based at least partially on the access rule; and providing the computing device with access to the instance of the computing resource. - View Dependent Claims (17, 18, 19, 20)
-
Specification