×

Policy implementation in a networked computing environment

  • US 9,641,392 B2
  • Filed: 05/06/2015
  • Issued: 05/02/2017
  • Est. Priority Date: 03/26/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for implementing policies in a networked computing environment, comprising:

  • evaluating an applicability of a policy to a set of layers of a network stack in the networked computing environment, the policy being drawn from a set of policies stored in at least one computer storage device, the set of layers comprising;

    a business processes as a service layer providing at least one of;

    business application services or industry solutions,a platform as a service layer comprising;

    an applications services sub-layer providing collaboration, analytics, and process management,an application lifecycle sub-layer providing developer and tester collaboration, development automation, and lifecycle traceability,an integration sub-layer providing process integration, application and data integration, identity integration, management integration, and spillover/failover services, anda workload services sub-layer providing elastic application runtimes, elastic application resources, workload and topology patterns, dynamic workload management, fine-drained service level agreement enforcement, application health management and self-healing, continuously available applications, multi-tenant applications, and workload and data mobility, and an infrastructure as a service layer comprising;

    an operations support system sub-layer providing service quality management, image management, service asset management, service operations management, and service automation management;

    an optimization sub-layer providing;

    heterogeneous platform management, workload acceleration, optimized workload placement, virtualized computation, network and storage, and power management, anda security sub-layer providing;

    security management, tenant isolation, identity management, intrusion detection, and data protection;

    determining an effectiveness of the policy as applied to the set of layers; and

    determining, based on the effectiveness, a protocol for implementing the policy for at least one layer of the set of layers.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×