SECURE CUSTOM APPLICATION CLOUD COMPUTING ARCHITECTURE
First Claim
Patent Images
1. A method comprising:
- receiving a request to subscribe to a service whereby a custom application can be migrated from a private computing environment to a cloud computing environment;
creating a model of the custom application;
evaluating the model and determining an optimal configuration that can be supported by the cloud computing environment;
receiving a provisioning request;
instantiating at least one physical or virtual machine to facilitate migration of the custom application to the cloud computing environment; and
,migrating the custom application to the cloud computing environment.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure custom application cloud computing architecture which facilitates virtually seamless migration of custom applications to and from a cloud computing environment in response to user needs. The architecture identifies the custom applications and the associated network architecture needed to support the applications. The network architecture is then replicated in the cloud and the custom applications are migrated thereto. In some embodiments, the application can be archived while in the cloud and disabled, then later reenabled when needed.
236 Citations
20 Claims
-
1. A method comprising:
-
receiving a request to subscribe to a service whereby a custom application can be migrated from a private computing environment to a cloud computing environment; creating a model of the custom application; evaluating the model and determining an optimal configuration that can be supported by the cloud computing environment; receiving a provisioning request; instantiating at least one physical or virtual machine to facilitate migration of the custom application to the cloud computing environment; and
,migrating the custom application to the cloud computing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
- 9. The method of claim 9, the deprovisioning comprising shutting down of any virtual servers associated with the custom application.
-
11. A secure custom application cloud computing architecture comprising:
-
a platform service orchestrator, the platform service orchestrator managing the operation of the architecture and for receiving a provisioning request; a provisioning service, the provisioning service tracking and managing various physical and virtual servers employed within the architecture; at least one adapter, the at least one adapter automating the application of business rules to received provisioning requests; a plurality of physical machines, at least one of the physical machines being repurposed with a persona selected by the provisioning service based on the received provisioning request; and
,at least one virtual machine farm, the virtual machine farm facilitating the running on at least one virtual machine based on the received provisioning request. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification