This Application claims the benefit of U.S. Provisional Application Ser. No. 61/077,247, filed Jul. 1, 2008, titled “Assignment And Failover Of Resources” which is hereby incorporated by reference herein as if reproduced in full below.
Remote access to one or more computing resources, has become increasingly important. While the utilization of data centers, local networks, and/or other configurations may facilitate communication of remote data, allocation of primary resources and/or failover resources may be lacking. More specifically, many current implementations fail to adequately allocate specific and/or general resources to a user in a configuration with multiple users. Additionally, allocation of failover resources in such scenarios may also be inadequate.
Included are embodiments for assignment and failover of resources. More specifically, at least one embodiment of a method, includes determining a monitor layout identifier for at least one access device and assigning, to a user of the access device, at least one primary resource. Some embodiments include assigning, to the user of the access device, at least one backup resource.
Also included are embodiments of a system. At least one embodiment of a system includes a processor and a memory that stores code configured to perform the following: determining a monitor layout identifier for at least one access device; assigning, to a user at least one primary resource; and assigning to the user at least one backup resource.
Other embodiments and/or advantages of this disclosure will be or may become apparent to one with skill in the art upon examination of the following drawings and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description and be within the scope of the present disclosure.
Many aspects of the disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views. While several embodiments are described in connection with these drawings, there is no intent to limit the disclosure to the embodiment or embodiments disclosed herein. On the contrary, the intent is to cover all alternatives, modifications, and equivalents.
Depending on the particular configuration, some embodiments of this disclosure may utilize a user, an access device, a primary resource (specific and/or general), a backup resource (specific and/general) for each primary resource, and a monitor layout identifier (ID), and/or other components. More specifically, in some exemplary embodiments, in a network environment, a computer may be imaged with a specific set of applications that may be executed by any user. In other usage models, a computer may be imaged for a specific user in a specific circumstance. A general resource may include a resource that is used by some class of user without regard to the specific user. In such a configuration, if all of a user's personal documents are stored on a network share device, a general resource may be imaged with a suite of office applications that can be accessed by any user. A specific resource may include a resource that has been imaged for a specific user in a specific circumstance. In such a configuration, an IT manager and/or administrator may desire repeated access to a specific circumstance. A backup resource may include a resource that may be provisioned if a primary general resource and/or a specific resource is unable to be allocated. A backup resource may itself be a general resource and/or a specific resource. A monitor layout ID may be utilized as a linkage between access devices, resources, and users.
In operation, an administrator creates a monitor layout ID for a user. This identifier may be utilized as a local name. The monitor layout ID may then be assigned to one or more access devices. A user may additionally be assigned to one or more primary specific resources along with a specific and/or general backup resource and one or more primary general resources. Additionally, a user may be assigned to a monitor layout ID and one or more primary resources. Each resource's attributes may also be defined.
In operation of an exemplary embodiment, a user may approach an access device and log in. A provisioning engine of a remote device may utilize the user's identifier and a monitor layout ID to apply. The provisioning engine may then consult the user to resource mapping and attempts to allocate each primary resource. If any allocation fails, the provisioning engine attempts to allocate a backup resource. Once the allocations have been made, the access device may position and size each session according to the mapping provided by the provisioning engine.
Referring to the drawings,
Additionally included in the nonlimiting example of
Also included in the nonlimiting example of
One should note that, while the diagram of
The memory component 384 can include any one or combination of volatile memory elements (e.g., random access memory (RAM, such as DRAM, SRAM, SDRAM, etc.)) and/or nonvolatile memory elements (e.g., ROM, hard drive, tape, CDROM, etc.). Moreover, the memory component 384 may incorporate electronic, magnetic, optical, and/or other types of storage media. One should note that the memory 384 can have a distributed architecture (where various components are situated remote from one another), but can be accessed by the processor 382.
The logic in the memory component 384 may include one or more separate programs, which may include an ordered listing of executable instructions for implementing logical functions. In the example of
A system component and/or module embodied as software may also be construed as a source program, executable program (object code), script, or any other entity comprising a set of instructions to be performed. When constructed as a source program, the program is translated via a compiler, assembler, interpreter, or the like, which may or may not be included within the memory component 384, so as to operate properly in connection with the operating system 386.
The input/output devices that may be coupled to the system 110 interface(s) 396 may include input devices, for example but not limited to, a keyboard, mouse, scanner, touch screen, microphone, etc. Further, the input/output devices may also include output devices, for example but not limited to, a printer, display, speaker, etc. Finally, the input/output devices may further include devices that communicate both as inputs and outputs, for instance but not limited to, a modulator/demodulator (modem; for accessing another device, system, or network), a radio frequency (RF) or other transceiver, a telephonic interface, a bridge, a router, etc.
Additionally included are one or more of the network interfaces 398 for facilitating communication with one or more other devices. More specifically, network interface 398 may include any component configured to facilitate a connection with another device. While in some embodiments, among others, the server 106 can include the network interface 398 that includes a personal computer memory card international association (PCMCIA) card (also abbreviated as “PC card”) for receiving a wireless network card, this is a nonlimiting example. Other configurations can include the communications hardware within the server 106, such that a wireless network card is unnecessary for communicating wirelessly. Similarly, other embodiments include the network interfaces 398 for communicating via a wired connection. Such interfaces may be configured with universal serial bus (USB) interfaces, serial ports, and/or other interfaces.
If the server 106 includes a personal computer, workstation, or the like, the software in the memory 384 may further include a basic input output system (BIOS) (omitted for simplicity). The BIOS may include a set of software routines that initialize and test hardware at startup, start the operating system 386, and support the transfer of data among the hardware devices. The BIOS may be stored in ROM so that the BIOS can be executed when the server 106 is activated.
When the server 106 is in operation, the processor 382 may be configured to execute software stored within the memory component 384, to communicate data to and from the memory component 384, and to generally control operations of the server 106 pursuant to the software. Software in the memory component 384, in whole or in part, may be read by the processor 382, perhaps buffered within the processor 382, and then executed.
One should note that while the description with respect to
Additionally, while the logic is illustrated in
As illustrated in the interface 420, the monitor layout ID field 426 may include an unmanaged monitor layout ID. The unmanaged monitor layout ID may be configured as a default monitor layout ID, such that if, upon logging a user onto the system, if the server 106 does not recognize the access device 102 that it is attempting to access data from the server 106, the unmanaged monitor layout ID is used, if defined. According to the dedicated resource/role field 428, the unmanaged monitor layout ID may be associated with a role such that the unmanaged monitor layout ID automatically connects with an unmanaged remote device. Additionally, the unmanaged monitor layout ID may also be associated with a resource embodied as a specific computer “sam-bl41.sam-test.com.”
Additionally, the USB default field 430 may be configured to indicate whether the particular resource/role is accessible via USB, as a default. The common policy field 432 may indicate which session provides global connection parameters. The logical window size field 434 indicates that size of the window that will be allocated to this resource. Additionally, the offset field 436, indicates that offset for that resource. Additionally, the operation field 438 may be configured to provide the option to remove one or more of the monitor layout IDs from the user's profile. Also included are an add option 440 for adding a monitor layout ID and a close option 442 for closing the interface 420.
Similarly, the interface 520 may be configured to provide an option, to select the desired resolution width (field 530), height (field 532), horizontal offset (field 534), and vertical offset (field 536), as displayed in fields 434 and 436 from
Additionally, in the resources view of the interface 620, the user and/or administrator 204 may be provided with a manage resources option 636, a customize view option 638, a manage access devices 640, a manage monitor layout option 642, and a manage data centers option 644. By selecting the manage monitor layout option 642, the user and/or administrator 204 may be provided with a monitor layout ID field 646 to manage one or more of the monitor layouts. Additionally, an asset group field 648 may be provided to indicate to which asset groups the monitor layout IDs belong. A description field 650 may be included and provide a description of the respective monitor layout IDs. Additionally included is a create option 652 for creating a new monitor layout ID and a delete option 654 for deleting a monitor layout ID.
An available roles field 926 may be configured to provide available roles that apply to a user 204. By selecting one or more of the roles from field 926, the selected roles may be presented in selected field 928. Similarly, available asset groups may be provided in field 930. Selecting one or more of the available asset groups from field 930 may facilitate display of those asset groups in selected field 932. Also included is a save option 934 and a cancel option 936.
The embodiments disclosed herein can be implemented in hardware, software, firmware, or a combination thereof. At least one embodiment disclosed herein may be implemented in software and/or firmware that is stored in a memory and that is executed by a suitable instruction execution system. If implemented in hardware, one or more of the embodiments disclosed herein can be implemented with any or a combination of the following technologies a discrete logic circuit(s) having logic gates for implementing logic functions upon data signals, an application specific integrated circuit (ASIC) having appropriate combinational logic gates, a programmable gate array(s) (PGA), a field programmable gate array (FPGA), etc.
One should note that the flowcharts included herein show the architecture, functionality, and operation of a possible implementation of software. In this regard, each block can be interpreted to represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order and/or not at all. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
One should note that any of the programs listed herein, which can include an ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. In the context of this document, a “computer-readable medium” can be any means that can contain, store, communicate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer readable medium can be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device. More specific examples (a nonexhaustive list) of the computer-readable medium could include an electrical connection (electronic) having one or more wires, a portable computer diskette (magnetic), a random access memory (RAM) (electronic), a read-only memory (ROM) (electronic), an erasable programmable read-only memory (EPROM or Flash memory) (electronic), an optical fiber (optical), and a portable compact disc read-only memory (CDROM) (optical). In addition, the scope of the certain embodiments of this disclosure can include embodying the functionality described in logic embodied in hardware or software-configured mediums.
One should also note that conditional language, such as, among others, “can”, “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more particular embodiments or that one or more particular embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
It should be emphasized that the above-described embodiments are merely possible examples of implementations, merely set forth for a clear understanding of the principles of this disclosure. Many variations and modifications may be made to the above-described embodiment(s) without departing substantially from the spirit and principles of the disclosure. All such modifications and variations are intended to be included herein, within the scope of this disclosure.
Number | Name | Date | Kind |
---|---|---|---|
5442791 | Wrabetz et al. | Aug 1995 | A |
5491796 | Wanderer et al. | Feb 1996 | A |
5610810 | Nagahira et al. | Mar 1997 | A |
5781536 | Ahmadi et al. | Jul 1998 | A |
5828666 | Focsaneanu et al. | Oct 1998 | A |
5870385 | Ahmadi et al. | Feb 1999 | A |
5884037 | Aras et al. | Mar 1999 | A |
5987506 | Carter et al. | Nov 1999 | A |
5991292 | Focsaneanu et al. | Nov 1999 | A |
6009103 | Woundy | Dec 1999 | A |
6324177 | Howes | Nov 2001 | B1 |
6442706 | Wahl et al. | Aug 2002 | B1 |
6483912 | Kalmanek, Jr. et al. | Nov 2002 | B1 |
6597671 | Ahmadi et al. | Jul 2003 | B1 |
6618818 | Wahl et al. | Sep 2003 | B1 |
6741515 | Lazar et al. | May 2004 | B2 |
6766348 | Combs et al. | Jul 2004 | B1 |
6804703 | Allen | Oct 2004 | B1 |
6874037 | Abram et al. | Mar 2005 | B1 |
7139816 | Anand | Nov 2006 | B2 |
7821660 | Kitada | Oct 2010 | B2 |
7953833 | Ben-Shaul | May 2011 | B2 |
8166503 | Rosenberg | Apr 2012 | B1 |
8370897 | Yang | Feb 2013 | B1 |
9189250 | Adams | Nov 2015 | B2 |
20020099829 | Richards et al. | Jul 2002 | A1 |
20020169889 | Yang | Nov 2002 | A1 |
20030163735 | Kameyama | Aug 2003 | A1 |
20030177324 | Timpanaro-Perrotta | Sep 2003 | A1 |
20030179154 | Demsky | Sep 2003 | A1 |
20030225797 | Shields et al. | Dec 2003 | A1 |
20040133689 | Vasisht | Jul 2004 | A1 |
20040249931 | Garg | Dec 2004 | A1 |
20050289540 | Nguyen et al. | Dec 2005 | A1 |
20060037084 | Brown | Feb 2006 | A1 |
20060066886 | Narusawa | Mar 2006 | A1 |
20060132473 | Fuller | Jun 2006 | A1 |
20060240811 | De Luca | Oct 2006 | A1 |
20070079252 | Ramnani | Apr 2007 | A1 |
20070174410 | Croft | Jul 2007 | A1 |
20080016580 | Dixit et al. | Jan 2008 | A1 |
20080189628 | Liesche | Aug 2008 | A1 |
20080201455 | Husain | Aug 2008 | A1 |
20080215767 | Nagami et al. | Sep 2008 | A1 |
20090055822 | Tolman | Feb 2009 | A1 |
20090070752 | Alpern et al. | Mar 2009 | A1 |
20090164287 | Kies et al. | Jun 2009 | A1 |
20090282359 | Saul | Nov 2009 | A1 |
20100071042 | Hochmuth | Mar 2010 | A1 |
20110107229 | Walls | May 2011 | A1 |
20110153826 | Ananthanarayanan | Jun 2011 | A1 |
Number | Date | Country |
---|---|---|
WO 2006087415 | Aug 2006 | WO |
WO 2006087415 | Aug 2006 | WO |
Number | Date | Country | |
---|---|---|---|
20100082815 A1 | Apr 2010 | US |