A portion of the disclosure of this patent document may contain command formats and other computer language listings, all of which are subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
This invention relates to a Cloud Environment.
This Application is related to U.S. patent application Ser. No. 14/320,001 entitled “CONTENT FABRIC FOR A DISTRIBUTED FILESYSTEM”, Ser. No. 14/320,069 entitled “CONVERGED INFRASTRUCTURES COMPRISING DISAGGREGATED COMPONENTS”, Ser. No. 14/319,889 entitled “SOFTWARE OVERLAYS FOR DISAGGREGATED COMPONENTS”, Ser. No. 14/318,805 entitled“APPLICATION AND INFORMATION MOVEMENT IN A CLOUD ENVIRONMENT”, and Ser. No. 14/319,773 entitled “MIGRATING PRIVATE INFRASTRUCTURE SERVICES TO A CLOUD”, filed on even date herewith, which are hereby incorporated herein by reference in their entirety.
As it is generally known, “cloud computing” typically refers to the use of remotely hosted resources to provide services to customers over one or more networks such as the Internet. Resources made available to customers are typically virtualized and dynamically scalable. Usually, cloud computing services may include any specific type of application. Conventionally, the software and data used to support cloud computing services are located on remote servers owned by a cloud computing service provider. Recently, use of the cloud computing service model has been growing due to the increasing availability of high bandwidth communication, making it possible to obtain response times from remotely hosted cloud-based services similar to those of services that are locally hosted.
Further, data storage demands continue to grow at a high rate. One area of growth that is testing information technology infrastructure is the billions of users and millions of applications supported in modern computing. As consumers and businesses alike adopt mobile devices, social platforms, cloud storage, and big data, the dynamics of how we store and protect data is changing as well. Some of these new platforms can be less trusted, less secure, and less resilient than the private cloud infrastructures operated by many enterprises. These private clouds have a set of hardened and reliable infrastructure services that make the data center trusted, secure and resilient.
However, there are benefits of storing, accessing, and utilizing data from the public cloud. For example, cost, flexibility, access to markets, and market trends all may make public clouds an attractive alternative for some storage needs and some applications. However, if consumers and businesses alike want to transition or migrate sensitive data, or data that must have a guaranteed level of resiliency, they need assurances that their needs will be met. Therefore, there exists a need to provide the same infrastructure services that make the private cloud trusted, secure, and resilient, in a public cloud environment.
A computer implemented method, system and computer program product enabling cloud service providers to register in a cloud book; wherein the cloud book includes a profile for each cloud service provider of the cloud service providers including the services and terms of service for each cloud service provider of the cloud service providers; and enabling consumers to register in the cloud book; wherein the users are able to connect to each other; wherein the users are able to browse the cloud service providers' connection to consumers; wherein each consumer is enabled to compare the services and terms of service to determine which service provider has services that match the consumer; further wherein the cloud book enables a first consumer to sign up for services with a first cloud service provider.
Today, consumption of cloud resources and services are often avoided because of a perceived lack of resiliency and trust in the cloud provider's infrastructure. Typically, over time, more and more providers may add trust and resiliency services into the cloud, making it more likely that an IT consumer will trust the placement of more of their applications and application data to the cloud. Generally, a wide variety of choice for IT consumers has the advantage of providing much more competitive pricing options. However, typically, IT consumers may be faced with the problem of having to choose between multiple providers, comparing them, connecting them, and in some cases overlaying them.
Generally, security analytics, data mobility, replication, and backup services may be runnable as both HW and SW instantiations and exist in not only consumer locations but also cloud service provider locations. Typically, security analytics may be services that contain network traces, security logs, and analytic capabilities to detect security intrusions or other harmful security events. Usually, data mobility may be services that can move application data “live” via active/active caching technology. Conventionally, replication may relate to services that can provide replication and point-in-time copy capabilities. Generally, backup may be related to services that can take snapshots of application data and use a backup server to copy them to secondary storage.
Today, these services usually do not have a common API or exist in a publically available and well documented catalog to advertise and to find “like kind” services, join together with “like kind” services, overlay each other in the same data center, or find and attach to each other to create graphed services. Often, this makes it impossible for consumers to find and attach to the right service for their needs.
Typically, dynamic and immediate catalogue comparison of services present at various cloud service providers is not available. Today's methods usually rely on conversations with cloud providers or browsing individual websites/agreements. Conventionally, both of these agreements do not scale. Usually, services in a specific cloud service provider's data center have no way to find and form connections with similar services in an alternate cloud service provider's data center. Generally, a service provider's ability to broadly advertise the appropriate level of cloud services to a community of potential consumers is not possible. Often, consumers using these services do not have a way to rate their experience in a public way, which assists other consumers in the locating and usage of these services. Conventionally, consumers looking to use services cannot find and view the experiences of similar consumers and leverage community experience in the selection of services. Generally, consumers wishing to combine services easily from multiple cloud service providers have no way to browse and connect them together.
In certain embodiments, the current disclosure may use social media approaches (e.g. “Like”, “Follow”, “Friend”, “Block”, “Poke”, :Comment“) to allow service providers, services, and consumers to create a navigable ecosystem for connecting IT consumers with the appropriate levels of cloud services. In some embodiments, the current disclosure may lead to graphs and reports that may enhance the experience of connecting to IT resources. In at least one embodiment, cloud service providers (CSP) may be enabled to “name themselves” and sign up for a “Cloud_Book” in a “Cloud_Book” registry. In alternative embodiments, services in any given CSP may register themselves as available services in a CSP Cloud_Book registry. In an embodiment, IT consumers may“follow” or “friend” a CSP and the CSP has the option to allow the “follow” (e.g. public Twitter account) or respond to the friend request. In at least one embodiment, this may give a consumer full visibility into the available services. In certain embodiments, a cloud provider's services may include one or more of security analytics, data mobility, replication, and backup services. In some embodiments, the services may be runnable as both HW and SW instantiations and exist in consumer locations and cloud service provider locations
In some embodiments, IT consumers may have visibility into the followers or friends of the CSP. In many embodiments, the IT consumer may “friend” or “follow” their peers who may or may not be consuming IT resources from the CSP, and may be able to reach out directly for questions or comments about the peer's experiences. In most embodiments, IT consumers may “friend” a service or a set of services in a CSP, which may give the IT consumer visibility into the APIs provided by the service.
In at least one embodiment, APIs may include the ability to sign up for and use the service. In some embodiments, multiple services may be used, (e.g. combining replication with security analytics). In certain embodiments, when signing up for a service, the IT consumer may ask the service to become a friend to the same service in a different CSP (if it isn't already) as a way of utilizing multiple clouds (e.g. for the purpose of replication). In other embodiments, IT consumers may “like” or “comment” or “rate” on their experiences with the service. In certain embodiments, IT consumers may have visibility into the number of likes, ratings, or comments, and may perform searches to find CSPs and/or services that are popular or well-liked by their peers.
In certain embodiments, the current disclosure may enable a registry for service providers. In most embodiments, a service provider may create an entry in the registry denoting what services they offer as well as additional information about the service provider. In many embodiments, consumers of services may also register in a registry with service providers. In some embodiments, consumers may form relationships with service providers. In alternative embodiments, a relationship with a user may be that the user likes the service provider. In other embodiments, a relationship may be that the user is a consumer of the service provider. In further embodiments, a user may rate and leave comments for a service provider. In still further embodiments, users may form relationships with other users enabling the user to see information and relationships of the other user. In at least some embodiments, a user may be able to see what services other users consume and how they have rated service providers.
In further embodiments, analytics may be run on a cloud book. In certain embodiments, analysis may be performed to see what cloud service providers have what level of trust with consumers. In other embodiments, analysis may be performed on consumer churn and consumer comments to determine which cloud service providers respond to consumer feedback and which do not. In alternative embodiments, graph theory may be applied to a network of cloud service providers and cloud service consumers to determine different analyses. In an embodiment, an analysis may determine and/or compare what level of service a cloud provider states is provided by the cloud provider, with feedback of consumers of those services, to determine whether the cloud service provider provides the advertised level of service.
In certain embodiments, cloud service consumers may have access to the analytics run on cloud service providers. In other embodiments, cloud service consumers may be able to run analytical reports on cloud providers based on the services that the consumer desires. In other embodiments, cloud service providers may have access to analytics to improve the services offered. In some embodiments, cloud service providers may use analytics to diagnose problems to lower churn, where churn is the amount of customers leaving a service provider. In still further embodiments, a cloud service consumer may be able to browse connections in the cloud book to see what services of cloud service providers other consumers use and their level of satisfaction with those services.
In some embodiments, a cloud book registry may enable a consumer to consume the same services from two or more providers for redundancy. In further embodiments, a consumer may browse relationships other consumers have with a service provider to understand problems that may have occurred between the service provider and consumers. In further embodiments, a level of trust may be generated in an automated manner by performing analytics on a cloud book registry. In certain embodiments, a trust level by a service provider may be measured over time. In some embodiments, a prospective consumer may list the services and reliability the consumer desires and a cloud book may match the consumer with the service providers that match those services and reliability. In certain embodiments, a service provider may advertise their services on a cloud book. In some embodiments, in joining a cloud book a service provider may give permission for analytics to be run on the service provider and its relationships with consumers and consumer comments.
Refer now to the example embodiment of
Refer now to the example embodiment of
Refer now to the example embodiment of
Refer now to the example embodiment of
Refer now to the example embodiments of
Refer now to the example embodiments of
Refer now to the example embodiments of
Refer now to the example embodiments of
The methods and apparatus of this invention may take the form, at least partially, of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, random access or read only-memory, or any other machine-readable storage medium. When the program code is loaded into and executed by a machine, such as the computer of
The logic for carrying out the method may be embodied as part of the system described below, which is useful for carrying out a method described with reference to embodiments shown in, for example,
A detailed description of one or more embodiments of the invention is provided above along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications, and equivalents. Numerous specific details are set forth in the above description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured. Accordingly, the above implementations are to be considered as illustrative and not restrictive, and the invention is not to be limited to the details given herein, but may be modified within the scope and equivalents of the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
6751295 | McCulley | Jun 2004 | B2 |
7069242 | Sheth | Jun 2006 | B1 |
7092508 | Brown | Aug 2006 | B2 |
7272575 | Vega | Sep 2007 | B2 |
7275044 | Chauvin | Sep 2007 | B2 |
7743110 | Chauvin | Jun 2010 | B2 |
7831693 | Lai | Nov 2010 | B2 |
7933785 | Mau | Apr 2011 | B2 |
8073762 | Sheth | Dec 2011 | B2 |
8346929 | Lai | Jan 2013 | B1 |
8402086 | Driesen | Mar 2013 | B2 |
8417715 | Bruckhaus | Apr 2013 | B1 |
8688764 | Chauvin | Apr 2014 | B2 |
8706607 | Sheth | Apr 2014 | B2 |
8769651 | Grajek | Jul 2014 | B2 |
8782637 | Khalid | Jul 2014 | B2 |
8788535 | Bonev | Jul 2014 | B2 |
8977754 | Curry, Jr. | Mar 2015 | B2 |
9071606 | Braun | Jun 2015 | B2 |
9197709 | Caputo, II | Nov 2015 | B2 |
9264977 | Uhlik | Feb 2016 | B2 |
9274848 | Dawson | Mar 2016 | B2 |
9369457 | Grajek | Jun 2016 | B2 |
9414248 | Kovvali | Aug 2016 | B2 |
9544734 | Turgeman | Jan 2017 | B2 |
20020069079 | Vega | Jun 2002 | A1 |
20020101879 | Bouret | Aug 2002 | A1 |
20030038881 | Chauvin | Feb 2003 | A1 |
20030038882 | Chauvin | Feb 2003 | A1 |
20030040974 | Chauvin | Feb 2003 | A1 |
20030040983 | Chauvin | Feb 2003 | A1 |
20040201682 | Chauvin | Oct 2004 | A1 |
20050015277 | Mau | Jan 2005 | A1 |
20050165656 | Frederick | Jul 2005 | A1 |
20060095366 | Sheth | May 2006 | A1 |
20060253596 | Barone | Nov 2006 | A1 |
20070038525 | Waldvogel | Feb 2007 | A1 |
20080021794 | Vega | Jan 2008 | A1 |
20080065402 | Sanamrad | Mar 2008 | A1 |
20080080552 | Gates | Apr 2008 | A1 |
20080082490 | MacLaurin | Apr 2008 | A1 |
20080140577 | Rahman | Jun 2008 | A1 |
20080281675 | Zhang | Nov 2008 | A1 |
20090055877 | Rhim | Feb 2009 | A1 |
20090292582 | Ebert | Nov 2009 | A1 |
20090300635 | Ferris | Dec 2009 | A1 |
20100198840 | Basu | Aug 2010 | A1 |
20100332262 | Horvitz | Dec 2010 | A1 |
20110055034 | Ferris | Mar 2011 | A1 |
20110138050 | Dawson | Jun 2011 | A1 |
20110145094 | Dawson | Jun 2011 | A1 |
20120016778 | Salle | Jan 2012 | A1 |
20120041832 | Sheth | Feb 2012 | A1 |
20120109774 | Chernenko | May 2012 | A1 |
20120166310 | Werklund | Jun 2012 | A1 |
20120290460 | Curry, Jr. | Nov 2012 | A1 |
20120311564 | Khalid | Dec 2012 | A1 |
20130204716 | Rehman | Aug 2013 | A1 |
20140074647 | Mukherjee | Mar 2014 | A1 |
20140200947 | Gujar | Jul 2014 | A1 |
20140201293 | Turakhia | Jul 2014 | A1 |
20140214496 | MacBeath | Jul 2014 | A1 |
20140279192 | Selby | Sep 2014 | A1 |
20140280848 | Modh | Sep 2014 | A1 |
20140280932 | Braun | Sep 2014 | A1 |
20140282037 | Narasimhan | Sep 2014 | A1 |
20150007299 | Grajek | Jan 2015 | A1 |
20150039467 | Kothari | Feb 2015 | A1 |
20150067171 | Yum | Mar 2015 | A1 |
20150178805 | Curry, Jr. | Jun 2015 | A1 |
20150228003 | Iyoob | Aug 2015 | A1 |
20150332351 | McBride | Nov 2015 | A1 |
20150332357 | McBride | Nov 2015 | A1 |
20150333979 | Schwengler | Nov 2015 | A1 |
20160019636 | Adapalli | Jan 2016 | A1 |
20160021097 | Shrotri | Jan 2016 | A1 |
20160065417 | Sapuram | Mar 2016 | A1 |
20160125489 | Gupte | May 2016 | A1 |
20160180414 | Willard | Jun 2016 | A1 |
20160260157 | Krook | Sep 2016 | A1 |
20170111351 | Grajek | Apr 2017 | A1 |
Number | Date | Country | |
---|---|---|---|
20150378788 A1 | Dec 2015 | US |