Distributed software applications (referred to herein as “cloud applications”) are commonly utilized to provide content and other functionality to end users. For instance, a cloud application might be configured and utilized to provide an electronic commerce (“e-commerce”) World Wide Web (“Web”) site. The e-commerce Web site might provide functionality for searching and browsing available products, adding desired products to an e-commerce shopping cart, and paying for purchased products. As a part of this functionality, the e-commerce Web site might provide various types of content to the customer, such as text, images, video, and other types of content. Other types of cloud applications can be configured to provide other types of functionality.
In order to ensure a positive customer experience, cloud applications such as those described above must be configured and operated in a performant manner. Customers might become frustrated and discontinue use of a cloud application if the customer perceives that the application is operating slowly. This might occur, for instance, if network bandwidth, computing resources, or other resources utilized in the provision of the cloud application are at or near maximum capacity.
It is with respect to these and other considerations that the disclosure made herein is presented.
The following detailed description is directed to technologies for optimized deployment of a cloud application and/or content based upon customer locality. Utilizing the technologies described herein, computing resources for providing a cloud application and/or content can be deployed proximately to the customers that utilize the application and the content. By locating computing resources for providing the cloud application and/or the content near the consumer, the perceived performance of the cloud application might be improved.
According to one aspect disclosed herein, a cloud computing platform is configured to provide instances of computing resources for executing a cloud application. For example, the cloud computing platform might provide virtual machine instances (“instances”) for executing a cloud application, such as an e-commerce application or another type of distributed cloud application. Software components that implement the cloud application are deployed to the virtual machine instances.
The cloud computing platform is also provided with functionality for optimizing the deployment of the computing resources that provide the cloud application and/or content served by the cloud application based upon customer locality. In particular, the cloud computing platform includes a deployment component in one embodiment that is configured to determine the volume of incoming requests for the cloud application. The deployment component is also configured to determine the geographic location from which the requests for the cloud application are originating. For instance, the deployment component might utilize an Internet Protocol (“IP”) address associated with each request to determine the geographic origin of the request.
The deployment component is also configured to determine if a particular geographic region is generating a significant volume of request for the cloud application. This determination might be made based upon the volume of incoming requests, the geographic location from which the incoming requests are originating, and other factors. Whether a particular volume of requests is significant might be defined by an owner or maintainer of the cloud application. For instance, the owner of a cloud application might define a certain volume of requests per time period as being a significant number of requests.
When the deployment component determines that a significant volume of requests is coming from a particular geographic region, the deployment component is configured to deploy instances of the cloud application in or near the geographic region that is generating the significant volume of requests. Content utilized by the cloud application might also be deployed in the geographic region. The cloud computing platform is then configured such that requests for the cloud application and/or content generated in the geographic region will be handled by the instances located in the region. The decision as to whether to deploy instances of computing resources might also be made based upon other factors, such as the cost of deploying new instances of the cloud application or operating instances of the cloud application in a particular region.
Using the mechanisms described above, instances of a cloud application and associated content may be physically located closer to the customers utilizing a cloud application. By locating the computing resources and content closer to the consumer, the performance of the cloud application might be improved. This process might be performed, for instance, in response to a spike in demand for the application from a particular geographic region. According to other aspects, the deployed instances might be terminated once the spike in demand for the application from a particular region sub sides.
According to another embodiment disclosed herein, the deployment component is further configured to optimize the deployment of a cloud application and/or content through speculative deployment. In this embodiment, instances of a cloud application are speculatively deployed to a geographic region. As used herein, the term speculative deployment refers to the transfer and preparation of content or software of a cloud application and/or the allocation or assignment of computing resources to a cloud application, in the absence of any information indicating that such a deployment would improve or diminish the performance of the application, cost of providing the application, or other metric for evaluating the operation of the cloud application.
Once content and/or instances of a cloud application have been speculatively deployed to a geographic location, the deployment component measures the impact of the deployment. For instance, the deployment component might determine whether the deployment improved the performance of the cloud application, decreased the cost of operating the cloud application, or had another type of impact on another metric for evaluating the operation of the cloud application. If the deployment has a positive impact, the deployed content and/or instances are maintained in the geographic location. Additionally, if a deployment has a positive impact, a “hill climbing” algorithm might be utilized to determine an optimal number of instances for the location. Hill climbing is a well-known mathematical optimization technique. Other such techniques might also be utilized. If the deployment has a negative impact, the content and/or instances might be removed from the geographic location. Additional details regarding the various processes described above for optimizing the deployment of a cloud application will be presented below with regard to
According to yet another embodiment, content and/or instances of a cloud application might be deployed in anticipation of the occurrence of an event. For instance, according to one implementation, a customer or maintainer of the cloud application might be permitted to specify that a spike in demand for the cloud application is anticipated to occur at a particular time in a particular region. In response to receiving this information, a deployment component might anticipatorily deploy content and/or instances of the cloud application to the specified region in advance of the specified event. In this way, the cloud application can be configured to handle anticipated changes in demand.
It should be appreciated that the subject matter presented herein may be implemented as a computer process, a computer-controlled apparatus, a computing system, or an article of manufacture, such as a computer-readable storage medium. While the subject matter described herein is presented in the general context of program modules that execute on one or more computing devices, those skilled in the art will recognize that other implementations may be performed in combination with other types of program modules. Generally, program modules include routines, programs, components, data structures, and other types of structures that perform particular tasks or implement particular abstract data types.
Those skilled in the art will also appreciate that the subject matter described herein may be practiced on or in conjunction with other computer system configurations beyond those described herein, including multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, handheld computers, personal digital assistants, e-readers, cellular telephone devices, special-purposed hardware devices, network appliances, and the like. The embodiments described herein may also be practiced in distributed computing environments, where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
In the following detailed description, references are made to the accompanying drawings that form a part hereof, and that show, by way of illustration, specific embodiments or examples. The drawings herein are not drawn to scale. Like numerals represent like elements throughout the several figures.
The cloud computing platform 108 can provide computing resources for executing the cloud application on a permanent or an as-needed basis. The computing resources provided by the cloud computing platform 108 may include various types of resources, such as data processing resources, data storage resources, data communication resources, and the like. Each type of computing resource may be general-purpose or may be available in a number of specific configurations. For example, data processing resources may be available as virtual machine instances (“instances”). The instances may be configured to execute cloud applications, including World Wide Web (“Web”) servers, application servers, media servers, database servers, and the like. Data storage resources may include file storage devices, block storage devices, and the like.
Each type or configuration of computing resource may be available in different sizes, such as large resources, consisting of many processors, large amounts of memory, and/or large storage capacity, and small resources consisting of fewer processors, smaller amounts of memory, and/or smaller storage capacity. Customers may choose to allocate a number of small processing resources as Web servers and/or one large processing resource as a database server, for example.
The computing resources provided by the cloud computing platform 108 are enabled by one or more data centers 102A-102N (which may be referred herein singularly as “a data center 102” or in the plural as “the data centers 102”). The data centers 102 are facilities utilized to house and operate computer systems and associated components. The data centers 102 typically include redundant and backup power, communications, cooling, and security systems. The data centers 102 might also be located in geographically disparate locations. One illustrative configuration for a data center 102 that implements the concepts and technologies disclosed herein for optimized deployment of a cloud application and/or content will be described below with regard to
The customers and other consumers of the cloud computing platform 108 may access the computing resources provided by the data centers 102 over a wide-area network (“WAN”) 106. Although a WAN is illustrated in
The customer computing system 104 is a computer utilized by a customer or other consumer of the cloud computing platform 108. For instance, the customer computing system 104 may be a server computer, a desktop or laptop personal computer, a tablet computer, a wireless telephone, a personal digital assistant (“PDA”), an e-reader, a game console, a set-top box, or any other computing device capable of accessing the cloud computing platform 108.
As will be described in greater detail below, the customer computing system 104 may be utilized to configure aspects of the computing resources provided by the cloud computing platform 108. In this regard, the cloud computing platform 108 might provide a Web interface through which aspects of its operation may be configured through the use of a Web browser application program executing on the customer computing system 104. Alternatively, a stand-alone application program executing on the customer computing system 104 might access an application programming interface (“API”) exposed by the cloud computing platform 108 for performing the configuration operations. Other mechanisms for configuring the operation of the cloud computing platform 108, including specifying whether the deployment of a cloud application may be optimized in the manner disclosed herein, might also be utilized.
According to embodiments disclosed herein, the capacity of purchased computing resources provided by the cloud computing platform 108 can be scaled in response to demand. In this regard, scaling refers to the process of instantiating (which may also be referred to herein as “launching” or “creating”) or terminating (which may also be referred to herein as “de-scaling”) instances of computing resources in response to demand. In this manner, the capacity of resources purchased by a customer of the cloud computing platform 108 can be scaled on-demand.
Auto scaling is one mechanism for scaling computing resources in response to increases or lulls in demand for the resources. Auto scaling allows customers of the cloud computing platform 108 to configure the platform 108 to scale their purchased computing resources according to conditions defined by the customer. For instance, rules may be defined for scaling up capacity in a particular manner in response to the occurrence of specified conditions, such as a spike in demand. Similarly, rules might also be defined to scale down capacity in a particular manner in response to the occurrence of other conditions, such as a lull in demand. As will also be described in greater detail below, the auto scaling functionality provided by the cloud computing platform 108 might also be utilized to optimize the deployment of the cloud application and related content based upon the locality of the users of the cloud application. Details regarding this process will be provided below.
As will also be described in greater detail below, the cloud computing platform 108 may also be configured with a deployment component to assist customers in the deployment of new instances of computing resources. The deployment component may receive a configuration from a customer that includes data describing how new instances should be configured. For example, the configuration might specify one or more applications or software components that should be installed in new instances, provide scripts and/or other types of code to be executed in new instances, provide cache warming logic specifying how an application cache should be prepared, and other types of information. The deployment component utilizes the configuration and cache warming logic to allocate, configure, and prime new instances of computing resources. Additional details regarding a deployment component utilized by the cloud computing platform 108 will be described below with regard to
In one embodiment, the instances 206A-206N (which may be referred herein singularly as “an instance 206” or in the plural as “the instances 206”) are virtual machine instances. As known in the art, a virtual machine instance is an instance of a software implementation of a machine (i.e. a computer) that executes programs like a physical machine. In the example of virtual machine instances, each of the servers 202 may be configured to host an instance manager 208 capable of providing one or more computing resources. The instance manager 208 might be a hypervisor or another type of program configured to manage the execution of multiple instances 206 on a single server 202, for example. As discussed above, each of the instances 206 may be configured to execute all or a portion of a cloud application.
It should be appreciated that although the embodiments disclosed herein are described primarily in the context of virtual machine instances, other types of instances can be utilized with the concepts and technologies disclosed herein. For instance, the technologies disclosed herein might be utilized with instances of storage resources, instances of data communications resources, and with other types of resources.
The data center 102 shown in
The auto scaling component 212 scales the number of instances 206 based upon rules defined by a customer of the cloud computing platform 108. In one embodiment, for instance, the auto scaling component 212 allows a customer to specify scale up rules for use in determining when new instances should be instantiated and scale down rules for use in determining when existing instances should be terminated.
The auto scaling component 212 may execute on a single server computer 204 or in parallel across multiple server computers 202 in the cloud computing platform 108. In addition, the auto scaling component 212 may consist of a number of subcomponents executing on different server computers 202 or other computing devices in the cloud computing platform 108. The auto scaling component 212 may be implemented as software, hardware, or any combination of the two. The auto scaling component 212 may monitor available computing resources in the cloud computing platform 108 over an internal management network, for example. As will be described in greater detail below, the auto scaling component 212 might also be utilized to scale and de-scale instances of a cloud application based upon customer locality and potentially other factors.
As discussed briefly above, the data center 102 is also configured with a deployment component 214 to assist customers in the deployment of new instances 206 of computing resources. The deployment component 214 may receive a launch configuration from a customer that includes data describing how new instances 206 should be configured. For example, the launch configuration might specify one or more applications that should be installed in new instances 206, provide scripts and/or other types of code to be executed for configuring new instances 206, provide cache warming logic specifying how an application cache should be prepared, and other types of information.
The deployment component 214 utilizes the launch configuration and cache warming logic to launch, configure, and prime new instances 206. The launch configuration, cache warming logic, and other information may be specified by a customer using the management component 210 or by providing this information directly to the deployment component 214. Other mechanisms might also be utilized to configure the operation of the deployment component 210.
As will be described in greater detail below, the deployment component 214 also provides functionality for deploying content and computing resources for implementing a cloud application based upon customer location. For instance, in one embodiment, the deployment component is configured to determine the volume and geographic origin of incoming requests for a cloud application. Based upon the volume and geographic origin of the incoming requests, the deployment component is configured to deploy content and/or one or more instances of the cloud application to a geographic region generating a significant volume of requests for the cloud application. Content and/or instances of a cloud application might also be speculatively deployed to a geographic region in an attempt to optimize the performance, cost, or other attribute of a cloud application. The deployment component 210 might operate in conjunction with other components, such as the auto scaling component 212, the management component 210, or other components not shown in
In the example data center 102 shown in
It should be appreciated that the data center 102 described in
It should also be appreciated that while the embodiments disclosed herein are primarily described as operating in conjunction with one or more data centers 102, other embodiments might also be utilized. For instance, a distributed network of peer devices, such as wireless mobile telephones, set top boxes, or other types of computing systems, might also be utilized to provide the functionality disclosed herein. Other configurations might also be utilized.
In the example shown in
The instances 206A-206C also handle requests originating in other geographic regions. In the example shown in
In the event of a spike in demand from the region 302B, the network links 306A-306B may become congested. As a result, customers located in the region 302B might perceive a significant slowdown in the performance of the cloud application provided by the instances 206A-206C. This might be, in part, because delivery of the content 304 is slowed as a result of the congestion on the network links 306A-306B. The optimization mechanisms discussed below with regard to
Following deployment of the instances 206D-206F, requests 308AA-308NN for the cloud application from customer computing systems 104AA-104NN in the region 302B might be routed to the data center 102B. Content utilized by the cloud application might be provided from the data center 102B rather from than from the data center 102A, thereby reducing traffic on the WAN 106. Additionally, in embodiments, some functionality might continue to be performed at the data center 102A. For instance, the underlying functionality provided by the cloud application (such as an e-commerce shopping cart, payment functionality, etc.) might be provided by the data center 102A while the content 304 is provided by the data center 102B to customer computing systems 104AA-104NN in the region 302B. Other configurations might also be utilized.
It should be appreciated that the examples shown in
It should also be appreciated that while the subject matter disclosed herein has been presented primarily in the context of moving instances and/or content geographically closer to customers, it should be appreciated that instances and/or content might also be moved and/or speculatively deployed based upon other factors. For instance, a customer might be considered “closer” in terms of required bandwidth, network latency, network route, or other factors rather than geographic distance. For instance, Burma might be geographically closer to Bangalore, but customers in Burma might obtain better performance by reading content from Singapore depending upon network throughput and/or latency. Using this information, the location and number of instances and/or content might be deployed based upon network volume, network route, latency, or other factors associated with incoming requests.
Turning now to
The routine 500 begins at operation 502, where the deployment component 214 determines the volume of incoming requests for a cloud application. The deployment component 214 might make this determination based upon information received from the instances 206 that implement the cloud application, based upon information received from other components, or in another manner. Another component might also make this determination. Once the volume of incoming requests has been determined, the routine 500 proceeds from operation 502 to operation 504.
At operation 504, the deployment component 210 determines the origin of the incoming requests for the cloud application. As discussed briefly above, this determination might be made based upon the IP address associated with each incoming request 308, or in another manner. Another component might also make this determination. Once the geographic origin for each incoming request 308 has been determined, the routine 500 proceeds from operation 504 to operation 506.
At operation 506, the deployment component 214 determines whether a significant volume of requests 308 is originating from the same geographic region. For instance, in the example shown in
From operation 506, the routine 500 proceeds to operation 508, where a determination is made as to whether instances and/or content should be deployed to a region. As discussed above, a variety of factors might be utilized to make this determination, such as the volume of requests received from the region and the cost of deploying instances and/or content to the region. If instances are not to be deployed to the region, the routine 500 proceeds from operation 508 to operation 502, described above, where another such determination is made. If instances and/or content are to be deployed, the routine 500 proceeds from operation 508 to operation 510.
At operation 510, the deployment component 214 causes instances 206 of the cloud application to be deployed to the region generating the significant volume of requests. The routine 500 then proceeds to operation 512, where the deployment component 214 causes content 304 to be deployed to the region generating the significant volume of requests. In the example illustrated in
The deployment component 214 might also cause the cloud application and potentially other components to be configured such that the instances 206E-206F handle requests 308AA-308NN originating in the region 302B. For instance, one or more of the instances 206D-206F might be configured to serve the content 304 in response to requests 308AA-308NN originating in the region 302B. It should be appreciated that the deployment component 214 might utilize functionality provided by the auto scaling component 212, the instance manager 208, or other components to deploy the instances 206 and content 304 in a particular geographic region.
It should be appreciated that various configuration operations might be performed in order to cause requests for the cloud application originating from a particular region to be satisfied by instances and/or content located in or proximately to the region. For instance, settings in one or more load balancers might be configured to cause requests for the cloud application to be routed to the region, one or more Domain Name Service (“DNS”) entries in a DNS server might be modified to cause requests received from a client device for the cloud application to be routed to the region, and/or hyperlinks referring the content provided by the cloud application might be modified to refer to content located in the region. Other types of configuration operations might also be performed.
From operation 512, the routine 500 proceeds to operation 514, where the deployment component 214 periodically determines whether it is necessary to de-scale some or all of the instances previously deployed to a geographic region. For instance, the deployment component might determine whether the volume of requests for the cloud application from a particular geographic region remains to be significant. If the volume remains significant, the deployed instances 206 and content 304 might be maintained in the region. In this case, the routine 500 proceeds from operation 514 to operation 502, described above. If, however, the volume is no longer significant, the routine 500 might proceed from operation 514 to operation 516 where some or all of the instances 206 deployed to the region might be de-scaled. Some or all of the content 304 might also be removed from the region. Other operations might also be performed in response to determining that a volume of requests for a cloud application no longer warrants a deployment of instances 206 or content 304 to a particular geographic region. From operation 516, the routine 500 proceeds to operation 502, described above.
It should be appreciated that the decision as to whether to deploy and de-scale instances of computing resources might also be made based upon other factors, such as the cost of deploying or de-scaling instances of the cloud application and/or the cost of operating instances of the cloud application in a particular region. In this case, the instances 206 and the content 304 might be deployed in response to a spike in demand if the cost of deployment is below a certain threshold. Other factors might also be utilized individually or in combination to determine when it is appropriate to deploy or de-scale content 304 and/or instances 206 of a cloud application to or from a particular geographic region.
In the embodiment illustrated in
The routine 600 begins at operation 602, where the deployment component 214 causes instances 206 and/or content 304 to be speculatively deployed to a region 302. For instance, in the example shown in
At operation 604, the deployment component 214 measures the impact of the speculative deployment of instances 206 and/or content 304. The impact of the deployment might be measured as a function of performance of the cloud application, the cost of providing the cloud application or the content 304, or another metric. The deployment component 214 might utilize information received from other components to measure the impact of the deployment. Another component or components might also perform this functionality.
If the measured impact of the deployment is positive, the routine 600 proceeds from operation 606 to operation 610. At operation 610, the speculatively deployed instances 206 and/or content are maintained in the geographic region 302 to which they were deployed. From operation 610, the routine 600 proceeds to operation 611, where the number of deployed instances might be increased or decreased in order to optimize the number of instances deployed in the region or the content deployed to the region. As discussed above, an optimization technique, such as hill climbing, might be utilized to optimize the number of instances and/or deployment of content to arrive at an optimal configuration. Once this process has been performed, the routine 600 then proceeds from operation 611 to operation 612.
If the measured impact of the deployment is negative, the routine 600 proceeds from operation 606 to operation 608. At operation 608, the speculatively deployed instances 206 are de-scaled from the region 302 in which they were deployed. Additionally, the content 304 might also be removed from the region 302 in which it was deployed. Appropriate configuration changes might also be made to ensure that requests 308 for the cloud application and/or content 304 are handled by instances 306 operating in another region. For instance, as discussed above, changes might be made in load balancers, DNS servers, and/or hyperlinks referring to content served by the cloud application. The routine 600 then proceeds from operation 608 to operation 612.
At operation 612, a determination is made as to whether additional speculative deployments of instances 206 and/or content 304 remain to be evaluated. If so, the routine 600 proceeds from operation 612 to operation 602, described above, where instances 206 and content 304 might be speculatively deployed to other regions in the manner described above. If no additional deployments remain to be tested, the routine 600 proceeds to operation 614, where it ends.
The computer 700 includes a baseboard, or “motherboard,” which is a printed circuit board to which a multitude of components or devices may be connected by way of a system bus or other electrical communication paths. In one illustrative embodiment, one or more central processing units (“CPUs”) 704 operate in conjunction with a chipset 706. The CPUs 704 are standard programmable processors that perform arithmetic and logical operations necessary for the operation of the computer 700.
The CPUs 704 perform the necessary operations by transitioning from one discrete, physical state to the next through the manipulation of switching elements that differentiate between and change these states. Switching elements may generally include electronic circuits that maintain one of two binary states, such as flip-flops, and electronic circuits that provide an output state based on the logical combination of the states of one or more other switching elements, such as logic gates. These basic switching elements may be combined to create more complex logic circuits, including registers, adders-subtractors, arithmetic logic units, floating-point units, and the like.
The chipset 706 provides an interface between the CPUs 704 and the remainder of the components and devices on the baseboard. The chipset 706 may provide an interface to a random access memory (“RAM”) 708, used as the main memory in the computer 700. The chipset 706 may further provide an interface to a computer-readable storage medium such as a read-only memory (“ROM”) 720 or non-volatile RAM (“NVRAM”) for storing basic routines that that help to startup the computer 700 and to transfer information between the various components and devices. The ROM 720 or NVRAM may also store other software components necessary for the operation of the computer 700 in accordance with the embodiments described herein.
The computer 700 may operate in a networked environment using logical connections to remote computing devices and computer systems through the network 206. The chipset 706 may include functionality for providing network connectivity through a network interface controller (“NIC”) 722, such as a gigabit Ethernet adapter. The NIC 722 is capable of connecting the computer 700 to other computing devices over the network 206. It should be appreciated that multiple NICs 722 may be present in the computer 700, connecting the computer to other types of networks and remote computer systems.
The computer 700 may be connected to a mass storage device 728 that provides non-volatile storage for the computer. The mass storage device 728 may store system programs, application programs, other program modules, and data, which have been described in greater detail herein. The mass storage device 728 may be connected to the computer 700 through a storage controller 724 connected to the chipset 706. The mass storage device 728 may consist of one or more physical storage units. The storage controller 724 may interface with the physical storage units through a serial attached SCSI (“SAS”) interface, a serial advanced technology attachment (“SATA”) interface, a fiber channel (“FC”) interface, or other type of interface for physically connecting and transferring data between computers and physical storage units.
The computer 700 may store data on the mass storage device 728 by transforming the physical state of the physical storage units to reflect the information being stored. The specific transformation of physical state may depend on various factors, in different implementations of this description. Examples of such factors may include, but are not limited to, the technology used to implement the physical storage units, whether the mass storage device 728 is characterized as primary or secondary storage, and the like.
For example, the computer 700 may store information to the mass storage device 728 by issuing instructions through the storage controller 724 to alter the magnetic characteristics of a particular location within a magnetic disk drive unit, the reflective or refractive characteristics of a particular location in an optical storage unit, or the electrical characteristics of a particular capacitor, transistor, or other discrete component in a solid-state storage unit. Other transformations of physical media are possible without departing from the scope and spirit of the present description, with the foregoing examples provided only to facilitate this description. The computer 700 may further read information from the mass storage device 728 by detecting the physical states or characteristics of one or more particular locations within the physical storage units.
In addition to the mass storage device 728 described above, the computer 700 may have access to other computer-readable storage medium to store and retrieve information, such as program modules, data structures, or other data. It should be appreciated by those skilled in the art that computer-readable storage media can be any available media that provides for the storage of non-transitory data and that may be accessed by the computer 700.
By way of example, and not limitation, computer-readable storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology. Computer-readable storage media includes, but is not limited to, RAM, ROM, erasable programmable ROM (“EPROM”), electrically-erasable programmable ROM (“EEPROM”), flash memory or other solid-state memory technology, compact disc ROM (“CD-ROM”), digital versatile disk (“DVD”), high definition DVD (“HD-DVD”), BLU-RAY, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store the desired information in a non-transitory fashion.
The mass storage device 728 may store an operating system 730 utilized to control the operation of the computer 700. According to one embodiment, the operating system comprises the LINUX operating system. According to another embodiment, the operating system comprises the WINDOWS® SERVER operating system from MICROSOFT Corporation. According to further embodiments, the operating system may comprise the UNIX or SOLARIS operating systems. It should be appreciated that other operating systems may also be utilized. The mass storage device 728 may store other system or application programs and data utilized by the computer 700, such as the deployment component 214 and/or the other software components described above.
In one embodiment, the mass storage device 728 or other computer-readable storage media is encoded with computer-executable instructions which, when loaded into the computer 700, transforms the computer from a general-purpose computing system into a special-purpose computer capable of implementing the embodiments described herein. These computer-executable instructions transform the computer 700 by specifying how the CPUs 704 transition between states, as described above. According to one embodiment, the computer 700 has access to computer-readable storage media storing computer-executable instructions which, when executed by the computer 700, perform the routines 500 and 600, described with regard to
The computer 700 may also include an input/output controller 732 for receiving and processing input from a number of input devices, such as a keyboard, a mouse, a touchpad, a touch screen, an electronic stylus, or other type of input device. Similarly, the input/output controller 732 may provide output to a display, such as a computer monitor, a flat-panel display, a digital projector, a printer, a plotter, or other type of output device. It will be appreciated that the computer 700 may not include all of the components shown in
Based on the foregoing, it should be appreciated that technologies for deploying cloud applications and content based upon customer locality have been presented herein. Although the subject matter presented herein has been described in language specific to computer structural features, methodological acts, and computer readable media, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features, acts, or media described herein. Rather, the specific features, acts, and mediums are disclosed as example forms of implementing the claims.
The subject matter described above is provided by way of illustration only and should not be construed as limiting. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure. Various modifications and changes may be made to the subject matter described herein without following the example embodiments and applications illustrated and described, and without departing from the true spirit and scope of the present invention, which is set forth in the following claims.
Number | Name | Date | Kind |
---|---|---|---|
6006264 | Colby et al. | Dec 1999 | A |
6513112 | Craig et al. | Jan 2003 | B1 |
6687846 | Adrangi et al. | Feb 2004 | B1 |
6950848 | Yousefi'zadeh et al. | Sep 2005 | B1 |
6961783 | Cook et al. | Nov 2005 | B1 |
7027582 | Khello et al. | Apr 2006 | B2 |
7185046 | Ferstl et al. | Feb 2007 | B2 |
7350075 | Eastham et al. | Mar 2008 | B1 |
7376716 | Dilley et al. | May 2008 | B2 |
7451230 | Corrado et al. | Nov 2008 | B2 |
7603439 | Dilley et al. | Oct 2009 | B2 |
7613815 | Prakash et al. | Nov 2009 | B1 |
8155126 | Mao et al. | Apr 2012 | B1 |
8195605 | Chellappa et al. | Jun 2012 | B2 |
8250135 | Driesen et al. | Aug 2012 | B2 |
8356074 | Ehrlich et al. | Jan 2013 | B1 |
8392928 | Forys et al. | Mar 2013 | B1 |
8443167 | Fallone et al. | May 2013 | B1 |
8521885 | Richardson et al. | Aug 2013 | B1 |
8527645 | Proffit et al. | Sep 2013 | B1 |
8645700 | Smith et al. | Feb 2014 | B2 |
8775553 | Cansino et al. | Jul 2014 | B2 |
9219686 | Hilt et al. | Dec 2015 | B2 |
9900402 | Li et al. | Feb 2018 | B1 |
10033699 | Sullivan et al. | Jul 2018 | B2 |
10075551 | Baldwin et al. | Sep 2018 | B1 |
10079742 | Richardson et al. | Sep 2018 | B1 |
10091096 | Howard et al. | Oct 2018 | B1 |
10097398 | Richardson et al. | Oct 2018 | B1 |
10097448 | Howard et al. | Oct 2018 | B1 |
10097566 | Radlein et al. | Oct 2018 | B1 |
10110694 | Watson et al. | Oct 2018 | B1 |
10116584 | Richardson et al. | Oct 2018 | B2 |
10135620 | Richardson et al. | Nov 2018 | B2 |
10157135 | Richardson et al. | Dec 2018 | B2 |
10158729 | Sivasubramanian et al. | Dec 2018 | B2 |
10162753 | Marshall et al. | Dec 2018 | B2 |
10180993 | Raftery | Jan 2019 | B2 |
10200402 | Radlein et al. | Feb 2019 | B2 |
10200492 | MacCarthaigh et al. | Feb 2019 | B2 |
10205698 | Petersen et al. | Feb 2019 | B1 |
10218584 | Ellsworth et al. | Feb 2019 | B2 |
10225322 | Richardson et al. | Mar 2019 | B2 |
10225326 | Puchala et al. | Mar 2019 | B1 |
10225362 | Watson | Mar 2019 | B2 |
10230819 | Richardson et al. | Mar 2019 | B2 |
10257307 | Baldwin | Apr 2019 | B1 |
10264062 | Richardson et al. | Apr 2019 | B2 |
10270878 | Uppal et al. | Apr 2019 | B1 |
20020049842 | Huetsch et al. | Apr 2002 | A1 |
20020138649 | Cartmell et al. | Sep 2002 | A1 |
20020143798 | Lisiecki et al. | Oct 2002 | A1 |
20030005036 | Mitzenmacher | Jan 2003 | A1 |
20030037284 | Srinivasan et al. | Feb 2003 | A1 |
20030105857 | Kamen et al. | Jun 2003 | A1 |
20050015471 | Zhang et al. | Jan 2005 | A1 |
20050039019 | Delany | Feb 2005 | A1 |
20050174989 | Chen et al. | Aug 2005 | A1 |
20050192814 | Challener et al. | Sep 2005 | A1 |
20050198200 | Subramanian et al. | Sep 2005 | A1 |
20050201302 | Gaddis et al. | Sep 2005 | A1 |
20050267928 | Anderson et al. | Dec 2005 | A1 |
20050286564 | Hatley et al. | Dec 2005 | A1 |
20060106938 | Dini et al. | May 2006 | A1 |
20060129766 | Cassia et al. | Jun 2006 | A1 |
20060143442 | Smith | Jun 2006 | A1 |
20060221971 | Andrieux et al. | Oct 2006 | A1 |
20070233896 | Hilt et al. | Oct 2007 | A1 |
20070280197 | Pearlman et al. | Dec 2007 | A1 |
20070294419 | Ulevitch | Dec 2007 | A1 |
20080049615 | Bugenhagen | Feb 2008 | A1 |
20080066072 | Yurekli et al. | Mar 2008 | A1 |
20080222647 | Taylor et al. | Sep 2008 | A1 |
20080235383 | Schneider | Sep 2008 | A1 |
20080270882 | Rollins et al. | Oct 2008 | A1 |
20090138582 | Turk | May 2009 | A1 |
20100074268 | Raza | Mar 2010 | A1 |
20100106934 | Calder et al. | Apr 2010 | A1 |
20100115342 | Shigeta et al. | May 2010 | A1 |
20100125673 | Richardson et al. | May 2010 | A1 |
20100125675 | Richardson et al. | May 2010 | A1 |
20100161564 | Lee et al. | Jun 2010 | A1 |
20100161565 | Lee et al. | Jun 2010 | A1 |
20100191854 | Isci et al. | Jul 2010 | A1 |
20100223364 | Wei | Sep 2010 | A1 |
20100228819 | Wei | Sep 2010 | A1 |
20100306382 | Cardosa et al. | Dec 2010 | A1 |
20100322255 | Hao et al. | Dec 2010 | A1 |
20110016214 | Jackson | Jan 2011 | A1 |
20110106949 | Patel et al. | May 2011 | A1 |
20110113467 | Agarwal et al. | May 2011 | A1 |
20110154350 | Doyle et al. | Jun 2011 | A1 |
20110219372 | Agarwal et al. | Sep 2011 | A1 |
20110255445 | Johnson et al. | Oct 2011 | A1 |
20110296370 | Ferris et al. | Dec 2011 | A1 |
20120011190 | Driesen et al. | Jan 2012 | A1 |
20120072608 | Peters et al. | Mar 2012 | A1 |
20120014249 | Mao et al. | Apr 2012 | A1 |
20120089700 | Safruti et al. | Apr 2012 | A1 |
20120089972 | Scheidel et al. | Apr 2012 | A1 |
20120096065 | Suit et al. | Apr 2012 | A1 |
20120096166 | Devarapalli et al. | Apr 2012 | A1 |
20120117621 | Kondamuru et al. | May 2012 | A1 |
20120136697 | Peles et al. | May 2012 | A1 |
20120142310 | Pugh et al. | Jun 2012 | A1 |
20120173760 | Jog et al. | Jul 2012 | A1 |
20120179817 | Bade et al. | Jul 2012 | A1 |
20120209942 | Zehavi et al. | Aug 2012 | A1 |
20130003547 | Motwani et al. | Jan 2013 | A1 |
20130003735 | Chao et al. | Jan 2013 | A1 |
20130018945 | Vendrow et al. | Jan 2013 | A1 |
20130046883 | Lientz et al. | Feb 2013 | A1 |
20130073808 | Puthalath et al. | Mar 2013 | A1 |
20130111035 | Alapati et al. | May 2013 | A1 |
20130346465 | Maltz et al. | Dec 2013 | A1 |
20130346470 | Obstfeld et al. | Dec 2013 | A1 |
20130346614 | Baughman et al. | Dec 2013 | A1 |
20140007239 | Sharpe et al. | Jan 2014 | A1 |
20140013403 | Shuster | Jan 2014 | A1 |
20140195686 | Yeager et al. | Jul 2014 | A1 |
20140200036 | Egner | Jul 2014 | A1 |
20140297866 | Ennaji et al. | Oct 2014 | A1 |
20140298021 | Kwon et al. | Oct 2014 | A1 |
20140351413 | Smith et al. | Nov 2014 | A1 |
20150081877 | Sethi et al. | Mar 2015 | A1 |
20150088964 | Shiell et al. | Mar 2015 | A1 |
20150341431 | Hartrick et al. | Nov 2015 | A1 |
20150358276 | Liu et al. | Dec 2015 | A1 |
20150358436 | Kim et al. | Dec 2015 | A1 |
20150363113 | Rahman et al. | Dec 2015 | A1 |
20160028598 | Khakpour et al. | Jan 2016 | A1 |
20160065475 | Hilt et al. | Mar 2016 | A1 |
20160104346 | Ovalle et al. | Apr 2016 | A1 |
20160255042 | Newton | Sep 2016 | A1 |
20160269927 | Kim et al. | Sep 2016 | A1 |
20160337426 | Shribman et al. | Nov 2016 | A1 |
20170099345 | Leach | Apr 2017 | A1 |
20170163425 | Kaliski, Jr. | Jun 2017 | A1 |
20180077109 | Hoeme et al. | Mar 2018 | A1 |
20180077110 | Huston, III et al. | Mar 2018 | A1 |
20180278717 | Richardson et al. | Sep 2018 | A1 |
20180287916 | Mizik et al. | Oct 2018 | A1 |
20180302322 | Richardson et al. | Oct 2018 | A1 |
20180332107 | Marr et al. | Nov 2018 | A1 |
20180351904 | Mizik et al. | Dec 2018 | A1 |
20180367498 | Bliss et al. | Dec 2018 | A1 |
20190007515 | Baldwin et al. | Jan 2019 | A1 |
20190020562 | Richardson et al. | Jan 2019 | A1 |
20190028562 | Watson et al. | Jan 2019 | A1 |
20190044787 | Richardson et al. | Feb 2019 | A1 |
20190044846 | Howard et al. | Feb 2019 | A1 |
20190073303 | Marshall et al. | Mar 2019 | A1 |
20190089542 | Richardson et al. | Mar 2019 | A1 |
20190098109 | Watson | Mar 2019 | A1 |
20190121739 | Richardson et al. | Apr 2019 | A1 |
20190129908 | Kumarasamy | May 2019 | A1 |
20190140922 | Ellsworth et al. | May 2019 | A1 |
Entry |
---|
Armour et al.: “A Heuristic Algorithm and Simulation Approach to Relative Location of Facilities”; Management Science, vol. 9, No. 2 (Jan. 1963); pp. 294-309. |
Meng et al., “Improving the Scalability of Data Center Networks with Traffic-Aware Virtual Machine Placement”; Proceedings of the 29th Conference on Information Communications, INFOCOM'10, pp. 1154-1162. Piscataway, NJ. IEEE Press, 2010. |
Arends et al., DNS Security Introduction and Requirements, RFC 4033, Mar. 2005, 21 pages. |
Ariyapperuma et al., “Security Vulnerabilities in DNS and DNSSEC.” The Second International Conference on Availability, Reliability and Security, IEEE, 2007, 8 pages. |
Chandramouli et al., “Challenges in Securing the Domain Name System.” IEEE Security & Privacy4.1 (2006),pp. 84-87. |
Cohen et al., “Proactive Caching of DNS Records: Addressing a Performance Bottleneck”, Proceedings of Saint 2001 Symposium on Applications and the Internet; 8-12, Jan. 8, 2001, IEEE Computer Society, pp. 85-94. |
Eastlake, Donald, Domain Name System Security Extensions, RFC 2535, Mar. 1999, 47 pages. |
JH Software, Moving a DNS Server to a New IP Address, last updated Jan. 26, 2006, 1 page. |
Office Action in Application No. 09729072.0 dated Dec. 7, 2018. |
Office Action in European Application No. 11767118.0 dated Jan. 29, 2019. |
Examination Report in Indian Application No. 3105/DELNP/2013, dated Feb. 19, 2019. |
Extended Search Report in European Application No. 18156163 dated Sep. 3, 2018. |
Examination Report in Indian Application No. 4487/DELNP/2013 dated Dec. 28, 2018. |
Office Action in European Application No. 13770602.4 dated Mar. 11, 2019. |
Number | Date | Country | |
---|---|---|---|
Parent | 13095554 | Apr 2011 | US |
Child | 16261401 | US |