G06F16/119

FILE JOURNAL INTERFACE FOR SYNCHRONIZING CONTENT
20230101958 · 2023-03-30 ·

In some embodiments, a system for synchronizing content with client devices receives a request from a client device to synchronize operations pertaining to content items associated with a user account registered at the system. The request can include the operations and a cursor identifying a current position of the client in a journal of revisions on the system. Based on the operations, the system generates linearized operations associated with the content items. The linearized operations can include a respective operation derived for each of the content items from one or more of the operations. The system converts each respective operation in the linearized operations to a respective revision for the journal of revisions and, based on the cursor, determines whether the respective revision conflicts with revisions in the journal. When the respective revision does not conflict with revisions in the journal, the system adds the respective revision to the journal.

AUTOMATED SYNCING OF DATA BETWEEN SECURITY DOMAINS

Described herein are systems, methods, and non-transitory computer readable media for automating the transfer/syncing of datasets or other artifacts from one security domain (e.g., a low security side environment) to another security domain (e.g., a high security side environment) in a seamless manner that complies with requirements of a data transfer mechanism used to transfer data between the two security domains while ensuring data integrity and consistency between the two security domains.

Methods, devices and systems for migrating an active filesystem

A computer-implemented method of migrating metadata from a donor filesystem D having a rooted tree structure to a beneficiary filesystem B while processing commands that operate on the metadata may comprise, while a command to operate on the metadata is not received, replicating the donor filesystem D at the beneficiary filesystem B by sequentially copying metadata of nodes of the donor filesystem D to the beneficiary filesystem B. When a command is received to operate on the metadata, the command may be executed at both the donor filesystem D and the beneficiary filesystem B when all arguments of the command are present in both the donor filesystem D and the beneficiary filesystem B. When none of arguments are present in the beneficiary filesystem B, the command may be executed at the donor filesystem D only. When only some of the arguments are present in the beneficiary filesystem B, the command may be enqueued at least until all arguments of the command are present in the beneficiary filesystem B. When all arguments thereof are present in the beneficiary filesystem B, the enqueued commands may be dequeued and scheduled for execution.

Method for browsing application folder and electronic device

A method for browsing an application folder includes detecting a first touch operation on a touchscreen of an electronic device, in response to the first touch operation, displaying a first user interface, where the first user interface is a setting screen of a first application program, where the first user interface includes a folder control, detecting a second touch operation on the folder control, and in response to the second touch operation, displaying a second user interface on the touchscreen, where the second user interface is a content details screen of the folder corresponding to the first application program.

User persistence data moved between individual compute environments and session host environments
11609778 · 2023-03-21 · ·

A virtual server includes at least one processor to retrieve a user layer from a user's personalization container, and initiate mounting of the user layer to a target operating system. During the mounting, the at least one processor determines that the user layer did not originate with the target operating system. The user layer is modified so that file system objects and registry objects are compatible with the target operating system. Mounting of the modified user layer is completed to create a single composited layered image.

DEVICE TO DEVICE MIGRATION IN A UNIFIED ENDPOINT MANAGEMENT SYSTEM
20230079795 · 2023-03-16 ·

Described herein are example methods and systems for enrolling a user device with an unified endpoint management system (“UEMS”) directly from another user device. The examples describe a first user device that is already enrolled with the UEMS and a second user device that is seeking to be enrolled. The two user devices can establish a direct connection with each other. The second user device can be authenticated by a user inputting the same migration password or pin at both user device. The first user device can generate and send a migration data file to the second user device. The migration data file can include settings, policies, software packages, and files managed by the UEMS. The second user device can copy settings, policies, and files, and install the applications from the migration data file. The second user device can notify an UEMS server of the device migration.

Method for Browsing Application Folder and Electronic Device
20230129384 · 2023-04-27 ·

A method for browsing an application folder includes detecting a first touch operation on a touchscreen of an electronic device, in response to the first touch operation, displaying a first user interface, where the first user interface is a setting screen of a first application program, where the first user interface includes a folder control, detecting a second touch operation on the folder control, and in response to the second touch operation, displaying a second user interface on the touchscreen, where the second user interface is a content details screen of the folder corresponding to the first application program.

STORAGE-DEFERRED COPYING BETWEEN DIFFERENT FILE SYSTEMS
20220335005 · 2022-10-20 ·

Storage-deferred copying between different file systems, including: receiving a request to copy a plurality of files from a first file system to a second file system of a different type than the first file system; and virtually copying a plurality of data blocks mapped to the plurality of files in the first file system into the second file system by generating, in the second file system, a plurality of references to the plurality of data blocks.

SYSTEMS AND METHODS FOR INTELLIGENT DIGITAL ITEM DISCOVERY AND MACHINE LEARNING-INFORMED HANDLING OF DIGITAL ITEMS AND DIGITAL ITEM GOVERNANCE
20230072498 · 2023-03-09 ·

Systems and methods of computing classifications for and migrating digital content that includes accessing a digital content corpus within a source data storage system; in response to accessing the digital content corpus, for each distinct item of digital content of the plurality of distinct items of digital content: computing, via one or more digital content machine learning classification models, a content classification inference; identifying automated digital content handling tasks of a plurality of distinct digital content handling tasks based on the content classification inference; executing the automated content handling tasks identified for each distinct item of digital content, wherein executing the automated content handling tasks includes: designating a storage location within a target data storage system based on the in-migration content classification inference; and migrating a respective item of digital content from the source data storage system to the designated storage location within the target data storage system.

SECURE LOADING AND EXECUTION OF USER-DEFINED CONTENT ON EMBEDDED REMOTE TERMINAL UNIT CONTROLLER

Secure loading and execution of user-defined content on an embedded controller associated with a remote terminal unit (RTU) includes providing a factory default image for the RTU having a default secured read only filesystem and providing a developer image for extending the RTU functionality, having a read/write filesystem equivalent working in conjunction with the read only filesystem.