G06F16/173

SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS

A method provides for receiving network traffic from a host having a host IP address and operating in a data center, and analyzing a malware tracker for IP addresses of hosts having been infected by a malware to yield an analysis. When the analysis indicates that the host IP address has been used to communicate with an external host infected by the malware to yield an indication, the method includes assigning a reputation score, based on the indication, to the host. The method can further include applying a conditional policy associated with using the host based on the reputation score. The reputation score can include a reduced reputation score from a previous reputation score for the host.

Systems and methods for caching of managed content in a distributed environment using a multi-tiered architecture

Embodiments as disclosed provide a distributed caching solution that improve the performance and functionality of a content management platform for sites that are physically or logically remote from the primary site of the content management platform. In particular, according to embodiments, a remote cache server may be associated with a remote site to store local copies of documents that are managed by the primary content management platform. Periodically, a portion of the remote site's cache may be synchronized with the content management platform's primary site using an extensible architecture to ensure that content at the remote cache server is current.

Presenting and editing recent content in a window during an execution of a content application

Techniques for presenting recently generated content on a display include presenting, based on an execution of an application, content on the display, generating a content file including at least one of a video or a screenshot of the application, storing the content file, receiving, based on user input at the input device, a request to access one or more of content files from the folder, wherein the request is received while the execution of the application continues, and presenting, in response to the request, a window over at least a first portion of the content while the execution of the application continues, wherein the window previews the content file and indicates the recency of the content file, and includes a selectable option to edit for length, crop, or annotate in the window any of the content file or the other content files.

Intercepting not directly interceptable program object property

One or more instances in program code that references an identifier of the standard web object model program object property that is prevented by a web browser from being directly reassigned are identified. The one or more instances in the program code that references the identifier of the standard web object model program object property that is prevented by the web browser from being directly reassigned are modified with one or more corresponding replacement references that include a replacement identifier. The replacement identifier id defined in the program code as being associated with a new program object property defined to invoke the standard web object model program object property in addition to being defined to perform additional processing of a resource identifier associated with the invocation of the standard web object model program object property.

Systems and methods for selectively storing specific versions of media assets
11317140 · 2022-04-26 · ·

Systems and methods provided herein for intelligently distinguishing between different versions of a media asset and selectively storing those requested media assets that differ from versions that were previously stored in some pre-defined characteristics. These systems and methods, upon identifying a version of the requested media asset was previously stored, determine a characteristic of the requested media asset. These systems and methods compare the characteristic of the requested media asset with a corresponding characteristic of the version of the requested media asset that was previously stored to determine a difference between the two versions. The systems and methods then determine whether the difference in characteristic renders the requested media asset preferable over the previously stored version. Upon determining that the requested media asset is preferable over the previously stored version, the systems and methods store the requested media asset.

SHARED ITEM FILE RETENTION

The disclosed technology is generally directed to the retention of online files. An indication that a communication from a first user to a second user includes a reference to an online document is received. Responsive to the indication, via a first processor, a first request for metadata associated with the online document is sent. The first request is based on permissions associated with the second user. A signal is communicated to a second processor such that: if the first request is granted the signal includes the metadata, else the signal includes the reference to the first online document. Via the second processor, responsive to determining that the signal does not include the metadata, a second request for the metadata is made such that the second request has elevated permissions relative to the first request. Via the second processor, the online document is caused to be marked for retention.

PERSONALIZED All MEDIA SEARCH
20210365509 · 2021-11-25 ·

A system and method for receiving user information from a user, wherein the user information includes location information, preferences, biographic data, previous purchase information, and previous search information. Next, creating a micro-moment profile of the user in real time from the user information, wherein the user information is updated in real time. Then, determining a plurality of micro-moment attributes from the micro-moment profile and searching all content available to the user using the plurality of micro-moment attributes to determine a unique set of search results for the user. Lastly, sending the unique set of search results to an electronic device associated with the user.

Detecting changes in a namespace using namespace enumeration endpoint response payloads

Technologies for detecting changes in a namespace using namespace enumeration endpoint response payloads are disclosed. A namespace is enumerated at a first time by retrieving response payloads containing metadata describing each location in the namespace from a namespace enumeration endpoint. Signatures are generated based on the response payloads and stored. To determine if changes were made to the namespace between the first time and a subsequent second time, metadata is retrieved from the namespace enumeration endpoint for the namespace at the second time and signatures are generated. Signatures generated at the first time are then compared to the signatures generated at the second time. If the signatures are different, the items in the location in the namespace changed between the first time and the second time. Changes occurring in a location of the namespace can then be identified based on the metadata obtained at the first and second times.

CONVERTING A LANGUAGE TYPE OF A QUERY

The present disclosure involves detecting a first language type of a query configured to access a column in a data table, wherein the query is requested by a user; converting, by the computing device, the query from the first language type to a second language type that conforms with the data storage format of the data table; after converting the query to the second language type, generating, by the computing device, a temporary table including the column and enforcing an access permission by formatting the temporary table to support the second language type and excluding a row from the temporary table for which the user does not have access rights; and executing, by the computing device, the query against the temporary table to generate a query result.

UNIQUE ID GENERATION FOR SENSORS

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.