G06F16/1734

Lightweight extension of core data services

Implementations of the present disclosure include receiving, by a parser, a view source file and an extension source file, the view source file defining a view on data stored in a database, the extension source file defining an extension to the view, parsing, by the parser, the view source file to provide a view abstract syntax tree (AST) and the extension source file to provide an extension AST, providing, by the parser, a merged AST based on the view AST and the extension AST, generating a mixed runtime data object using the merged AST, and providing the mixed runtime data object for consumption by at least one runtime component.

Security for data at rest in a remote network management platform

An embodiment may involve persistent storage including a parent filesystem and a pre-configured amount of free space within the parent filesystem that is dedicated for shared use. The embodiment may also involve one or more processors configured to, for each of a plurality of child filesystems: create a sparse file with an apparent size equivalent to the pre-configured amount of free space; create a virtual mapped device associated with the sparse file; establish one or more cryptographic keys for the virtual mapped device; create an encrypted virtual filesystem for the virtual mapped device and within the sparse file, wherein the encrypted virtual filesystem uses the cryptographic keys for application-transparent encryption and decryption of data stored by way of the encrypted virtual filesystem; and mount the encrypted virtual filesystem within the parent filesystem as one of the child filesystems.

Integrated universal file converter
11693817 · 2023-07-04 · ·

Universal, automatic file conversion may be provided by a universal file conversion system or application. An input file may be received by the universal file conversion system. An input file type for the input file and a recipient of the input file may be determined. Programs available to the recipient for accessing a file may be determined. A target file type accessible to the recipient may be determined for converting the input file. A sequence of file conversions to convert the input file to the target file type may be determined. The input file may be converted to the target file type based on the sequence of file conversions. The converted file may be provided to the recipient. The recipient may return the converted file, and the converted file may be automatically converted back to the original input file type and provided to the original source of the input file.

Event Logging for Valves and Other Flow Control Devices
20230004532 · 2023-01-05 ·

A control system for a valve or other flow control device can include a processor device. The control system can further include a memory in communication with the processor device. The memory may have a fixed maximum capacity. The control system can further include one or more ports to receive signals corresponding to events for the valve or other flow control device. The processor device can be configured to execute operations that include: over a time interval, counting a quantity of events of a first type, corresponding to the signals received at the one or more ports, and after the time interval, storing in the memory a record of the first type of event over the time interval, based on the counted quantity.

CLASSIFYING DATA AND ENFORCING DATA ACCESS CONTROL USING A CONTEXT-BASED HIERARCHICAL POLICY
20230004663 · 2023-01-05 ·

One example method includes receiving a request from a user to access data stored in a filesystem, in response to the request, retrieving metadata of the data and metadata of the user, validating the metadata of the data and the metadata of the user against a data access rule, and granting the user access to the data upon successful validation of the metadata of the data and the metadata of the user.

File source tracking

A computing system may determine different patterns of modifications that are to be made to data of a file to generate respective modified versions of the file, the different patterns of modifications enabling identification of other files derived from the respective modified versions of the file, the different patterns of modifications including a first pattern of modifications. The computing system may generate a first modified version of the file at least in part by modifying the data based on the first pattern of modifications, may send the first modified version of the file to a client device, and may store signature data indicative the first pattern of modifications so as to enable identification of other files derived from the first modified version of the file.

VIRTUALIZATION ENGINE FOR VIRTUALIZATION OPERATIONS IN A VIRTUALIZATION SYSTEM
20220413888 · 2022-12-29 ·

Methods, systems, and computer storage media for providing virtualization operations—including an activate operation, suspend operation, and resume operation for virtualization in a virtualization system. In operation, a unique identifier and file metadata associated with a first file stored in a cache engine. The cache engine manages the first file of an application running on the virtual machine to circumvent writing file data of the first file to an OS disk during a suspend operation of the virtual machine and circumvents reading file data of the first file from the OS disk during a resume operation of the virtual machine. Based on a resume operation associated with the virtual machine and the file metadata, file data of the first file that is stored in the cache engine is accessed. The file data is communicated to the virtual machine, the virtual machine is associated with the suspend and the resume operation.

PROXY SYSTEM FOR SYSTEM LOG MESSAGES
20220413471 · 2022-12-29 ·

An industrial automation system includes a collector component communicatively coupled to a first network and configured to receive one or more event logs via a first communication protocol. The industrial automation system also includes a first industrial automation component communicatively coupled to the first network and the collector component. The first industrial automation component is configured to communicate via the first communication protocol. Additionally, the industrial automation system includes a second industrial automation component configured to communicate via a second communication protocol, generate a first event log representative of a property associated with the second industrial automation component, and send the first event log to the first industrial automation component. The first industrial automation component is configured to convert the first event log into second event log interpretable by the collector component and send the second event log to the collector component via the first network.

EFFICIENT REPLICATION OF FILE CLONES
20220414064 · 2022-12-29 ·

A method for managing replication of cloned files is provided. Embodiments include determining, at a source system, that a first file has been cloned to create a second file. Embodiments include sending, from the source system to a replica system, an address of the first extent and an indication that a status of the first extent has changed from non-cloned to cloned. Embodiments include changing, at the replica system, a status of a second extent associated with a replica of the first file on the replica system from non-cloned to cloned and creating a mapping of the address of the first extent to an address of the second extent on the replica system. Embodiments include creating, at the replica system, a replica of the second file comprising a reference to the address of the second extent on the replica system.

Analysis of streaming data using deltas and snapshots

Implementations described herein relate to methods, systems, and computer-readable media to obtain snapshots used for analysis of streaming data. In some implementations, a computer-implemented method includes receiving initial data that includes a plurality of identifiers and corresponding timestamps, generating and storing a snapshot based on the initial data, wherein the snapshot includes the identifiers and a corresponding status, receiving a data stream that includes a subset of the identifiers, activity information for each identifier in the subset, and corresponding timestamps. The method further includes periodically analyzing the data stream to obtain a delta that includes an updated status for each identifier in the subset, storing the delta separate from the snapshot. The method further includes receiving a request for identifiers that are active in a particular time period, and based on the particular time period, retrieving active identifiers from the data stream, the delta, or the snapshot.