Patent classifications
G06F16/1767
Systems and methods for hierarchical delegation of authoring control in a distributed electronic content management environment
Embodiments of systems and methods as disclosed may provide a platform agnostic way to edit content within an enterprise. For example, a platform independent thin client editor may be provided such that this editor can be accessed by users at a variety of computing platforms across the distributed computer network of an enterprise, regardless of the platform from which the thin client editor is being accessed. Moreover, certain embodiments may provide a role based mechanism for controlling the editing of content. Embodiments of such a role based mechanism may allow one editor of a content item to designate a role associated with the content item so that only users associated with that role may be allowed to edit the content item or portion of the content item.
HYBRID SYNCHRONIZATION USING A SHADOW COMPONENT
Hybrid synchronization using a shadow component includes detecting a first component of a plurality of mirrored components of a distributed data object becoming unavailable. The mirrored components include a delta component (a special shadow component) and a regular mirror (shadow) component. The delta component indicates a shorter history of changes to data blocks of a log-structured file system (LFS) than is indicated by the regular mirror component. During the unavailability of the first component, at least one write I/O is committed by the delta component. The commit is tracked by the delta component in a first tracking bitmap associated with the delta component. Based at least on detecting the first component becoming available, the first component is synchronized with data from the delta component, based at least on changed data blocks indicated in the first tracking bitmap.
VERSION CONTROL SYSTEM
A version control system implemented on at least one server computer is provided, including: a database that stores a plurality of tasks, each task having one or more versions, each version of a given task having files that are associated thereto; a server process that manages versioning of the tasks; wherein responsive to a request to check-out a first version of the given task, the server process retrieves and serves files associated to the first version of the given task; wherein responsive to a request to check-in the previously checked-out first version of the given task, the server process generates a second version of the given task, and receives and stores files in association with the second version of the given task.
ISSUE TRACKING SYSTEMS AND METHODS
Described herein is a computer implemented method. The method comprises receiving, from a user device, a selected workflow message identifying a selected workflow; accessing the selected workflow from a workflow data store; evaluating, using runtime context information received from the user device, one or more secondary triggers associated with the selected workflow to determine an applicable branch of the selected triggered workflow; communicating, to the user device, branch information in respect of the applicable branch, the branch information including information in respect of one or more operations that would be performed if the selected workflow was executed.
Accelerating transactions from a trusted source
Systems, methods, and computer-readable media for accelerating a transaction from a trusted source are provided. A method, according to one implementation, includes the step of obtaining a transaction to be processed in a network. The transaction may include one or more changes to data records stored in a database. The method also includes determining whether the transaction is obtained from a trusted source, where the trusted source may be predefined as a device that knows the state of components in the network. When the transaction is obtained from a trusted source, the method includes the step of committing the one or more changes prior to checking the validity of the one or more changes. When the transaction is not obtained from a trusted source, the method includes the step of checking the validity of the one or more changes prior to committing the one or more changes.
Method and apparatus for a file sharing and synchronization system
A computer-implemented method is provided for managing and sharing picture files. In one embodiment of the present invention, the method comprises providing a server platform and providing a datastore on the server platform for maintaining full resolution copies of the files shared between a plurality of sharing clients. A synchronization engine is provided on the server platform and is configured to send real-time updates to a plurality of sharing clients when at least one of the sharing clients updates or changes one of said files. A web interface may also be provided that allows a user to access files in the datastore through the use of a web browser.
Dynamic display of file sections based on user identities
A system for dynamically displaying specific sections of a file depending on a user identity is provided. The system utilizes access control data to enable an author to generate and share a file with a number of consumers and have each recipient view a customized set of sections of the file depending on access permissions associated with each recipient. The file can be in any format, e.g., a word processing document, presentation document, a media file, or any other file having a number of sections. A section of a file can be any definitive unit of data, such as a page, slide, tab, worksheet, video segment, audio segment, etc. Permissions can be based on a user's permission level, work history, skill level, role in an organization, title, etc. The system can also prevent access to certain sections of a file depending on the permissions associated with a consumer.
EFFICIENT METHOD TO IDENTIFY CHANGED OBJECTS FOR LARGE SCALE FILE SYSTEM BACKUP
One example method includes identifying changed objects in a filesystem. Entry lists of a previous backup and a current backup are processed at the same time. The comparison allows objects in the filesystem to be identified as unchanged, modified, new, or deleted relative to a previous backup.
File system warnings
The present technology pertains to a organization directory hosted by a synchronized content management system. The corporate directory can provide access to user accounts for all members of the organization to all content items in the organization directory on the respective file systems of the members' client devices. Members can reach any content item at the same path as other members relative to the organization directory root on their respective client device. In some embodiments novel access permissions are granted to maintain path consistency.
Fine-grained structured data store access using federated identity management
A structured data store service, such as a database service, may implement fine-grained access to data maintained at the database service using federated identity. Fine grained access requests may be received at a database service for specified data maintained for an application provider from a client of the application provider. An access credential may be also be received. Verification of the access credential may be obtained, and the database service may evaluate the fine-grained access request according to a delegation policy corresponding to the access credential to determine whether the fine-grained request is authorized. If authorized, the fine-grained access request may be service. If not authorized, the fine-grained access request may be denied. In some embodiments, multiple application clients may have the same authorization for data, such as read authorization, while another one or more application clients may have different authorization for the data, such as write authorization.