H04L47/828

User-based data tiering

Techniques are provided for user-based data tiering. In an example, a computer maintains a first-in-first-out queue that logs a finite set of users that have most-recently modified a file. This queue can be maintained in an extended attribute of an inode that corresponds to a file. A computer can also maintain a policy that defines how to perform storage tiering on a file based on which users have accessed the file. When a tiering operation is performed, the files specified by a corresponding tiering policy can be evaluated for which users have recently accessed them. When a user specified by the tiering policy has recently modified a file, the file can be placed in tiering queue for tiering.

Automated decision techniques for controlling resource access

A durability assessment system may receive a request, from a computing system, for a durability index describing an entity. The durability assessment system may determine the durability index based on information about the resource usage by the entity, such as a resource availability score or a resource allocation score. The durability assessment system may compare the obtained resource availability score and resource allocation score to ranges associated with a set of durability indices. Based on the comparison, the durability assessment system may determine a durability index for the entity. The durability index may indicate an ability of the entity to return accessed resources. In some cases, the durability assessment system may provide the durability index to an allocation computing system that is configured to determine whether to grant access to resources based on the durability index.

Feedback control based load balancing for containerized workloads
11477273 · 2022-10-18 · ·

System and methods are described for performing load balancing by continually collecting real-time metrics values from a plurality of endpoints in a cloud computing system, the real-time metrics values representing current performance measurements of processing by the endpoints, and using the collected real-time metrics values by a controller to continually determine a current weight value for each endpoint, the current weight value representing a probability that the endpoint will be selected to process a user request. The method includes receiving the user request for the cloud computing system to perform requested processing; selecting an endpoint of the cloud computing system to process the user request based at least in part on the current weight values of the endpoints; and sending the user request to the selected endpoint.

Enforcement of time-based user access levels for computing environments
11509604 · 2022-11-22 · ·

A system is provided for enforcing time-based user access levels in a computing infrastructure of an organization. The system includes a processor and a computer readable medium operably coupled thereto, to perform operations which include executing a synchronization of the time-based user access levels, obtaining a first login identifier (ID) of a plurality of login IDs for a group of employees of the organization, identifying a position ID and an employment status ID for the first login ID, determining a current time and a last login timestamp for the first login ID, determining a time-based access rule for the group of employees, determining whether a time period from the last login timestamp to the current time violates the time-based access rule, and setting, for the synchronization of the first login ID, at least a first access level of the first login ID to computing resources.

Autonomous and integrated system, method and computer program for dynamic optimisation and allocation of resources for defined spaces and time periods
11461707 · 2022-10-04 · ·

In one aspect, the present invention provides a computing system for effecting an optimised condition for one or more booking requests in a venue having one or more spaces, comprising an allocation module executing on a processor and arranged to retrieve the booking requests from a database containing a plurality of booking requests, the booking requests including requestor constraint information regarding one or more constraints provided by the booking requestor including a predefined service period, and retrieve venue constraint information from a database, the venue constraint information including venue spatial information and furniture spatial information, wherein the allocation module executes an allocation algorithm that utilises the booking information and the venue constraint information to assess the capacity of the one or more venues and allocate a portion of space for each booking request to satisfy the optimised condition utilising the assessment, to derive an optimised allocation instruction set.

Authorizations Associated With Externally Shared Communication Resources

Various embodiments of the present disclosure are directed to a group-based communication apparatus that is configured to enable end-users (e.g., non-admin users) to initiate, by way of client devices, generation of a shareable resource associated with a group-based communication resource identifier to efficiently authorize communication between client devices associated with different organization identifiers in group-based communication interfaces associated with a shared group-based communication resource identifier.

Processing Allocation In Data Center Fleets
20220294747 · 2022-09-15 ·

A method and system for allocating tasks among processing devices in a data center. The method may include receiving a request to allocate a task to one or more processing devices, the request indicating a required bandwidth for performing the task, a list of predefined processing device groups connected to a host server and indicating availability of the processing device groups included therein for allocation of tasks and available bandwidth for each available processing device group, assigning the task to a processing device group having an available bandwidth greater than or equal to the required bandwidth for performing the task, and updating the list to indicate that each of the processing device group to which the task is assigned and other processing device group sharing at least one processing device is unavailable. The task may be assigned to an available processing device group having a lowest amount of power needed.

Method for communication among a plurality of users provided with communication terminals, via a virtual communication space

A method enables a plurality of users having communication terminals to communicate via a virtual communication space provided by a communication server on a communication network. The method includes configuring a server application so as to create a virtual communication space for a determined group of users. The virtual space provides a plurality of distinct communication modes referred to as “activities”, each activity relating to at least one associated multimedia content, referred to as “activity content” that is shared by the users of the group. Each activity is performed by determined actions that can be triggered by any of the users of the group. The actions includes at least creating, modifying, or deleting a given activity content. Action requests relating to an activity under consideration and coming from the terminals of the users of the group are processed in a sequential manner in the order of their arrival.

Dynamic clustering of network nodes for mobile communications
11394616 · 2022-07-19 · ·

Provided are systems and methods for segmenting and grouping a plurality of network nodes into one or more clusters. Content may be delivered from a transmitting user node to a receiving user node based on which cluster the receiving user node resides. The grouping of the clusters may be dynamically updated in real-time based on user activity data. Such user activity data may be collected from both a transmitting user node (e.g., server) and a receiving user node (e.g., user device) to map the delivery of a relevant communication. Advantageously, a transmitting user may deliver content to other relevant users and a receiving user may receive content from other relevant users.

DDOS-handling device, DDOS-handling method, and program

A DDoS attack handling technology is provided in which even when a plurality of IP addresses are attacked at the same time, resource load distribution between sites can be achieved while an increase in delay of target-addressed communications due to the handling of DDoS attacks is prevented. A DDoS handling apparatus 100 includes a load distribution determination unit 112 that determines whether load distribution processing is necessary, a processability determination unit 113 that determines whether load distribution processing is capable of being performed within a desired time, a grouping processing unit 115 that groups target-addressed communications into a plurality of groups, a load distribution processing unit 116 that determines, for each group, a mitigation site to be used to handle the target-addressed communications from among a plurality of mitigation sites, and an attack handling setting unit 117 that performs route control of the target-addressed communications. The DDoS handling apparatus 100 further includes a load distribution target reduction unit 114 that reduces the number of the target-addressed communications that are targets of the load distribution processing.