H04L67/1095

NETWORK CONNECTION METHOD AND ELECTRONIC DEVICE SUPPORTING SAME

An electronic device includes a first communication module, a second communication module, a display, a processor, and a memory storing instructions causing the processor to receive, from an external electronic device connected via the first communication module, first data related to a first screen on which resources of the external electronic device are configured in accordance with a graphic environment of the electronic device, output the first screen on the display, request the external electronic device to execute a selected first resource, receive, from the external electronic device, a request for obtaining second data related to the first resource, connect to the network via the second communication module to obtain the second data, transmit the obtained second data to the external electronic device, receive, from the external electronic device, third data related to a second screen configured using the second data, and output the second screen on the display.

NETWORK CONNECTION METHOD AND ELECTRONIC DEVICE SUPPORTING SAME

An electronic device includes a first communication module, a second communication module, a display, a processor, and a memory storing instructions causing the processor to receive, from an external electronic device connected via the first communication module, first data related to a first screen on which resources of the external electronic device are configured in accordance with a graphic environment of the electronic device, output the first screen on the display, request the external electronic device to execute a selected first resource, receive, from the external electronic device, a request for obtaining second data related to the first resource, connect to the network via the second communication module to obtain the second data, transmit the obtained second data to the external electronic device, receive, from the external electronic device, third data related to a second screen configured using the second data, and output the second screen on the display.

Maintaining A Synchronous Replication Relationship Between Two Or More Storage Systems

Maintaining a synchronous replication relationship between two or more storage systems, including: receiving, by at least one of a plurality of storage systems across which a dataset will be synchronously replicated, timing information for at least one of the plurality of storage systems; and establishing, based on the timing information, a synchronous replication lease describing a period of time during which the synchronous replication relationship is valid, wherein a request to modify the dataset may only be acknowledged after a copy of the dataset has been modified on each of the storage systems.

Secure end-to-end transport through in intermediary nodes

A communication network encrypts a first portion of a transaction associated with point-to-point communications using a point-to-point encryption key. A second portion of the transaction associated with end-to-end communications is encrypted using an end-to-end encryption key.

Notifications on a user device based on activity detected by an activity monitoring device
11521474 · 2022-12-06 · ·

Methods, systems and devices are provided for motion-activated display of messages on an activity monitoring device. In one embodiment, method for presenting a message on an activity monitoring device is provided, including the following method operations: downloading a plurality of messages to the device; detecting a stationary state of the device; detecting a movement of the device from the stationary state; in response to detecting the movement from the stationary state, selecting one of a plurality of messages, and displaying the selected message on the device.

Notifications on a user device based on activity detected by an activity monitoring device
11521474 · 2022-12-06 · ·

Methods, systems and devices are provided for motion-activated display of messages on an activity monitoring device. In one embodiment, method for presenting a message on an activity monitoring device is provided, including the following method operations: downloading a plurality of messages to the device; detecting a stationary state of the device; detecting a movement of the device from the stationary state; in response to detecting the movement from the stationary state, selecting one of a plurality of messages, and displaying the selected message on the device.

Redundant storage gateways

Methods, apparatus, and computer-accessible storage media for providing redundant storage gateways. A client may create a storage gateway group and add storage gateways to the group. The client may assign one or more volumes on a remote data store to each the storage gateways in the group. Volume data for each storage gateway in the group may be replicated to at least one other storage gateway in the group. If one of the gateways in the group becomes unavailable, one or more other gateways in the group may take over volumes previously assigned to the unavailable gateway, using the replicated data in the group to seamlessly resume gateway operations for the respective volumes. Client processes that previously communicated with the unavailable gateway may be manually or automatically directed to the gateway(s) that are taking over the unavailable gateway's volumes.

Mirroring network traffic of virtual networks at a service provider network

Techniques are described that enable users to configure the mirroring of network traffic sent to or received by computing resources associated with a virtual network of computing resources at a service provider network. The mirrored network traffic can be used for many different purposes including, for example, network traffic content inspection, forensic and threat analysis, network troubleshooting, data loss prevention, and the like. Users can configure such network traffic mirroring without the need to manually install and manage network capture agents or other such processes on each computing resource for which network traffic mirroring is desired. Users can cause mirrored network traffic to be stored at a storage service in the form of packet capture (or “pcap”) files, which can be used by any number of available out-of-band security and monitoring appliances including other user-specific monitoring tools and/or other services of the service provider network.

Mirroring network traffic of virtual networks at a service provider network

Techniques are described that enable users to configure the mirroring of network traffic sent to or received by computing resources associated with a virtual network of computing resources at a service provider network. The mirrored network traffic can be used for many different purposes including, for example, network traffic content inspection, forensic and threat analysis, network troubleshooting, data loss prevention, and the like. Users can configure such network traffic mirroring without the need to manually install and manage network capture agents or other such processes on each computing resource for which network traffic mirroring is desired. Users can cause mirrored network traffic to be stored at a storage service in the form of packet capture (or “pcap”) files, which can be used by any number of available out-of-band security and monitoring appliances including other user-specific monitoring tools and/or other services of the service provider network.

Low-latency direct cloud access with file system hierarchies and semantics

Techniques described herein relate to systems and methods of data storage, and more particularly to providing layering of file system functionality on an object interface. In certain embodiments, file system functionality may be layered on cloud object interfaces to provide cloud-based storage while allowing for functionality expected from a legacy applications. For instance, POSIX interfaces and semantics may be layered on cloud-based storage, while providing access to data in a manner consistent with file-based access with data organization in name hierarchies. Various embodiments also may provide for memory mapping of data so that memory map changes are reflected in persistent storage while ensuring consistency between memory map changes and writes. For example, by transforming a ZFS file system disk-based storage into ZFS cloud-based storage, the ZFS file system gains the elastic nature of cloud storage.