Patent classifications
H04L67/1095
Coherent method of consistency for purpose of cloud authorization
The present disclosure sets up the foundation of consistency for cloud authorization. Consistency is formalized as univalence and a scheme of inductive types, and consistency pushouts and pullbacks are derived for cloud authorization. Induction schemas are developed for services, repositories and messages. The consistency is characterized as relative consistency, paraconsistency, and three levels of inconsistency. Due to duality of consistency, consistency recovery is constructed with a semantic model and synthetic retry message type families.
Method and device for browsing network data, and storage medium
Disclosed are a method and a device for browsing network data, and a storage medium, and the method is operable on a device for browsing network data and includes: requesting for acquisition of network data, which includes thumbnail media data used for the thumbnail display of original media data; acquiring the thumbnail media data and data amount information of the original media data corresponding to the thumbnail media data; and displaying the thumbnail media data and the data amount information. By the disclosure, a user of an Internet terminal may obtain the relevant information of the original media data, so that unnecessary data acquiring operations by the user may be reduced, the waste of network traffic is reduced and the standby time of the Internet terminal is prolonged.
Sharing of data share metrics to customers
Provided herein are systems and methods to provide a way to share metrics regarding shared data access and accesses associated with data providers for different data listings of the data exchange. For example, the method may comprise detecting one or more client interactions with a set of data listings of a data exchange, the set of data listings associated with one or data providers. The method may further comprise collecting metrics corresponding to the one or more client interactions. In addition, the method may share metrics relevant to the one or more data providers with the one or more data providers.
Sharing of data share metrics to customers
Provided herein are systems and methods to provide a way to share metrics regarding shared data access and accesses associated with data providers for different data listings of the data exchange. For example, the method may comprise detecting one or more client interactions with a set of data listings of a data exchange, the set of data listings associated with one or data providers. The method may further comprise collecting metrics corresponding to the one or more client interactions. In addition, the method may share metrics relevant to the one or more data providers with the one or more data providers.
Secure remote access based on inspection and validation of remote access protocol traffic
Disclosed embodiments relate to securely inspecting and validating remote access protocol communications. Operations may include accessing remote access protocol communications between a first computing resource and a second computing resource; and validating at least a portion of the remote access protocol communications by at least one of: analyzing a sequence among the at least the portion, analyzing data contents of the at least the portion, analyzing a size field in the at least the portion, or analyzing a data-size correlation of the at least the portion; wherein at least one of the following is conditioned on a result of the validation: an ability of the at least the portion of the remote access protocol communications to pass between the first computing resource and the second computing resource, or an establishment of a remote access session between the first computing resource and the second computing resource.
Directed backup for massively parallel processing databases
Creating a data backup of data on a first computer system to restore to a second computer system, each of the first and second computer system including one or more nodes, each node configured to manage a subset of the data. Receiving, by the first computer system, identification of data to back up and node configuration information for the second computer system. Creating, by the first computer system, a backup of the data from the one or more nodes of the first computer system, configured in accordance with the node configuration information of the second computer system, such that the backed up data is directly manageable by the one or more nodes of the second computer system.
Synchronizing replicated data in a storage network
method and apparatus for synchronizing replicated data in a storage network. In an embodiment, a method begins by a processing module of a computing device identifying a first storage set and a second storage set for replicated storage of a data object. The processing module initiates storage of the data object in both the first and second storage sets, and further maintains a synchronization status for the data object. The processing module determines, based at least in part on the synchronization status, to resynchronize the first storage set and the second storage set. In response to determining to resynchronize the first storage set and the second storage set, the processing module identifies a latest available revision of the data object, determines that the second storage set requires the latest available revision of the data object to maintain synchronization, and facilitates storage of the identified latest available revision of the data object in the second storage set.
Synchronizing replicated data in a storage network
method and apparatus for synchronizing replicated data in a storage network. In an embodiment, a method begins by a processing module of a computing device identifying a first storage set and a second storage set for replicated storage of a data object. The processing module initiates storage of the data object in both the first and second storage sets, and further maintains a synchronization status for the data object. The processing module determines, based at least in part on the synchronization status, to resynchronize the first storage set and the second storage set. In response to determining to resynchronize the first storage set and the second storage set, the processing module identifies a latest available revision of the data object, determines that the second storage set requires the latest available revision of the data object to maintain synchronization, and facilitates storage of the identified latest available revision of the data object in the second storage set.
Power and network traffic optimization in communication synchronization
A method of syncing emails between an email server and a client device may include storing a plurality of emails for a user account. The method may also include receiving a request to sync emails between the email server and the client device. The request may include one or more discrete time intervals. The method may additionally include selecting, from the plurality of emails, emails associated with the one or more discrete time intervals. The method may further include sending at least some of the emails associated with the one or more time discrete intervals to the client device.
Secure expeditionary AI sense-understand-decide-act system and method
A method, computer program product, and computer system for applying deductive artificial intelligence (AI) attribution and auditability to data inputs, wherein the deductive AI may account for ontologies and competing system information, and wherein the deductive AI attribution and auditability may be applied to the data inputs by user workflow. The data inputs applied with the deductive AI attribution and auditability may be processed via a feedback loop to align a sense-understand-decide-act (SUDA) understanding with an inductive AI understanding. The inductive AI may be automated via the feedback loop based upon, at least in part, an AI expert system processing of the data inputs. One or more policy based rules may be developed for user automation authorization based upon, at least in part, the feedback loop.