H04L67/1095

Load-dependent encryption mechanism selection in an elastic computing system

Systems and methods are described for implementing load-dependent encryption mechanism selection in an elastic computing system. The elastic computing system can include a set of host devices configured to implement block storage volumes on behalf of users. Users may desire that such volumes be encrypted prior to storing data. It may be generally preferable for encryption to occur on the same host devices that host the volume, to reduce latency and bandwidth usage needed to encrypt the data. However, encryption of data can utilize significant computational resources, which may not be available on host devices that also have sufficient storage resources to host the volume. The present disclosure describes systems and methods that can account for computational resource availability on host devices, selecting “in-place” encryption only when available resources exist on host devices, and otherwise implementing remote encryption of volume data.

DATA SYNCHRONIZATION IN EDGE COMPUTING NETWORKS

A computer system synchronizes data in an edge computing network. A leader node is elected from a plurality of nodes, wherein the plurality of nodes includes a plurality of follower nodes that each cast a single vote for a candidate node, and wherein the candidate node is elected as the leader node in response to the candidate node receiving votes from a majority of the nodes. The leader node receives a request from a follower node comprising data to be replicated across the nodes, and transmits the data to the other nodes. When a majority of nodes receive the data, the leader node transmits instructions to the nodes to cause each node to commit the data to a data log maintained by each node. Embodiments of the present invention further include a method and program product for synchronizing data in substantially the same manner described above.

SYNCHRONIZATION OF DIGITAL CONTENT

Aspects of the present disclosure relate to the sharing of synchronization information corresponding to content among devices in a communication network. An originating device collects synchronization information related to the presentation of content to a user via the originating device. The synchronization information is defined according to reference points related to the presentation of the content to the user via the originating device, including a current state of the presentation of the content and/or additional information obtained during the presentation of the content. Based on detection of a synchronization event, the originating device transmits the collected synchronization information, resulting in the receipt of the synchronization information by one or more receiving devices. Thereafter, the presentation of the content to the user on one of the receiving devices can incorporate the synchronization information collected and transmitted by the originating device.

SYNCHRONIZATION OF DIGITAL CONTENT

Aspects of the present disclosure relate to the sharing of synchronization information corresponding to content among devices in a communication network. An originating device collects synchronization information related to the presentation of content to a user via the originating device. The synchronization information is defined according to reference points related to the presentation of the content to the user via the originating device, including a current state of the presentation of the content and/or additional information obtained during the presentation of the content. Based on detection of a synchronization event, the originating device transmits the collected synchronization information, resulting in the receipt of the synchronization information by one or more receiving devices. Thereafter, the presentation of the content to the user on one of the receiving devices can incorporate the synchronization information collected and transmitted by the originating device.

ARCHIVING APPLICATIONS IN INFORMATION MANAGEMENT SYSTEMS

An information management system according to certain aspects can implement application archiving. The system may archive one or more applications on computing devices to make more storage space available on these devices. The system can determine which applications on client computing device to archive based on various factors. Some examples of factors can include frequency of use, application type, amount of application data and/or storage, user and/or device location, etc. The data to be archived can include one or more executable file(s), metadata, actual data, etc. After an application is archived, the system can generate a placeholder for the application; a placeholder can include information for restoring the archived application.

ARCHIVING APPLICATIONS IN INFORMATION MANAGEMENT SYSTEMS

An information management system according to certain aspects can implement application archiving. The system may archive one or more applications on computing devices to make more storage space available on these devices. The system can determine which applications on client computing device to archive based on various factors. Some examples of factors can include frequency of use, application type, amount of application data and/or storage, user and/or device location, etc. The data to be archived can include one or more executable file(s), metadata, actual data, etc. After an application is archived, the system can generate a placeholder for the application; a placeholder can include information for restoring the archived application.

Sharing data in a data storage system

In various embodiments, a data storage system maintains a data store for a plurality of groups of users, where the data store includes a first section that is accessible by a first group of users, but not a second group of users, via the data storage system. In response to receiving, from a first user of the first group of users, a request to share data with the second group of users, the data storage system sends a request to a second user of the second group of users. Subsequent to receiving an acceptance from the second user, the data is stored in a second object in a second section of the data store that is accessible by the second group of users, but not the first group of users, via the data storage system.

Sharing data in a data storage system

In various embodiments, a data storage system maintains a data store for a plurality of groups of users, where the data store includes a first section that is accessible by a first group of users, but not a second group of users, via the data storage system. In response to receiving, from a first user of the first group of users, a request to share data with the second group of users, the data storage system sends a request to a second user of the second group of users. Subsequent to receiving an acceptance from the second user, the data is stored in a second object in a second section of the data store that is accessible by the second group of users, but not the first group of users, via the data storage system.

SYSTEMS AND METHODS FOR MANAGING THE GENERATION OR DELETION OF RECORD OBJECTS BASED ON ELECTRONIC ACTIVITIES AND COMMUNICATION POLICIES

The present disclosure relates to for managing the generation or deletion of record objects based on electronic activities and communication policies. Data of a plurality of electronic activities from one or more electronic accounts of the entity may be identified. It may be determined whether the identified data satisfies a communication policy. The communication policy may include one or more rules based on the electronic activities. Instructions to generate a contact record object or instructions to delete an existing contact record for the entity may be transmitted based on the condition of the communication of the communication policy that is satisfied.

SYSTEMS AND METHODS FOR MANAGING THE GENERATION OR DELETION OF RECORD OBJECTS BASED ON ELECTRONIC ACTIVITIES AND COMMUNICATION POLICIES

The present disclosure relates to for managing the generation or deletion of record objects based on electronic activities and communication policies. Data of a plurality of electronic activities from one or more electronic accounts of the entity may be identified. It may be determined whether the identified data satisfies a communication policy. The communication policy may include one or more rules based on the electronic activities. Instructions to generate a contact record object or instructions to delete an existing contact record for the entity may be transmitted based on the condition of the communication of the communication policy that is satisfied.