Patent classifications
H04L67/1095
Updating subscriber nodes with replication logs that increase scalability
Various aspects of the subject technology relate to methods, systems, and machine-readable media for scaling a network security policy manager. The method includes receiving a stream comprising replication logs at a subscriber node, the replication logs comprising changes made to a publisher node that publishes contents to a plurality of subscriber nodes including the subscriber node, the replication logs streamed in response to changes being made to the publisher node. The method also includes replaying the replication logs at the subscriber node to update the subscriber node, wherein a replication lag is lower than a replay lag by a predefined threshold. The method also includes storing the replication logs on at least one remote server separately from the subscriber node to increase the scalability of updating the plurality of subscriber nodes, at least one remote server located geographically proximate to the subscriber node.
AUTHENTICATING AND CREATING ACCOUNTS ON BEHALF OF ANOTHER USER
Embodiments described herein provide for a satellite device that can be associated with a user account of a minor aged (e.g., child or adolescent) user that does not have a smartphone that can be used as a companion device to the satellite device. The satellite device can be configured to be used as a primary device, without reliance upon a paired smartphone. Certain information can be synchronized with the satellite device via the association with the family account. During initial configuration, a set of cryptographic keys can be generated to associate the account of the satellite device with the set of accounts in the family. The satellite device can then access calendars, media, or other data that is shared with user accounts within a family of user accounts.
AUTOMATED SYNCING OF DATA BETWEEN SECURITY DOMAINS
Described herein are systems, methods, and non-transitory computer readable media for automating the transfer/syncing of datasets or other artifacts from one security domain (e.g., a low security side environment) to another security domain (e.g., a high security side environment) in a seamless manner that complies with requirements of a data transfer mechanism used to transfer data between the two security domains while ensuring data integrity and consistency between the two security domains.
Directing I/O To An Active Membership Of Storage Systems
Determining active membership among a set of storage systems, including: determining, by a cloud-based storage system among the set of storage systems, that a membership event corresponds to a change in membership to the set of storage systems synchronously replicating the dataset; applying, in dependence upon the membership event, one or more membership protocols to determine a new set of storage systems to synchronously replicate the dataset; and for one or more I/O operations directed to the dataset, applying the one or more I/O operations to the dataset synchronously replicated by the new set of storage systems.
Risk detection of data loss for 5G enabled devices
Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises collecting data capable of being replicated from a computing device; detecting risks of the computing device, wherein detecting risks comprises detecting the computing device's surroundings, location, speed, and condition; initiating data replication on the computing device once the risks are determined to reach a predetermined threshold; and storing the replicated data within a cloud storage system using a 5G network.
Risk detection of data loss for 5G enabled devices
Embodiments of the present invention provide a computer system, a computer program product, and a method that comprises collecting data capable of being replicated from a computing device; detecting risks of the computing device, wherein detecting risks comprises detecting the computing device's surroundings, location, speed, and condition; initiating data replication on the computing device once the risks are determined to reach a predetermined threshold; and storing the replicated data within a cloud storage system using a 5G network.
Shared collaborative electronic events for calendar services
Disclosed herein are computer-implemented methods, computer-implemented systems, and non-transitory, computer-readable media for use of shared collaborative electronic events. A connection to a user calendar service is established by a shared calendar service. At least two electronic calendar events are received from the user calendar service. A determination is made for each received event whether a shared meeting object corresponding to the event exists in a shared meeting object store. If NO, a shared meeting object is created in the shared meeting object store for the electronic calendar event, meeting participants are determined for the electronic calendar event, and access to the shared meeting object is provided to each determined meeting participant. Providing access to the shared meeting object includes enabling each participant to add shared content to the shared meeting object and view shared content added by other participants.
Shared collaborative electronic events for calendar services
Disclosed herein are computer-implemented methods, computer-implemented systems, and non-transitory, computer-readable media for use of shared collaborative electronic events. A connection to a user calendar service is established by a shared calendar service. At least two electronic calendar events are received from the user calendar service. A determination is made for each received event whether a shared meeting object corresponding to the event exists in a shared meeting object store. If NO, a shared meeting object is created in the shared meeting object store for the electronic calendar event, meeting participants are determined for the electronic calendar event, and access to the shared meeting object is provided to each determined meeting participant. Providing access to the shared meeting object includes enabling each participant to add shared content to the shared meeting object and view shared content added by other participants.
PRECISION TIME PROTOCOL WITH MULTI-CHASSIS LINK AGGREGATION GROUPS
The precision time protocol (PTP) runs on the peer switches in an MLAG domain. PTP messages received by one peer switch on an MLAG interface is selectively peer-forwarded to the other peer switch on the same MLAG interface in order to coordinate a synchronization session with a PTP node. The peer-forwarded messages inform one peer switch to be an active peer and the other peer switch to be an inactive peer so that timestamped messages during the synchronization session are exchanged only between the PTP node the active peer, and hence take the same data path.
PRECISION TIME PROTOCOL WITH MULTI-CHASSIS LINK AGGREGATION GROUPS
The precision time protocol (PTP) runs on the peer switches in an MLAG domain. PTP messages received by one peer switch on an MLAG interface is selectively peer-forwarded to the other peer switch on the same MLAG interface in order to coordinate a synchronization session with a PTP node. The peer-forwarded messages inform one peer switch to be an active peer and the other peer switch to be an inactive peer so that timestamped messages during the synchronization session are exchanged only between the PTP node the active peer, and hence take the same data path.