Patent classifications
H04L67/1095
Data exchange and processing synchronization in distributed systems
Systems, methods, techniques and apparatuses of asynchronous communication is distributed systems are disclosed. One exemplary embodiment is a method determining, with a plurality of agent nodes structured to communicate asynchronously in a distributed system, a first set of iterations including an iteration determined by each of the plurality of agent nodes; determining, with a first agent node of the plurality of agent nodes, a local vector clock; receiving, with the first agent node, a first iteration of the first set of iterations and a remote vector clock determined based on the first iteration; updating, with the first agent node, the local vector clock based on the received remote vector clock; and determining a first iteration of a second set of iterations based on the first set of iterations after determining all iterations of the first set of iterations have been received based on the local vector clock.
Digital twin of IT infrastructure
A digital twin of an IT infrastructure is created to identify a group of critical servers (called “base servers”) needed to replicate the IT infrastructure in a cloud-computing environment. To identify the correct base servers and their actual server configurations, the IT infrastructure is crawled and various telemetry, connection, and network data is analyzed against data sets of other known servers. The digital twin is created to include these base servers and their particular configurations. Then, the digital twin may be deployed on demand in the cloud-computing environment using executable scripts that mimic the base servers and their particular configurations, creating a replication of the IT infrastructure for various purposes (e.g., redundancy, testing, etc.).
Digital twin of IT infrastructure
A digital twin of an IT infrastructure is created to identify a group of critical servers (called “base servers”) needed to replicate the IT infrastructure in a cloud-computing environment. To identify the correct base servers and their actual server configurations, the IT infrastructure is crawled and various telemetry, connection, and network data is analyzed against data sets of other known servers. The digital twin is created to include these base servers and their particular configurations. Then, the digital twin may be deployed on demand in the cloud-computing environment using executable scripts that mimic the base servers and their particular configurations, creating a replication of the IT infrastructure for various purposes (e.g., redundancy, testing, etc.).
Highly efficient native e-mail message data protection for office 365
Embodiments for a method of storing e-mail messages using a cloud native e-mail data protection process. E-mail messages are first compressed and stored in a container along with selected metadata. An Email Record is created for each e-mail message. A Container Record is created for each newly created container, and a Backup Record is created for each container for each backup. Once the required records are created, the process facilitates the execution of backup operations, such as full or incremental backups of the stored e-mail messages. Data tiering is supported so that low cost object storage in the public cloud is used instead of expensive processing methods, such as deduplication backups.
Highly efficient native e-mail message data protection for office 365
Embodiments for a method of storing e-mail messages using a cloud native e-mail data protection process. E-mail messages are first compressed and stored in a container along with selected metadata. An Email Record is created for each e-mail message. A Container Record is created for each newly created container, and a Backup Record is created for each container for each backup. Once the required records are created, the process facilitates the execution of backup operations, such as full or incremental backups of the stored e-mail messages. Data tiering is supported so that low cost object storage in the public cloud is used instead of expensive processing methods, such as deduplication backups.
Server-based restricted access storage
According to embodiments, a method for distributing a service through server-based restricted access storage includes executing, by a service provider, a service deployment of the service to a client in a cloud environment that operates client software in addition to the service deployment, the cloud environment provided by the client, the service deployment provided by the service provider and separate from the client software executing in the cloud environment. The method also includes receiving, by the service provider, privileges from the client to allow the service provider to access and operate the service in the cloud environment, the privileges providing access to the cloud environment separate from the client software executing in the cloud environment. The method also includes configuring the service deployment to monitor the client software, wherein the service deployment is partially isolated from other portions of the cloud environment.
Server-based restricted access storage
According to embodiments, a method for distributing a service through server-based restricted access storage includes executing, by a service provider, a service deployment of the service to a client in a cloud environment that operates client software in addition to the service deployment, the cloud environment provided by the client, the service deployment provided by the service provider and separate from the client software executing in the cloud environment. The method also includes receiving, by the service provider, privileges from the client to allow the service provider to access and operate the service in the cloud environment, the privileges providing access to the cloud environment separate from the client software executing in the cloud environment. The method also includes configuring the service deployment to monitor the client software, wherein the service deployment is partially isolated from other portions of the cloud environment.
CORRELATING A FILE HOSTED AT A FILE HOSTING SERVER WITH A MEETING OBJECT
A computing system comprises at least one processor memory. The at least one processor, when executing a hosting application loaded in the memory, is configured to perform several acts. These acts include receiving data generated by a scheduling application, wherein the data indicates that a file hosted by the file hosting application is referenced in a meeting object generated by the scheduling application. The acts further include responsive to receiving the data, assigning metadata to the file hosted by the file hosting application, the metadata comprises the data generated by the scheduling application. The acts also include at a threshold time prior to the time when the meeting represented by the meeting object is to occur, causing a notification to be transmitted to a client computing device from which credentials of a user in the users have been received, the notification transmitted based upon the metadata assigned to the file.
SYSTEMS AND METHODS FOR AUTOMATICALLY ACTIVATING WIRELESS NETWORKS
In some embodiments, automatic selective enablement of a wireless interface is provided. In some embodiments, a first device such as a recording device broadcasts a notification via a first wireless interface. The notification may be received by a second device such as a network device, which activates a second wireless interface in response.
In some embodiments, the second device may transmit a notification via the first wireless interface to indicate that the second wireless interface has been activated. In response to receiving such a notification, the first device may activate its own second wireless interface in order to complete the connection and transmit a data record to the second device. In some embodiments, the first wireless interface is a low-power wireless interface, and the second wireless interface is a high-power wireless interface.
Network informed policy creation for optimizing backup operations in a data protection system
Embodiments for optimizing a backup operation for a data protection system, by connecting with network devices in a network implementing the backup operation, the backup operation implementing a policy that specifies a plurality of service requirements and that is initiated at a time within a plurality of time windows, and determining a size of dataset to be backed up by the backup operation. The method further monitors a flow of data between a source and a destination of data in the network, compiles historical data of operational parameters for data transfers between the source and destination, and determines an optimum time within the plurality of time windows based on the dataset size and the historical data.