H04L67/1095

Network informed policy creation for optimizing backup operations in a data protection system
11687415 · 2023-06-27 · ·

Embodiments for optimizing a backup operation for a data protection system, by connecting with network devices in a network implementing the backup operation, the backup operation implementing a policy that specifies a plurality of service requirements and that is initiated at a time within a plurality of time windows, and determining a size of dataset to be backed up by the backup operation. The method further monitors a flow of data between a source and a destination of data in the network, compiles historical data of operational parameters for data transfers between the source and destination, and determines an optimum time within the plurality of time windows based on the dataset size and the historical data.

Systems and methods for fast start of applications in a cloud computing environment
11689625 · 2023-06-27 · ·

An application likely to be accessed at an edge of the cloud computing environment is identified. The identified application is preemptively launched and then placed in a memory-resident state. When a request from a user to access the application is received, the application is brought out of the memory-resident state into an active state and parameters associated with the user are applied to the application.

Systems and methods for fast start of applications in a cloud computing environment
11689625 · 2023-06-27 · ·

An application likely to be accessed at an edge of the cloud computing environment is identified. The identified application is preemptively launched and then placed in a memory-resident state. When a request from a user to access the application is received, the application is brought out of the memory-resident state into an active state and parameters associated with the user are applied to the application.

LEVERAGING AND EXTENDING MOBILE OPERATING SYSTEM MDM PROTOCOL
20170366402 · 2017-12-21 ·

In various embodiments, a device may include a communications interface configured to receive, from the device management server, an indication to perform an action that requires access to a privileged user space. The device may include a processor configured to use a bridge service to perform the action, where the bridge service runs in a security context that enables the service to operate in the privileged user space. In various embodiments, a server may include a communications interface and a processor. The processor may be configured to receive an indication to perform a management action not within a native device management functionality. The processor may be further configured to invoke a bridge service running on the managed device to perform the action by sending a request via the communications interface, where the bridge service runs in a security context that enables the service to operate in the privileged user space.

SYNCHRONIZING DOCUMENT REPLICATION IN DISTRIBUTED SYSTEMS

Methods and apparatus, including computer program products, are provided for document synchronization. The method may include generating, by a controller, a first proxy object for a first document at a first system, the first system including the controller and the first proxy object; updating, by the controller, the first proxy object to include a replication status of the first document, when a creation, an update, and/or a deletion occurs at the first document. Related apparatus, systems, methods, and articles are also described.

CONNECTION REESTABLISHMENT PROTOCOL FOR PEER COMMUNICATION IN DISTRIBUTED SYSTEMS
20170366619 · 2017-12-21 ·

Communication resumption information can be retained nodes of a cluster of nodes that form a distributed computing system. The communication resumption information can be exchanged between a node of the cluster and a peer node of the cluster after resumption of communication following a loss of communication between the node and the peer node. A determination of whether communication between the node and the peer node can be reestablished without losing messages can include comparing the communication resumption information received by the node from the peer node with the communication resumption information retained at the node. Communication between the node and the peer node can be resumed based when the determining indicates that communication between the node and the peer node can be reestablished without losing messages.

Real Time Cloud Workload Streaming

A method and system for real-time cloud bursting is provided. The method and system are directed to extending a data center with cloud computing resources by decoupling computing resources and storage devices in a virtualized data center, and booting the decoupled computing resources in a staged process while storage devices are divided and prioritized into components. Data and boot instructions are re-routed and cached as needed through a proxy system.

MULTI-TIER DYNAMIC DATA CACHING

A dynamic cache engine designed to perform advanced, dynamic, application-specific data caching, based on multiple application and user parameters included in client requests that are sent to a server.

METHOD OF CONTROLLING A VIRTUAL MACHINE, INFORMATION PROCESSING APPARATUS AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
20170366638 · 2017-12-21 · ·

A method of controlling a first virtual machine and a second virtual machine, the method includes detecting that the second virtual machine is in a suspended state, storing one or more first packets into a first buffer during the suspended state, inputting the one or more first packets stored in the first buffer into a second buffer after the suspended state is ended, generating one or more second packets by replicating the one or more first packets input from the first buffer to the second buffer, transmitting the one or more first packets stored in the second buffer to the first virtual machine, and transmitting the one or more second packets to the second virtual machine.

DOCUMENT ARCHITECTURE WITH FRAGMENT-DRIVEN ROLE-BASED ACCESS CONTROLS

A document production system may construct a document from fragments based on a theme associated with the document. The theme may contain section(s), each section having an access control list (ACL) associated therewith. The ACL may specify role-based user group(s) and permission(s) for the role-based user group(s). The system may evaluable rules applicable to the document. At least one rule may pertain to the ACL(s). The evaluation may include, at least in part, utilizing user login information received over a network from a client device. In constructing the document, the system may assemble the document in accordance with the rules and utilizing the fragments and meta information that describes the document. The system may render the document thus assembled utilizing the ACL, generate a view of the document, and communicate the view of the document over the network to the client device for presentation on the client device.