Patent classifications
H04L67/1097
COLLECTION FOLDER FOR COLLECTING FILE SUBMISSIONS
A content management system for collecting files from one or more authenticated submitters in a collection folder. A collector, who generates the collection folder, can invite one or more submitters to submit one or more files to the collection folder. The one or more submitters have limited rights to the collection folder. The limited rights can include uploading rights and prohibiting a submitter from viewing files that other submitters associated with the collection folder submitted. Thus, the collection folder is able to store files from the one or more submitters, but prevent them from viewing other's submissions.
DYNAMICALLY ASSIGNING STORAGE LOCATIONS FOR MESSAGING SYSTEM DATA
Method of dynamically assigning storage locations starts with the processor updating first user's home location data. Processor selects communication session between first user and second user and determines second user's home location data. Processor determines a session location data that indicates current storage location that stores data of communication session received from first and second client devices. Processor identifies available data storage locations based on first user and second user's home location data and determines whether to update the session location data based on an average of a distance over network fiber using the first user and second user's home locations, current storage location, and available storage locations. In response to determining to update the session location data, processor updates session location data to indicate one of the available storage locations, and causes transfer of data of communication session to one of the available storage locations. Other embodiments are described.
SYSTEMS AND METHODS FOR BREACH-PROOF, RESILIENT, COMPLIANT DATA IN A MULTI-VENDOR CLOUD ENVIRONMENT AND AUTOMATICALLY SELF HEALS IN THE EVENT OF A RANSOMWARE ATTACK
A cloud-based system for securely storing data, the system having a processor which obtains a source data file; splits it into at least three fragments; and uses an encryption key associated with the fragments to encrypt the fragments and distributes the encrypted fragments among at least three cloud storage providers, creates a pointer file containing information for retrieving the encrypted fragments. When a system user requests access to the data, the system uses the information stored in the pointer file to retrieve the stored encrypted fragments from the plurality of clouds; decrypts the fragments and reconstructs the data, and provides data access to the system user.
FLEXIBLE REMOTE DIRECT MEMORY ACCESS
Apparatus and methods are disclosed herein for remote, direct memory access (RDMA) technology that enables direct memory access from one host computer memory to another host computer memory over a physical or virtual computer network according to a number of different RDMA protocols. In one example, a method includes receiving remote direct memory access (RDMA) packets via a network adapter, deriving a protocol index identifying an RDMA protocol used to encode data for an RDMA transaction associated with the RDMA packets, applying the protocol index to a generate RDMA commands from header information in at least one of the received RDMA packets, and performing an RDMA operation using the RDMA commands.
MEMORY POOLING BETWEEN SELECTED MEMORY RESOURCES
Apparatuses, systems, and methods related to memory pooling between selected memory resources are described. A system using a memory pool formed as such may enable performance of functions, including automated functions critical for prevention of damage to a product, personnel safety, and/or reliable operation, based on increased access to data that may improve performance of a mission profile. For instance, one apparatus described herein includes a memory resource, a processing resource coupled to the memory resource, and a transceiver resource coupled to the processing resource. The memory resource, the processing resource, and the transceiver resource are configured to enable formation of a memory pool between the memory resource and another memory resource at another apparatus responsive to a request to access the other memory resource transmitted from the processing resource via the transceiver.
Distributed Computing based on Memory as a Service
Systems, methods and apparatuses of distributed computing based on memory as a service are described. For example, a set of networked computing devices can each be configured to execute an application that accesses memory using a virtual memory address region. Each respective device can map the virtual memory address region to the local memory for a first period of time during which the application is being executed in the respective device, map the virtual memory address region to a local memory of a remote device in the group for a second period of time after starting the application in the respective device and before terminating the application in the respective device, and request the remote device to process data in the virtual memory address region during at least the second period of time.
Distributed Computing based on Memory as a Service
Systems, methods and apparatuses of distributed computing based on memory as a service are described. For example, a set of networked computing devices can each be configured to execute an application that accesses memory using a virtual memory address region. Each respective device can map the virtual memory address region to the local memory for a first period of time during which the application is being executed in the respective device, map the virtual memory address region to a local memory of a remote device in the group for a second period of time after starting the application in the respective device and before terminating the application in the respective device, and request the remote device to process data in the virtual memory address region during at least the second period of time.
Data Object Delivery for Distributed Cluster Computing
Methods and systems for delivering data for cluster computing are described herein. A worker device may receive a dataset and store the dataset in a local storage media. This may prevent the need for the dataset to be sent over a network each time the applications are used to perform a task. Each application may be able to access the dataset in the local storage area. This may prevent the need to copy the dataset to memory associated with each application. A worker device may store a dataset, for example, if it determines that the frequency of updates to the dataset satisfy a threshold. The worker device may receive updates to the dataset via a messaging system and may store the updated data in the local storage media.
Data Object Delivery for Distributed Cluster Computing
Methods and systems for delivering data for cluster computing are described herein. A worker device may receive a dataset and store the dataset in a local storage media. This may prevent the need for the dataset to be sent over a network each time the applications are used to perform a task. Each application may be able to access the dataset in the local storage area. This may prevent the need to copy the dataset to memory associated with each application. A worker device may store a dataset, for example, if it determines that the frequency of updates to the dataset satisfy a threshold. The worker device may receive updates to the dataset via a messaging system and may store the updated data in the local storage media.
IMPLEMENTING A FAULT-TOLERANT MULTI-NRF NETWORK TOPOLOGY
A system, apparatus, method, and non-transitory computer readable medium for implementing a fault-tolerant multi-NRF network topology may include a network repository function (NRF) device including: at least one processor configured to execute computer readable instructions to cause the NRF device to, broadcast a NRF query to a NRF cluster of a core network, the NRF cluster including a plurality of NRF devices located in a public land mobile network (PLMN); receive NRF query responses from each NRF device of the NRF cluster, the NRF query responses including network configuration information of each NRF device; determine a status of each NRF device based on the network configuration information; determine a list of network function (NF) devices registered with the NRF cluster; receive a NF query request from a first NF device; and transmit a NF query response to the first NF device.