H04L67/561

MESH-AWARE STORAGE SYSTEMS

A storage system proxy associated with a storage system may receive a service mesh policy used by a service mesh. The storage system may include a storage system proxy. The service mesh may include a control plane and a data plane. The data plane may include proxies associated with respective services. The control plane may configure the proxies according to the service mesh policy. The data plane may include the proxies communicating with each other, as configured by the control plane, to relay exchanges between the services. The storage system proxy may communicate with the storage system to configure a volume based on the service mesh policy received from the service mesh. The volume may be exposed to the data plane.

MESH-AWARE STORAGE SYSTEMS

A storage system proxy associated with a storage system may receive a service mesh policy used by a service mesh. The storage system may include a storage system proxy. The service mesh may include a control plane and a data plane. The data plane may include proxies associated with respective services. The control plane may configure the proxies according to the service mesh policy. The data plane may include the proxies communicating with each other, as configured by the control plane, to relay exchanges between the services. The storage system proxy may communicate with the storage system to configure a volume based on the service mesh policy received from the service mesh. The volume may be exposed to the data plane.

Managing voice applications within a digital workspace
11706217 · 2023-07-18 · ·

Disclosed are various embodiments for managing voice-driven application. In one embodiment, among others, a system includes a computing device and program instructions. The program instructions can cause the computing device to initiate a management session between a voice application service and a management service based on receiving a first request from the voice application service. The program instructions can cause the computing device to initiate an application session between a voice-driven application and the management service based at least in part on a second request received from the voice application service. The program instructions can cause the computing device to enforce a compliance policy on a data request for the voice-driven application. The data response can be transmitted to the voice application. The voice application service can provide the data response to the client device for playback.

Managing voice applications within a digital workspace
11706217 · 2023-07-18 · ·

Disclosed are various embodiments for managing voice-driven application. In one embodiment, among others, a system includes a computing device and program instructions. The program instructions can cause the computing device to initiate a management session between a voice application service and a management service based on receiving a first request from the voice application service. The program instructions can cause the computing device to initiate an application session between a voice-driven application and the management service based at least in part on a second request received from the voice application service. The program instructions can cause the computing device to enforce a compliance policy on a data request for the voice-driven application. The data response can be transmitted to the voice application. The voice application service can provide the data response to the client device for playback.

Systems and methods for managing privacy policies using machine learning

Systems, methods, and devices for managing privacy policies are disclosed. In one embodiment, a method for management of a user's privacy preferences may include: identifying a computer application installed on a user electronic device, or a website accessed using a browser executed by the user electronic device; retrieving a privacy policy document analysis for a privacy policy document associated with the computer application or the website, the privacy policy document analysis comprising a valuation of a plurality of privacy policy segments within the privacy policy document; receiving a privacy preference analysis for the user, the privacy preference analysis comprising a valuation of a plurality of privacy preferences for the user; identifying a recommended action in response to the valuation of one of the privacy policy segments being outside the scope of the valuation of one of the plurality of privacy preferences; and executing the recommended action.

Security zone policy enforcement in a cloud infrastructure system

A cloud-based security solution that provides a robust and secure framework for managing and enforcing security policies related to various resources managed in the cloud is disclosed. The cloud-based security solution is implemented by a security zone policy enforcement system in a cloud service provider infrastructure. The system receives a request to perform an operation on a resource and determines a compartment associated with the resource. The system determines that the compartment is associated with a security zone and determines a set of one or more security zone policies applicable to the resource. The system then determines that the operation on the resource is permitted based on the set of one or more security zone policies and responsive to determining that the operation on the resource is permitted, allows the operation to be performed on the resource.

COMMAND SERVICES MANAGER FOR SECURE SHARING OF COMMANDS TO REGISTERED AGENTS
20230013916 · 2023-01-19 ·

A command services manager of a control device can receive a command from a user interface device and provide for the storing and sharing of the command with one or more service providers so as to provide an improved user experience. Media service providers can register with a network resource associated with the command services manager. The command can be encrypted and stored locally at the control device or remotely at a network resource and be sent to a registered media service provider so that the media service provider can provide improved search responses and/or customize the interaction with the user, recommendation of content availability from other service providers, etc. The command services manager can also receive notifications from the media service provider and provide the notifications to the user, for example, notifications indicative of the success or failure of a command.

Systems and methods for aggregation of cloud storage
11558450 · 2023-01-17 · ·

The present disclosure describes systems and methods for aggregation and management of cloud storage among a plurality of providers. In a first aspect, the invention is directed to file distribution and management across multiple cloud services via a storage manager. The storage manager may aggregate third-party cloud storage provider accounts into a single cloud storage space and load balance files among the third party-accounts as necessary. In one implementation, the storage manager may act as an intermediary, and files may be transferred by the client to the storage manager, which may select and forward the files to a third-party storage provider. File retrieval may be performed similarly, with the client requesting a file from the intermediary storage manager, which may retrieve the file from the corresponding third-party storage provider and forward the file to the client device.

Systems and methods for aggregation of cloud storage
11558450 · 2023-01-17 · ·

The present disclosure describes systems and methods for aggregation and management of cloud storage among a plurality of providers. In a first aspect, the invention is directed to file distribution and management across multiple cloud services via a storage manager. The storage manager may aggregate third-party cloud storage provider accounts into a single cloud storage space and load balance files among the third party-accounts as necessary. In one implementation, the storage manager may act as an intermediary, and files may be transferred by the client to the storage manager, which may select and forward the files to a third-party storage provider. File retrieval may be performed similarly, with the client requesting a file from the intermediary storage manager, which may retrieve the file from the corresponding third-party storage provider and forward the file to the client device.

SERVICE-AWARE GLOBAL SERVER LOAD BALANCING

Example methods and systems for service-aware global server load balancing are described. One example may involve a first load balancer receiving, from a client device, a request to access a service associated with an application deployed in at least a first cluster and a second cluster. In response to determination that a first pool in the first cluster is associated with an unhealthy status, the first load balancer may identify a second pool implementing the service in the second cluster, the second pool being associated with a healthy status and includes one or more second backend servers selectable by a second load balancer to process the request. Failure handling may be performed by interacting with the client device, or the second load balancer, to allow the client device to access the service implemented by the second pool in the second cluster.