Patent classifications
H04L67/1042
Data mesh visualization
In various example embodiments, a system and method for data mesh visualization are presented. An avatar representation of a user is generated. A user-specified change to the avatar representation is received and the avatar representation is changed based on the user-specified change. A current status of the user is determined, and an updated avatar representation is generated based on the current status of the user. The updated avatar is displayed in association with a communication of the user.
Visualizing network traffic plans based on egress peer engineering
A traffic planning platform may receive information related to a traffic flow including a traffic bandwidth to transport through a network with various network devices interconnected by links. The traffic planning platform may generate a traffic plan by assigning the traffic flow to a set of the links that includes network resources connecting a source of the traffic flow to a destination of the traffic flow. The traffic planning platform may render a visualization of the traffic plan, wherein the visualization includes a user interface (e.g., a diagram, an animation, and/or the like) in which geometric shapes that represent the source, the peer link, and the destination are connected by bands that represent the tunnel and the external route and further in which the geometric shapes and the bands each have a first visual property and a second visual property based on the traffic bandwidth of the traffic flow.
Visualizing network traffic plans based on egress peer engineering
A traffic planning platform may receive information related to a traffic flow including a traffic bandwidth to transport through a network with various network devices interconnected by links. The traffic planning platform may generate a traffic plan by assigning the traffic flow to a set of the links that includes network resources connecting a source of the traffic flow to a destination of the traffic flow. The traffic planning platform may render a visualization of the traffic plan, wherein the visualization includes a user interface (e.g., a diagram, an animation, and/or the like) in which geometric shapes that represent the source, the peer link, and the destination are connected by bands that represent the tunnel and the external route and further in which the geometric shapes and the bands each have a first visual property and a second visual property based on the traffic bandwidth of the traffic flow.
System for identity-based exposure detection in peer-to-peer platforms
Systems, computer program products, and methods are described herein for identity-based exposure detection in peer-to-peer (P2P) platforms. The present invention is configured to receive, from a computing device of a P2P platform, an indication that a user has initiated a P2P resource transfer request to a first entity; retrieve, from a computing device of the P2P platform, resource transfer information of the first entity based on at least the P2P resource transfer request; initiate a database query on a P2P knowledge repository using the resource transfer information of the first entity; determine a match between the resource transfer information of the first entity and at least one entity record in the P2P knowledge repository based on at least initiating the database query; and transmit a notification to the computing device of the P2P platform indicating that the first entity is known to be associated with misappropriate activity.
System for identity-based exposure detection in peer-to-peer platforms
Systems, computer program products, and methods are described herein for identity-based exposure detection in peer-to-peer (P2P) platforms. The present invention is configured to receive, from a computing device of a P2P platform, an indication that a user has initiated a P2P resource transfer request to a first entity; retrieve, from a computing device of the P2P platform, resource transfer information of the first entity based on at least the P2P resource transfer request; initiate a database query on a P2P knowledge repository using the resource transfer information of the first entity; determine a match between the resource transfer information of the first entity and at least one entity record in the P2P knowledge repository based on at least initiating the database query; and transmit a notification to the computing device of the P2P platform indicating that the first entity is known to be associated with misappropriate activity.
DECENTRALIZED NETWORK TOPOLOGY ADAPTATION IN PEER-TO-PEER (P2P) NETWORKS
Example methods and systems for decentralized network topology adaptation in a in a peer-to-peer (P2P) network are described. In one example, a first computer system may obtain first attribute information associated with the first computer system; and second attribute information associated with a second computer system. Based on the first and second attribute information, the first computer system may generate a connection confidence prediction associated with a connection between the first computer system and the second computer system. The connection confidence prediction may indicate whether the connection is a suboptimal connection associated with a suboptimal network topology. In response to determination that the connection confidence prediction satisfies a break condition, the first computer system may break the connection between the first computer system and the second computer system, but otherwise maintain the connection.
DECENTRALIZED NETWORK TOPOLOGY ADAPTATION IN PEER-TO-PEER (P2P) NETWORKS
Example methods and systems for decentralized network topology adaptation in a in a peer-to-peer (P2P) network are described. In one example, a first computer system may obtain first attribute information associated with the first computer system; and second attribute information associated with a second computer system. Based on the first and second attribute information, the first computer system may generate a connection confidence prediction associated with a connection between the first computer system and the second computer system. The connection confidence prediction may indicate whether the connection is a suboptimal connection associated with a suboptimal network topology. In response to determination that the connection confidence prediction satisfies a break condition, the first computer system may break the connection between the first computer system and the second computer system, but otherwise maintain the connection.
Message history display system and method
A technique for message history display includes combining message histories for multiple different messaging services. A system constructed according to the technique may include, for example, a message history database; a history aggregation engine that aggregates message logs for storage in the message history database; and a history provisioning engine that provides an aggregated message log associated with the user from the message history database to a requesting device. A method according to the technique may include, for example, identifying a device in association with a user profile; providing an online platform that receives messages from and sends messages to the device; and creating an aggregated log from messages sent to and from the device.
Method, system, and apparatus for enterprise wide storage and retrieval of large amounts of data
A scalable network of mobile data storage containers that are connected in peer-to-peer networks to archive large data storage capacities. The various embodiments provide a method of extracting a large amount of data from a variety of sources and storing the extracted data in mobile, storage units. The various embodiments provide storage units housed in mobile containers that can store multiple days/weeks of sensor data in the order of petabytes (1024 terabytes). The various embodiments, integrate high performance computing devices into the mobile storage containers that are able to perform critical extraction, pattern, and index processing on the sensor data. The various embodiments, provide a method for the efficient physical transport of the mobile storage containers from current locations to a center analysis location for re-connecting in another peer-to-peer network for integration into a central enterprise data warehouses.
Method, system, and apparatus for enterprise wide storage and retrieval of large amounts of data
A scalable network of mobile data storage containers that are connected in peer-to-peer networks to archive large data storage capacities. The various embodiments provide a method of extracting a large amount of data from a variety of sources and storing the extracted data in mobile, storage units. The various embodiments provide storage units housed in mobile containers that can store multiple days/weeks of sensor data in the order of petabytes (1024 terabytes). The various embodiments, integrate high performance computing devices into the mobile storage containers that are able to perform critical extraction, pattern, and index processing on the sensor data. The various embodiments, provide a method for the efficient physical transport of the mobile storage containers from current locations to a center analysis location for re-connecting in another peer-to-peer network for integration into a central enterprise data warehouses.