H04L67/1019

Systems and methods of providing access to secure data

The disclosed technology includes techniques for secure access to data associated with an organization and includes providing a user device access to a user interface that is configurable by a user of the user device to execute function requests. Upon receipt of a function request, a router can randomly select an available computer from a computer cluster to execute the function. The computer can access a predetermined portion of the organization's data, generate an output by executing the requested function based on the predetermined portion of the organization's data, and transmit the output to the user device.

Systems and Methods for Server Failover and Load Balancing
20190158585 · 2019-05-23 ·

Systems and methods for server failover and/or load balancing are provided herein. Systems for server failover and load balancing may include a computer system in electronic communication over a network with one or more client applications, the computer system including a plurality of servers, and an engine stored on and executed by a client, the engine configured to allow one or more clients to select a target server among the plurality of servers using a client application identifier.

Randomization function and its application in load balancing

A load balancing device and method are provided. The load balancing device includes a processor. The processor is configured to receive a plurality of tasks from a plurality of user devices, each of the plurality of tasks involving a respective one of multiple sets of sessions. The processor is further configured to generate a task ID for each of the plurality tasks using a randomization function, at least one task ID for at least one of the plurality of tasks changing over time responsive to one or more criterion. The processor is additionally configured to allocate the plurality of tasks amongst a set of worker entities such that all the sessions involved in the plurality of tasks received from a respective same one of the plurality of user devices is assigned to a same one of the worker entities in the set.

System and method for cloud-based analytics

A system and method in accordance with example embodiments may include systems and methods for a cloud-based analytics platform. The cloud-based analytics platform may allow the manual and automatic uploading to and/or downloading from a cloud server. The platform may include single sign-on (SSO) capabilities such that a user may have one set of credentials to access data from the cloud-based analytics and/or data stored locally. The platform may include data validation and processing in order to provide real-time feedback on uploads based on file type, file size, access rights, extracted data, and transformed data.

System and method for cloud-based analytics

A system and method in accordance with example embodiments may include systems and methods for a cloud-based analytics platform. The cloud-based analytics platform may allow the manual and automatic uploading to and/or downloading from a cloud server. The platform may include single sign-on (SSO) capabilities such that a user may have one set of credentials to access data from the cloud-based analytics and/or data stored locally. The platform may include data validation and processing in order to provide real-time feedback on uploads based on file type, file size, access rights, extracted data, and transformed data.

SYSTEM AND METHOD FOR CLOUD-BASED ANALYTICS

A system and method in accordance with example embodiments may include systems and methods for a cloud-based analytics platform. The cloud-based analytics platform may allow the manual and automatic uploading to and/or downloading from a cloud server. The platform may include single sign-on (SSO) capabilities such that a user may have one set of credentials to access data from the cloud-based analytics and/or data stored locally. The platform may include data validation and processing in order to provide real-time feedback on uploads based on file type, file size, access rights, extracted data, and transformed data.

SHARING CRYPTOGRAPHIC SESSION KEYS AMONG A CLUSTER OF NETWORK SECURITY PLATFORMS MONITORING NETWORK TRAFFIC FLOWS
20240283633 · 2024-08-22 ·

An example apparatus disclosed herein is to select a first network security platform based on a first value associated with a first message associated a client and a second value associated with a second message associated with a server, the first message and the second message associated with establishment of an encrypted network traffic flow between the client and the server. The disclosed example apparatus is also to cause a cryptographic session key associated with the encrypted network traffic flow to be sent to the first network security platform.

System and method for an improved high availability component implementation

The invention relates to a computer system and method for high availability processing through a session on a transport connection, for use in a cluster with at least two nodes. The system comprises a protocol component; a cluster with at least two nodes, said cluster being arranged for running the protocol component; and a server arranged for maintaining a protocol session on a transport connection with a node of the cluster. The cluster is arranged for maintaining on each of said at least two nodes one instance of the protocol component, so that at least two instances are active; the server is arranged for simultaneously maintaining a protocol session with each instance.

Random next iteration for data update management
10148744 · 2018-12-04 · ·

Host machines and other devices performing synchronized operations can be dispersed across multiple racks in a data center to provide additional buffer capacity and to reduce the likelihood of congestion. The level of dispersion can depend on factors such as the level of oversubscription, as it can be undesirable in a highly connected network to push excessive host traffic into the aggregation fabric. As oversubscription levels increase, the amount of dispersion can be reduced and two or more host machines can be clustered on a given rack, or otherwise connected through the same edge switch. By clustering a portion of the machines, some of the host traffic can be redirected by the respective edge switch without entering the aggregation fabric. When provisioning hosts for a customer, application, or synchronized operation, for example, the levels of clustering and dispersion can be balanced to minimize the likelihood for congestion throughout the network.

Request-Driven File Pulling From Unsynchronized Directories
20180336196 · 2018-11-22 · ·

Request-driven file pulling from unsynchronized directories is described. Rather than maintaining entire files, a service provider merely maintains file tags which describe the files in unsynchronized directories of devices associated with a user and communicates the file tags to the devices. The file tags enable indications of the files to be presented so that selected files can be pulled from the unsynchronized directories. Based on user selections made at a first of the devices to pull files from a second of the devices, requests are communicated from the first device to the service provider for the selected files. Responsive to a request, the service provider communicates an indication to the second device to copy the selected file from the second device's unsynchronized directory to a synchronized directory. Responsive to this, the service provider obtains the file from the synchronized directory and delivers the file to the first device.