Patent classifications
H04L67/1046
JOINING AND DIMENSIONAL ANNOTATION IN A STREAMING PIPELINE
Disclosed are embodiments for providing batch performance using a stream processor. In one embodiment, a method is disclosed comprising receiving, at a stream processor, an event, the stream processor including a plurality of processing stages; generating, by the stream processor, an augmented event based on the event, the augmented event including at least one additional field not appearing in the event, the additional field generated by an operation selected from the group consisting of a join or dimensional annotation operation; and emitting, by the stream processor, the augmented event to downstream consumer.
Commissioning and decommissioning metadata nodes in a running distributed data storage system
In a running distributed data storage system that actively processes I/Os, metadata nodes are commissioned and decommissioned without taking down the storage system and without introducing interruptions to metadata or payload data I/O. The inflow of reads and writes continues without interruption even while new metadata nodes are in the process of being added and/or removed and the strong consistency of the system is guaranteed. Commissioning and decommissioning nodes within the running system enables streamlined replacement of permanently failed nodes and advantageously enables the system to adapt elastically to workload changes. An illustrative distributed barrier logic (the “view change barrier”) controls a multi-state process that controls a coordinated step-wise progression of the metadata nodes from an old view to a new normal. Rules for I/O handling govern each state until the state machine loop has been traversed and the system reaches its new normal.
MANAGING MULTICAST SCALING
Some examples relate to managing multicast scaling. In an example, a network device may receive a message to join an IP multicast group. The network device may determine whether a hardware filter is available on the network device to process the received message. In response to the determination that the hardware filter is not available on the network device to process the received message, current state of an IP multicast protocol associated with the message may be changed to an error state on the network device, wherein in the error state further messages to join an IP multicast group that are received by the network device are discarded by the network device.
ACCESS CONTROL IN A MESH NETWORK
A method including determining, by a first device in communication with a second device in a mesh network, an access policy associated with processing communications received from the second device; processing, by the first device based at least in part on the access policy, a first communication received from the second device over an exclusive meshnet connection between the first device and the second device; determining, by the first device, a change in the access policy associated with processing communications received from the second device; processing, by the first device based at least in part on the change in the access policy, a second communication received from the second device in real-time; and transmitting, by the first device to the second device, access policy information indicating the change in the access policy to the second device over the exclusive meshnet connection or via a relay server.
Decentralized management of software configurations
A peer-to-peer decentralized software configuration manager is described. The peer-to-peer system provides a crowdsourced mechanism to determine and recommend the efficient software configurations. A computer system may subscribe to a ring or group of network connected computers. Once subscribed, the computer system receives a ring data structure that may include one or more software configuration entries. The ring data structure is accessible to each subscribed computer system to the currently installed software configurations and document the relative success or failure of those configurations. The ring data structure may be utilized to identify a more efficient or user friendly software configuration that is currently installed and utilized by a subscribed computer system.
SECURE FORUM FACILITATOR IN CONTROLLED ENVIRONMENT
An forum facilitator device is provided that allows for a controlled environment to provide a secure forum for residents to provide communications to other registered users of the secure forum. The communications are provided through posts made in the secure forum and through other types of communications from the inmate such as but not limited to emails and text messages. The forum facilitator device operates the secure forum and implements rules to control what is posted on the secure forum, who is able to access the secure forum, and what entities are allowed to view and interact with residents of the controlled environment.
Methods and systems for integration of peer-to-peer (P2P) networks with content delivery networks (CDNS)
Disclosed herein are methods and systems for integrating peer-to-peer (P2P) networks with content delivery networks (CDNs). In an embodiment, a method for use in a network storage control peer (NSCP) supporting P2P operation includes receiving swarm stats from a tracker; determining, based on the received swarm stats, a P2P rarity associated with a content piece; and responsive to the determined P2P rarity, transmitting an upload request message to an ingestion gateway, wherein the upload request message indicates that the content piece is to be uploaded to a CDN.
Internet group management protocol host tracking
A computer network device (such as a switch or a router) that implement host tracking is described. During operation, the computer network device may receive a report message that is associated with a host, which indicates that the host wants to join a group in a network that receives an audio-video channel from a source. In response, the computer network device may add information associated with the host to a group data structure associated with one or more hosts in the group. Then, when the computer network device receives a leave message that is associated with the host, the computer network device may remove or deactivates the host from the group data structure. Moreover, when the group data structure is empty or has no active hosts, the computer network device may stop forwarding the audio-video channel from the source to the group without further delay.
Systems and methods to discover and notify devices that come in close proximity with each other
An electronic device of a first user is configured to: connect with a second electronic device of a second user of the plurality of electronic devices over a first peer-to-peer wireless network link when the second electronic device is within a communicable range of the first electronic device; receive from the second electronic device, a second unique code generated by the second electronic device, the second unique code including a second unique identifier of the second electronic device; store on the first electronic device: the second unique identifier; information associated with the proximity of the second electronic device; and information associated with the time when the second electronic device is within the communicable range of the first electronic device; and display a notification on the first electronic device when the second unique identifier is downloaded from a web server to the first electronic device.
Shared channel invitation paths
Computer-readable media, method, and system for inviting a plurality of users to a group-based communication channel within a group-based communication system. The plurality of users are invited by transmitting a respective plurality of invitations to the users upon a sending user instruction. The outcome of a user accepting an invitation may be determined based on an approval privilege of the user and a status of the group-based communication channel.