H04L67/1072

Deduplicated data distribution techniques

In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.

Highly available virtual internet protocol addresses as a configurable service in a cluster

A computer program product, system, and computer implemented method comprises a multi-layered approach to virtual IP address assignment, where a managing computing node may control the generation of virtual IP addresses and assignment thereof to respective computing nodes, and where each respective computing node can control the allocation and binding of those virtual IP addresses to applications for the virtual IP addresses assigned to that computing node. Furthermore, in some embodiments, the approach includes a process to re-allocate virtual IP addresses to rebalance resources already allocated to a computing node and to address changing conditions.

Sharing of Data with Applications
20220318198 · 2022-10-06 ·

A user may, when using an application of a first computing device, intend to share data with other computing devices. To share the data, sharing processes may be performed by the first computing device, any device that the data is to be shared with, and one or more network locations. The sharing processes may determine whether the data is available at any of the devices or at any of the one or more network locations. Any device or network location where the data is available may be selected as a source of the data. Any device where the data is unavailable may be sent the data from one or more sources. Once received, the data may be stored to enable access by an application.

Peer to Peer Remote Application Discovery
20220210223 · 2022-06-30 ·

Methods, systems, and computer-readable media for peer to peer discovery of remote applications are presented. A client device may discover available remote peers and remotely access applications hosted thereon. The client device may send a discovery message over a network and locate one or more peer devices with available remote access. The peer device may respond with a list including applications installed and currently executing application instances that the client device may remotely access. The peer device may dynamically generate the list based on analyzing applications installed on the peer device and application instances executing on the peer device. The client device may initiate remote access of a selected application hosted on the peer device. The peer device may execute the selected application in a remote mode by hooking input and output interfaces associated with the application, and the application may be executed in a shadow desktop environment. These and other features will be discussed further herein.

Information processing apparatus, information processing method, and program

To more appropriately perform a consensus processing regarding update of a peer-to-peer database. There is provided an information processing apparatus including: an acquiring unit that acquires a value indicating an influence of a user; and a consensus processing unit that performs consensus processing regarding update of a P2P database on the basis of the value indicating the influence.

Sharing of data with applications
11392552 · 2022-07-19 · ·

A user may, when using an application of a first computing device, intend to share data with other computing devices. To share the data, sharing processes may be performed by the first computing device, any device that the data is to be shared with, and one or more network locations. The sharing processes may determine whether the data is available at any of the devices or at any of the one or more network locations. Any device or network location where the data is available may be selected as a source of the data. Any device where the data is unavailable may be sent the data from one or more sources. Once received, the data may be stored to enable access by an application.

HIGHLY AVAILABLE VIRTUAL INTERNET PROTOCOL ADDRESSES AS A CONFIGURABLE SERVICE IN A CLUSTER

A computer program product, system, and computer implemented method comprises a multi-layered approach to virtual IP address assignment, where a managing computing node may control the generation of virtual IP addresses and assignment thereof to respective computing nodes, and where each respective computing node can control the allocation and binding of those virtual IP addresses to applications for the virtual IP addresses assigned to that computing node. Furthermore, in some embodiments, the approach includes a process to re-allocate virtual IP addresses to rebalance resources already allocated to a computing node and to address changing conditions.

Communication system and method
11068548 · 2021-07-20 · ·

In a first embodiments a system for communication between at least two nodes is disclosed. The system comprises a first system accessing component that is configured to generate for a first node first node data, wherein the first node data comprises: first node identification data and first node network data comprising a node proximity with each of at least one third nodes directly connected with the first node; and at least a second system accessing component that is configured to generate for a second node second node data, wherein the second node data comprises: second node identification data and second node network data comprising a node proximity with each of at least one third nodes directly connected with the second node; and a database configured to receive and store: the first node data associated with the first node and the second node data associated with the second node and third node data associated with each of the third nodes wherein the third node data comprises third node identification data and third node network data and wherein the third node network data comprises at least one node proximity of the respective third node with at least one further node of the system directly connected to the respective third node; and a processing device that is configured to access the database and calculate a node proximity between each of the nodes of the system by considering the first node data, the second node data and the third node data; wherein the system is configured upon triggering by the first node to generate associated to the first node at least one communication object, each communication object comprising: at least one communication condition and at least one communication threshold; and wherein the data processing device is configured to calculate a communication score between the first node and the at least one second node for a communication object based on the first node data and the second node data and the said communication object; wherein the system is configured to communicate or make accessible the communication object to the at least one second node based on the communication score between the first node and the second node and the at least one communication threshold of the communication object. In a second embodiment, a respective method that can be carried out by the system is disclosed.

Sharing of Data with Applications
20210255990 · 2021-08-19 ·

A user may, when using an application of a first computing device, intend to share data with other computing devices. To share the data, sharing processes may be performed by the first computing device, any device that the data is to be shared with, and one or more network locations. The sharing processes may determine whether the data is available at any of the devices or at any of the one or more network locations. Any device or network location where the data is available may be selected as a source of the data. Any device where the data is unavailable may be sent the data from one or more sources. Once received, the data may be stored to enable access by an application.

TIERED ACCESS-ORIENTED BLOCKCHAIN ARCHITECTURE
20210258372 · 2021-08-19 ·

In one embodiment, a method for maintaining a blockchain in a blockchain system is disclosed. The method may include determining whether a number of blocks included in the blockchain satisfies a threshold block condition. The blocks comprise an initial genesis block and one or more subsequent blocks. The method may also include, responsive to determining the number of blocks in the blockchain satisfies the threshold block threshold condition, determining whether a number of nodes participating in the blockchain system satisfies a threshold node condition. The method may also include, responsive to determining the number of nodes participating in the blockchain satisfies the threshold node condition, generating a subsequent genesis block by hashing the blockchain including the genesis block and the one or more subsequent blocks.