G06F16/17

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES WITH RECORD OBJECTS BASED ON ENTITY RELATIONSHIPS

The present disclosure relates to systems and methods for matching electronic activities with record objects based on entity relationships. The method can include accessing a plurality of electronic activities, identifying an electronic activity, identifying a first participant associated with a first entity and a second participant associated with a second entity, determining whether a record object identifier is included in the electronic activity, identifying a first record object of the system of record that includes an instance of the record object identifier, and storing an association between the electronic activity and the first record object. The method can include determining a second record object corresponding to the second entity, identifying, using a matching policy, a third record object linked to the second record object and identifying a third entity, and storing, by the one or more processors, an association between the electronic activity and the third record object.

Virtualized file server smart data ingestion

In one embodiment, a system for managing a virtualization environment includes a set of host machines, each of which includes a hypervisor, virtual machines, and a virtual machine controller, and a data migration system configured to identify one or more existing storage items stored at one or more existing File Server Virtual Machines (FSVMs) of an existing virtualized file server (VFS). For each of the existing storage items, the data migration system is configured to identify a new FSVMs of a new VFS based on the existing FSVM, send a representation of the storage item from the existing FSVM to the new FSVM, such that representations of storage items are sent between different pairs of FSVMs in parallel, and store a new storage item at the new FSVM, such that the new storage item is based on the representation of the existing storage item received by the new FSVM.

Monitoring changes to data items using associated metadata

Embodiments are directed towards managing and tracking item identification of a plurality of items to determine if an item is a new or existing item, where an existing item has been previously processed. In some embodiments, two or more item identifiers may be generated. In one embodiment, generating the two or more item identifiers may include analyzing the item using a small item size characteristic, a compressed item, or for an identifier collision. The two or more item identifiers may be employed to determine if the item is a new or existing item. In one embodiment, the two or more item identifiers may be compared to a record about an existing item to determine if the item is a new or existing item. If the item is an existing item, then the item may be further processed to determine if the existing item has actually changed.

Data loss prevention
11580248 · 2023-02-14 · ·

Techniques for providing data loss prevention, including data exfiltration prevention and crypto-ransomware prevention, are provided. In some embodiments, a slack-space file system is created by using a modified packing algorithm to increase and/or optimize an amount of slack space created by files stored in a standard file system. A program for accessing and indexing the slack-space file system may be stored, and requests by a user to store data on a storage medium of a computer system may cause the information to be stored in the slack-space file system, where it may be protected from destructive malware that operates solely on the standard file system. In some embodiments, sensitive information may be hidden by storing the information in an alternate data stream of a file and by replacing the information in the unnamed data stream of the file with non-sensitive information that may appear to be sensitive.

Multidirectional synchronization of cloud application data
11580073 · 2023-02-14 · ·

In embodiments, application data is received from multiple application platforms. Once received, an object mapping is used to determine a synchronization data object that is mapped to data objects from the application data. A function mapping is used to determine one or more functions to apply to the application data. Data objects from the application data that are mapped to the synchronization data object are compared to detect conflicts between fields. In response to detecting a conflict, the conflict is resolved based on configuration rules that indicate priority between fields of different data objects. Once the conflict is resolved, the data objects are merged into a modified synchronization data object that represents an updated version of the synchronization data object. Changes between the synchronization data object and the modified synchronization data object are identified and propagated to application platforms to perform updates to application data managed by the application platforms.

Apparatus for securing storage space and method thereof
11580063 · 2023-02-14 · ·

The electronic device includes a display, a memory, and a processor operatively coupled to the display and the memory. The processor is configured to identify a residual level of a storage space of the memory, in response to the residual level of the storage space of the memory being less than a predefined threshold value, control the display to display a file converting scheme list including a plurality of file converting schemes, select one file converting scheme among the plurality of file converting schemes, based on a received input, and perform file converting, based on the selected file converting scheme.

Preventing DBMS deadlock by eliminating shared locking

A DBMS receives a database-access request that includes an instruction to non-destructively read a database table row. The DBMS assigns the request a TSN identifier and creates a TSN image that identifies all TSNs assigned to transactions that are not yet committed. The DBMS traverses a linked list of log entries that identifies a chronological history of transactions performed on the same row. The DBMS infers that the table row currently contains data stored by the most recently logged transaction that is not contained in the TSN image and that has thus been committed. The DBMS then continues to process statements of the transaction based on the assumption that the row contains the inferred value. The DBMS performs this procedure without acquiring a shared lock on the data page or on the index leaf page that points to the table row.

Methods and apparatuses for generating redo records for cloud-based database

Methods and apparatuses in a cloud-based database management system are described. Data in a database are stored in a plurality of pages in a page store of the database. A plurality of redo log records are received to be applied to the database. The redo log records within a predefined boundary are parsed to determine, for each given redo log record, a corresponding page to which the given log record is to be applied. The redo log records are reordered by corresponding page. The reordered redo log records are stored to be applied to the page store of the database.

Systems and methods of providing fault-tolerant file access
11579785 · 2023-02-14 · ·

Technologies are provided to ensure integrity of erasure coded data that is subject to read and write access from distributed processes. Multiple processes that access erasure coded data can be coordinated in an efficient, scalable and fault-tolerant manner so that integrity of the original data is maintained. The Technologies include a fault-tolerant access coordination protocol that ensures exclusive write access by a client. The coordination protocol achieves scalability by not relying on centralized components, and achieves efficiency and performance by piggy-packing access coordination messages on operations of the underlying erasure coding protocol.

Displaying a textual message based on configuration of the user equipment
11582344 · 2023-02-14 · ·

In various aspects, a system that receives a first message, wherein the first message comprises a communication device identification and a feature tag having a language indication that indicates a language configuration of a user equipment. In response to the receiving the first message, storing the language indication and associating the language indication with the communication device identification. The system determines whether an incoming call is not authenticated and in response to the determining that the incoming call is not authenticated, transmitting a textual message to the communication device using the language configuration to indicate the incoming call is not authenticated.