Abstract:
Enterprise administrators in a cloud-based environment including a cloud-based server and a repository can selectively impose permissions on items (e.g., files and folders) marked for synchronization (“sync items”). The sync items can be synchronized with the client devices of users by downloading the items along with the permission attributes from the cloud-based server. However, the permissions on those sync items means that any unpermitted changes to the local copies of the sync items do not get uploaded to the cloud-based server. A synchronization client on the client devices detects any changes made locally to the sync items that are not consistent with the permission attributes, and repairs those changes so that the sync items are restored to their most recent states. This ensures that any unauthorized changes made to sync items remain local and do not propagate by the synchronization process to other users.
Abstract:
An original UI configuration is formed by a combination of a first user interface structural component portion, a first user interface style code portion, and a first behavioral code portion. When a variation of the first UI feature or a new feature is to be implemented, a second UI configuration is deployed, where the second UI configuration is formed by a second user interface structural component portion, a second user interface style code portion, and a second behavioral code portion. The second UI configuration implements a variation of the first UI feature. Embodiments deploy a third UI configuration formed by the second user interface structural component portion, a third user interface style code portion, and the second behavioral code portion. The third UI configuration emulates the original UI configuration using the second behavioral code portion. The third configuration or the second configuration can be enabled based on a software switch.
Abstract:
Systems and methods of maintaining a horizontally scaled database based on data ownership for a cloud-based platform (e.g., cloud-based collaboration and/or storage platform/service) are disclosed. The system database comprises multiple shard databases, and all files and folders owned by a user are stored on a single shard database. When a user transfers ownership of a file and/or a folder to a second user, the transferred file and/or folder is stored on the shard database that stores all of the data for the second user.
Abstract:
Systems and methods are disclosed for facilitating remote key management services in a collaborative cloud-based environment. In one embodiment, the remote key management architecture and techniques described herein provide for local key encryption and automatic generation of a reason code associated with content access. The reason code is logged by a hardware security module which is monitored by a remote client device (e.g., an enterprise client) to control a second (remote) layer of key encryption. The remote client device provides client-side control and configurability of the second layer of key encryption.
Abstract:
A cloud-based environment is configured to interface with storage devices that store 3D object models and a 3D rendering code base that is accessible by two or more user devices over a network using browsers or web agents. A web application is delivered to the user device, whereupon the browser or agent receives the 3D object model and the 3D rendering code into a web application that has user controls for defining at least one 3D scene that is rendered using user-defined camera shots and events associated with the 3D object model. User interactions invoke executable event handler components and executable shot components that correspond to one or more camera shots. User controls serve to invoke generation of custom event handler components and executable shot components. A preview of the 3D scene is presented by rendering the shots and events in a web browser or web agent.
Abstract:
Techniques are disclosed for a web or mobile interface enabling users and collaborators to simultaneously comment, edit, or edit content in real time or near real time managed by a cloud-based collaboration platform. In one embodiment, the data to be accessed concurrently is presented or depicted at the multiple physical devices to the collaborators for viewing and accessing the data in real time or near real time. Each of the collaborators is able to view, re-edit, or re-modify in a concurrent fashion, at the collaborator's physical device, edits or modifications made to the data in real time or near real time as a result of any of the other collaborators accessing the data at their respective physical devices. In some instances, additional collaborators are specifiable for the data created for concurrent real time access in addition to those originally associated with the folder.
Abstract:
Systems for computer code development and maintenance. Embodiments select one or more sections of source code, then modify the sections of source code by adding marker code where the marker code is executed when respective marked source code is executed. The marked source code is deployed, and a logging facility receives log messages responsive to the execution of marked source code. A comparison facility is used to identify active code based on the receipt of the log messages. A service can be invoked to remove marker code from the active code identified by one or more log messages. Remaining marked code can be deemed as inactive suspects. Additional steps can process the inactive suspects to identify inactive or “dead code” code based on expiration of a time period during which the “dead code” did not emit any log messages. A further step can remove “dead code” from a code base.
Abstract:
Techniques are disclosed for race condition handling in a system which incrementally updates clients with what occurred in a cloud-enabled platform. In one embodiment, a method comprises, in response to an event received at a synchronization client which indicates a modification to an item, comparing a sequence identifier of the item in the event with a current sequence identifier of the item. The sequence identifier of the item can be numeric and can monotonically increase as a state of the item changes. The method further comprises, if the sequence identifier in the event is larger than the current sequence identifier of the item, determining a difference between the item's state as represented in the event and a current state of the item; and, based on the difference, generating at least one synchronization step to update the current state of the item to the item's state as represented in the event.
Abstract:
A system for client-server web applications is disclosed. Operations commence upon opening a client-server session configurable to establish a full-duplex persistent network communications between a client device and a server, then receiving an indication to upload or download one or more files or objects over the full-duplex persistent network communications.
Abstract:
A heavy load protective pad for use on industrial slings includes fasteners on a sleeve forming member which are secured together to encircle and secure the protective pad on an industrial sling at a desired location. Pockets formed in the protective pad house a pair of magnets which help the pad stay in place while attached to metal surfaces and a pair of block spacers which, in one configuration, serve to space the protective pad and underlying sling away from the load which is being lifted or pulled.