Abstract:
Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified metadata rules to metadata events. More specifically, the scalable architecture described herein uses metadata to drive automations and/or polices in a cloud-based environment. In one embodiment, the architecture integrates a metadata service with an event-based automation engine to automatically trigger polices and/or automations based on metadata and/or changes in metadata changes. The metadata service can include customizable and/or pre-build metadata templates which can be used to automatically apply a metadata framework (e.g., particular fields) to files based on, for example, the upload or placement of a particular file in a particular folder. The architecture also provides for advanced metadata searching and data classification.
Abstract:
Embodiments of the present disclosure include systems and methods for upload and/or download streaming encryption to/from an online service, or cloud-based platform or environment. The encryption process includes the following parts: Upload encryption, download decryption, and a central piece of infrastructure called the Interval Key Server (IKS). During both upload and download, the encryption and decryption processes are performed while the files are being uploaded/downloaded, (e.g., the files are being encrypted/decrypted as they are being streamed).
Abstract:
A reusable gasket may be configured for use between first and second collapsible containers of a shelter. The gasket may have a body configured to seal at least a portion of a seam defined between the first and second collapsible containers. The gasket may include at least one magnet embedded in the body. A reusable plug configured to be disposed into a cavity defined by a collapsible container may have a body configured to be compressibly secured in the cavity. The body of the plug may be made of compressible foam.
Abstract:
Systems and methods for disabling the self-referential appearance of a mobile application in an Intent via a background thread are disclosed. On the Android platform, an application such as a mobile application for providing access to a cloud environment or cloud based service including cloud-based storage and/or collaborative services, can serve as both a source and a target for a given Intent. In one implementation, such a mobile application that can receive and send the same Intent, can include a background service that detects when the Intent is about to be issued, and unregisters the application to prevent the application from receiving the Intent. When a target application for handling the Intent is identified, the background service re-registers the application to receive the Intent.
Abstract:
Techniques are disclosed for a web or mobile interface enabling users and collaborators to simultaneously comment, edit, or edit content in real time or near real time managed by a cloud-based collaboration platform. In one embodiment, the data to be accessed concurrently is presented or depicted at the multiple physical devices to the collaborators for viewing and accessing the data in real time or near real time. Each of the collaborators is able to view, re-edit, or re-modify in a concurrent fashion, at the collaborator's physical device, edits or modifications made to the data in real time or near real time as a result of any of the other collaborators accessing the data at their respective physical devices. In some instances, additional collaborators are specifiable for the data created for concurrent real time access in addition to those originally associated with the folder.
Abstract:
Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified rules to events in an action log framework (ALF) stream is disclosed. More specifically, collaboration environments can include features or mechanisms that allow end-users or collaborators to perform a variety of actions such as, for example, file uploads and previews, or collaboration operations such as, for example, task assignment and comments. These actions can be captured or logged by an action log framework and, as described herein, automatically translated into one or more jobs by applying customizable user-specified rules.
Abstract:
Embodiments of the present disclosure include systems and methods for implementing an Iconizer in a cloud-based platform such as cloud based platform (e.g., cloud-based collaboration platform or cloud-based platform providing collaborative and/or file sharing services). The iconizer can facilitate the display on a graphical user interface (GUI) of certain features of the storage operation and synchronization to a user. Some embodiments contemplate methods for representing Unicode text in the file system operations in either Normal Form Composed (NFC) or Normal Form Decomposed (NFD). Various disclosed embodiments facilitate operations using either or both formats, or a combination of the two.
Abstract:
Techniques for monitoring local and/or remote file systems by a synchronization component (e.g., client/server) of a cloud-based platform are disclosed. In some embodiments, a method of building synchronization events by a synchronization component (e.g., a synchronization server/client) includes obtaining a set of items that have been changed and their new states and retrieving last known states of the set of items that are stored in a reference snapshot inside a filesystem scanner. The method further includes generating differences between the new states and the last known states of the set of items as item changes and utilizing information provided by the item changes to translate the item changes into synchronization events for execution on the opposing file system. A method of handling failed synchronization events by a synchronization component of the cloud-based platform by collapsing a subsequent event with the failed synchronization event is also disclosed.
Abstract:
Systems and methods are disclosed for facilitating remote key management services in a collaborative cloud-based environment. In one embodiment, the remote key management architecture and techniques described herein provide for local key encryption and automatic generation of a reason code associated with content access. The reason code is used by a remote client device (e.g., an enterprise client) to control a second (remote) layer of key encryption. The remote client device provides client-side control and configurability of the second layer of key encryption.
Abstract:
A partition set for reinforcing a container's handles, the partition set including at least one interlocking subcomponent without hand holes and at least one interlocking subcomponent with two end panels with hand holes; the hand holes alignable with the container's hand holes; thereby providing reinforcement to the container's handles. Also, a container with hand hole reinforcement provided by the partition set.