Abstract:
Embodiments provide techniques generating and managing encryption keys within a computing infrastructure. Embodiments provide a key publisher that generates and maintains key pairs in a list at a configurable interval. In addition, the key publisher publishes the list to other components within the computing infrastructure. Embodiments also provide a key consumer that downloads the list of encrypted key pairs and maintains an active window of keys to can be accepted from client devices that communicate sensitive data to the computing infrastructure. If the key consumer receives a key from a client device that is outside of the active window yet that corresponds to a future key pair in the list, the key consumer advances the active window towards the future key pair.
Abstract:
In an embodiment, a method comprises using a first server computer, executing a process that is configured to generate virtual computer instances; receiving a request to generate a first custom virtual computer instance, wherein the request identifies one or more software packages to install on the first custom virtual computer instance; copying a first pre-configured volume image onto a volume of a data storage device, wherein the volume includes one or more base software packages in a file system; mounting the volume to the first server computer, in response to receiving the request; installing each of the one or more software packages on the volume; unmounting the volume; creating a snapshot of the volume; registering the snapshot as a registered custom volume image.
Abstract:
In an embodiment, a method comprises receiving an input defining organization of one or more universal data elements; generating a universal schema that defines organization of the one or more universal data elements based on the input; associating the universal schema with a specialized plug-in, wherein the specialized plug-in maps the one or more universal data elements with data elements in one or more specialized databases maintained by a specialized data store; receiving, from a computer, a request to receive data stored in the specialized data store and comprising parameters based on the universal schema; transforming the request using the specialized plug-in to produce a specialized query; sending the specialized query to the specialized data store to execute the specialized query; receiving a specialized result set from the specialized data store; sending, to the computer, a result set based on specialized result set.
Abstract:
Techniques for predictively scaling a distributed application are described. Embodiments could monitor performance of an application within a cloud computing environment over a first window of time to collect historical performance data. Here, the application comprises a plurality of application instances. A workload of the application could be monitored over a second window of time to collect historical workload data. Embodiments could analyze both the historical performance data and the historical workload data to determine one or more scaling patterns for the application. Upon determining a present state of the application matches one of the one or more scaling patterns, a plan for predictively scaling the application could be determined. Embodiments could then predictively scale the plurality of application instances, based on the determined plan.
Abstract:
Techniques are provided for increasing the efficiency and efficacy of DNS clients. In one technique, DNS clients log information about performance of one or more DNS servers that the DNS clients use to resolve DNS resolution requests. The DNS clients send, to a control server, performance data regarding the DNS resolution requests and/or subsequent connections to servers associated with resolved domain names. Based on the performance data, the control server sends, to one or more DNS clients, configuration data that adjusts the configuration of the DNS clients. For example, if a particular DNS server is taking a considerable amount of time to resolve DNS resolution requests from one or more DNS clients, then the control server may send, to a plurality of DNS clients, configuration data that indicates a different set of one or more DNS servers for the plurality of DNS clients to contact for subsequent DNS resolution requests.
Abstract:
Techniques are provided with which a subscriber to a media viewing service, which is configured for viewing media items such as TV shows or movies using streaming video delivery or other viewing techniques, may recommend one or more played or viewed media items to one or more friends in media viewing services or social networking systems that the subscriber uses. The subscriber may receive notifications when the friends view or play the recommended media items, and may contribute implicit feedback to a separate recommendation system regarding a recommended media item even when the subscriber has not explicitly rated the recommended media item. Subscribers also receive rapid indications, at the time that the subscribers are preparing to make recommendations of media items, about whether friends have already played or viewed the media items. In one embodiment, a recommendation may be communicated to a selected friend using a single operation of a pointing device.
Abstract:
A method and system for discovering and testing security assets is provided. Based on source definition data describing sources to monitor on the one or more computer networks, an example system scans the sources to identify security assets. The system analyses the security assets to identify characteristics of the server-based applications. The system stores database records describing the security assets and the identified characteristics. The system queries the database records to select, based at least on the identified characteristics, one or more target assets, from the security assets, on which to conduct one or more security tests. Responsive to selecting the one or more target assets, the system conducts the one or more security tests on the one or more target assets. The system identifies one or more security vulnerabilities at the one or more target assets based on the conducted one or more security tests.
Abstract:
Embodiments of the invention generally provide a method, a computing system, and a computer-readable medium configured to respond to requests for payload data and provide unique cache keys for caching the payload data. The computer-implemented method includes accepting a first request for translation that specifies a first path configured to identify first payload data associated with a graph object. The computer-implemented method further includes determining that the graph object includes a first translation node associated with a first portion of the first path. The computer-implemented method also includes obtaining, from the graph object, a second path that is associated with the first translation node. The computer-implemented method further includes replacing the first portion of the first path with the second path to generate a first translated path. The computer-implemented method also includes obtaining, from the graph object, the first payload data, based on the first translated path.
Abstract:
Embodiments provide techniques for presenting a user interface. An initial interface containing a first plurality of selectable elements is presented to a user. Embodiments assign the user to a first one of a plurality of preference groups. A plurality of selections made by the user of selectable elements from the plurality of selectable elements are detected. Embodiments then generate a second interface for the user that includes a second plurality of selectable elements, based on the first preference group to which the user is assigned and the selectable elements selected by the user.
Abstract:
In an embodiment, a method comprises receiving a first data streamed from a first server computer at a first site; collecting a first throughput data for the first site based, at least in part, on a first throughput of the first data streamed from the first server computer; receiving a second data streamed from a second server computer at a second site; collecting a second throughput data for the second site based, at least in part, on a second throughput of the second data streamed from the second server computer; switching from the second server computer at the second site, to a third server computer at the first site, based, at least in part, on a comparison between the first throughput data and the second throughput data; wherein the method is performed by one or more special-purpose computing devices.