Abstract:
An original UI configuration is formed by a combination of a first user interface structural component portion, a first user interface style code portion, and a first behavioral code portion. When a variation of the first UI feature or a new feature is to be implemented, a second UI configuration is deployed, where the second UI configuration is formed by a second user interface structural component portion, a second user interface style code portion, and a second behavioral code portion. The second UI configuration implements a variation of the first UI feature. Embodiments deploy a third UI configuration formed by the second user interface structural component portion, a third user interface style code portion, and the second behavioral code portion. The third UI configuration emulates the original UI configuration using the second behavioral code portion. The third configuration or the second configuration can be enabled based on a software switch.
Abstract:
Methods and systems for graphics rendering using a web browser. Embodiments commence upon receipt at a cloud-based collaboration server, a request to render a high bit depth image on a user device using a browser and a graphics processing unit. The graphics processing unit is configurable to render a display image based on a color space. The cloud-based collaboration server transmits a high bit depth image to the user device and a sending module sends instructions to be executed by the browser on the user device. The sent instructions comprise one or more first GPU commands that serve for rendering images using the graphics processing unit, wherein at least some of the GPU commands map the pixel data array to a color space, and some of the GPU commands map the pixel data array to the color space to generate a remapped grayscale image.
Abstract:
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy comprising a respective resource and a respective permission for a respective action that can be performed by a user of the client device in regards to the resource. A first application, which is configured to store data in an encrypted repository on the client device, receives a request to open a resource. The first application determines that one of the policies prohibits access by the resource to the encrypted repository and, based thereon, selects a different second application to open the resource that does not have access to the encrypted repository. The second application then opens the resource.
Abstract:
Embodiments of the present disclosure include systems and methods for enhanced quick search features, low-barrier comenting/interactive features in a collaboration platform, which may be a cloud-based platform. The disclosed technology enhances the user experience (both web and mobile user experience) by providing the ease with which the manner in which content and users can be discovered and browsed. Additionally, enhanced social features surrounding content is also disclosed. The disclosed technology further enhances the user experience by providing the ability to ‘like’ a file as a quick, easy way users/collaborators can note approval, attention, or preference of a file/work item.
Abstract:
Systems for managing content in a cloud-based service platform. Procedures for deduplication of a shared object in a cloud-based environment having one or more storage devices that store one or more files that are accessible by two or more entities. A computer-implemented method commences by generating a content-based encryption key for a shared object wherein the key is derived from one of the shared objects. The shared object is encrypted using the content-based encryption key to generate a content-based encrypted file. The content-based encrypted file is stored in a cloud-based storage system. A second or Nth entity and/or any number of users from the respective entities can upload the same file for shared storage, and before storing the same file for shared storage, a server in the cloud-based storage environment performs deduplication of the encrypted file across multiple entities by applying an intra-enterprise deduplicate directive or an inter-enterprise deduplicate directive.
Abstract:
A method, computer program product, and system for composition and declaration of tiled images in a style sheet. Embodiments commence upon identifying a collection of one or more computer-readable instances of individual style sheets, and identifying a corresponding collection of computer-readable objects comprising input images, wherein an individual style sheet includes references to the input images. The collection of one or more computer-readable instances of individual style sheets are used to determine a set of referenced images, which set of images are assembled into a tiled image. References to the images found in the set of images are modified or replaced such that the statements in the style sheets reference the tiled image rather than individual input images. One or more modified style sheets are output to be used in lieu of the unmodified style sheets.
Abstract:
Embodiments of the present disclosure include systems and methods for upload and/or download streaming encryption to/from an online service, or cloud-based platform or environment. The encryption process includes the following parts: Upload encryption, download decryption, and a central piece of infrastructure called the Interval Key Server (IKS). During both upload and download, the encryption and decryption processes are performed while the files are being uploaded/downloaded, (e.g., the files are being encrypted/decrypted as they are being streamed).
Abstract:
Disclosed is an approach for performing auto-classification of documents. A machine learning framework is provided to analyze the document, where labels associated with certain documents can be propagated to other documents.
Abstract:
Systems and methods for secure resource access and network communication are provided. A plurality of policies are received on a client device, each policy comprising a respective resource and a respective permission for a respective action that can be performed by a user of the client device in regards to the resource. A first application, which is configured to store data in an encrypted repository on the client device, receives a request to open a resource. The first application determines that one of the policies prohibits access by the resource to the encrypted repository and, based thereon, selects a different second application to open the resource that does not have access to the encrypted repository. The second application then opens the resource.
Abstract:
Techniques are disclosed for render documents that are in proprietary formats in a browser or mobile device. In one embodiment, a method comprises converting a plurality of resources in a document file into a plurality of files that are native to a browser. The method further comprises creating a style sheet based on the document file, wherein an aggregate of the plurality of files together with the style sheet are configured to cause the browser to render an appearance of the document file. The method further comprises generating, based on the document file, an invisible layer to be laid on the appearance, wherein the invisible layer enables actions to be performed on the document file. Among other advantages, embodiments disclosed herein provide the convenience of viewing and accessing documents regardless of whether a software or plug-in therefor is installed.