Abstract:
Provided are techniques for optimized content object storage service for large scale content. A content object file is created. An index entry for the content object file is created with a content object key and a content object location. The content object file is appended to an aggregated file on a storage node. In response to a request to retrieve the content object file from the aggregated file, the content object key is used to access the content object location that describes the storage node, a name of the aggregated file, an offset into the aggregated file, and a size of the content object file to retrieve the content object file.
Abstract:
In an approach to caller ID verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information. The computing device retrieves additional information associated with the caller. The computing device updates the call record based on the additional information. The computing device retrieves a digital signature associated with the caller. The computing device retrieves public key information associated with the caller. The computing device performs a digital signature assessment based on the public key information. The computing device updates the call record based on the digital signature assessment. The computing device adds timestamp information to the call record. The computing device receives a request from a call recipient device. The computing device communicates information based on the call record to the call recipient device. The computing device marks the call record as expired.
Abstract:
Methods and apparatus, including computer program products, implementing and using techniques for data replication in a cluster. In response to identifying data to replicate in a multi-node system by a first node in a cluster, the data is written concurrently to other nodes in the cluster based on a rule set in a repository. In response to detecting a criterion described in the rule set, an action is performed.
Abstract:
A case creation event originating from an external content repository is detected by a processor executing an inbound event handler of a distributed integration framework that integrates a case management system with the external content repository. The case creation event is configured by the distributed integration framework to cause creation of a case within the case management system. The inbound event handler instructs the case management system to create the case within the case management system. An outbound event handler of the distributed integration framework instructs the external content repository to create a proxy case to remotely represent the case created within the case management system.
Abstract:
Provided are techniques for holding versions of a document. In response to adding a version of an item to a hold container, another version of the item is automatically added to the hold container based on a hold version policy type associated with the hold container.
Abstract:
In an approach to caller ID verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information. The computing device retrieves additional information associated with the caller. The computing device updates the call record based on the additional information. The computing device retrieves a digital signature associated with the caller. The computing device retrieves public key information associated with the caller. The computing device performs a digital signature assessment based on the public key information. The computing device updates the call record based on the digital signature assessment. The computing device adds timestamp information to the call record. The computing device receives a request from a call recipient device. The computing device communicates information based on the call record to the call recipient device. The computing device marks the call record as expired.
Abstract:
In an approach to caller ID verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information. The computing device retrieves additional information associated with the caller. The computing device updates the call record based on the additional information. The computing device retrieves a digital signature associated with the caller. The computing device retrieves public key information associated with the caller. The computing device performs a digital signature assessment based on the public key information. The computing device updates the call record based on the digital signature assessment. The computing device adds timestamp information to the call record. The computing device receives a request from a call recipient device. The computing device communicates information based on the call record to the call recipient device. The computing device marks the call record as expired.
Abstract:
Methods for event processing in a content management system. In response to determining that an inter-dependence exists between two or more events in the content management system, a same group event key is assigned to each inter-dependent event. All events having the same group event key are distributed to a same event processing node on a consistent hashing ring.
Abstract:
A case creation event originating from an external content repository is detected by a processor executing an inbound event handler of a distributed integration framework that integrates a case management system with the external content repository. The case creation event is configured by the distributed integration framework to cause creation of a case within the case management system. The inbound event handler instructs the case management system to create the case within the case management system. An outbound event handler of the distributed integration framework instructs the external content repository to create a proxy case to remotely represent the case created within the case management system.
Abstract:
Provided are techniques for holding versions of a document. In response to adding a version of an item to a hold container, another version of the item is automatically added to the hold container based on a hold version policy type associated with the hold container.