Abstract:
A method can include receiving a read request from a client program. The method can further include obtaining, in response to receiving the read request, one or more secrets from a secrets store. The obtaining can include storing the one or more secrets in a storage location. The method can further include initiating, in response to the read request, a transmission of the one or more secrets to the client program. The method can further include deleting the one or more secrets from the storage location.
Abstract:
An example operation may include one or more of connecting, by a data owner node, to a blockchain network that includes a plurality of storage provider peer nodes associated with a plurality of cloud storage providers, selecting, by the data owner node, storage provider peer nodes of the plurality of the storage provider peer nodes to be approved storage location member nodes, and executing, by the data owner node, a smart contract to: store data on the cloud storage providers of the plurality of the cloud storage providers associated with the approved storage location member nodes, and record movement of the data to the cloud storage providers on the blockchain.
Abstract:
A method includes obtaining, by a computing entity of a multi-cloud dispersed storage network (DSN) system, a multi-cloud storage request to write a data object to the multi-cloud DSN system from a requester. The method further includes sending, by the computing entity, the multi-cloud storage request to a data director module. The method further includes determining a multi-cloud storage scheme to execute the multi-cloud storage request, executing the multi-cloud storage scheme to store the data object in a set of two or more cloud storage systems, generating an index regarding the storage of the data object, and notifying the requester of an estimated response time of the set of two or more cloud storage systems. The method further includes monitoring the performance information of the set of two or more cloud storage systems and data object usage information of the data object to determine a multi-cloud storage performance level.
Abstract:
A first data visualization based on first and second sets of data items is provided on a first dashboard. A second data visualization based on third and fourth sets of data items is provided on a second dashboard. Each data item of the first and third sets has at least a first tag. Each data item of the second and fourth sets does not have the first tag. A selection of the first tag is received. In response to the selection, a third data visualization based on the first set of data items and not based on the second set of data items is provided in place of the first data visualization and a fourth data visualization based on the third set of data items and not based on the fourth set of data items is provided in place of the second data visualization.
Abstract:
Techniques are disclosed to reflect status in a virtual environment. An artist associated with audio content being played by a first user controlling a player avatar is determined. A companion avatar providing a virtual representation of the artist of the audio content is generated. The companion avatar is associated with the player avatar in the virtual environment. The companion avatar is configured to interact with the player avatar, and presence of the companion avatar conveys to one or more other users interacting within the virtual environment that the first user is currently listening to audio content of the artist.
Abstract:
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having a memory to a first computing device at a first time, the token device connected to the first computing device and the first information describing public data stored on the token device. A request to retrieve a root directory of private data may be received, the request specifying a root directory name. In response to receiving the request to retrieve a root directory of private data, the root directory may be requested by establishing a wireless connection between the token device and a server computing device, transferring the root directory name to the server computing device, wherein the root directory name is used as a password to retrieve the root directory, and receiving the root directory from the server computing device by the token device.
Abstract:
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having a memory to a first computing device at a first time, the token device connected to the first computing device and the first information describing public data stored on the token device. A request to retrieve a root directory of private data may be received, the request specifying a root directory name. In response to receiving the request to retrieve a root directory of private data, the root directory may be requested by establishing a wireless connection between the token device and a server computing device, transferring the root directory name to the server computing device, wherein the root directory name is used as a password to retrieve the root directory, and receiving the root directory from the server computing device by the token device.
Abstract:
A usage allocation of a hardware resource to each of a number of workloads over time is determined using a demand model. The usage allocation of the resource includes a current and past actual usage allocation of the resource, a future projected usage allocation of the resource, and current and past actual usage of the resource. A capacity allocation of the resource is determined using a capacity model. The capacity allocation of the resource includes a current and past capacity and a future projected capacity of the resource. Whether a gap exists between the usage allocation and the capacity allocation is determined using a mapping model. Where the gap exists between the usage allocation of the resource and the capacity allocation of the resource, a user is presented with options determined using the mapping model and selectable by the user to implement a remediation strategy to close the gap.
Abstract:
A smart display allows a user to build custom layouts of user interface blocks on the smart display independent of the software on the computer creating the user interface. A customization mechanism in the smart display allows a user to select portions of a user interface and move them to different positions on the display. The customization mechanism creates custom layout metadata that defines a screen offset for portions of a user interface moved by the user. The smart display monitors the incoming display data and re-assigns pixel rendering data to the new location in the moved user interface blocks as the data coming from the computer application changes.
Abstract:
Methods and systems for accessing a data repository include identifying target cells in an input data repository, including an input cell, an output cell, and a formula. An interface for the input data repository is generated that applies an input data value from a request to the input cell and that outputs a value from the output cell that is generated by the formula. A new value from a request is applied to the input cell using the interface. A value generated by the formula is outputted.