Document link migration
    1.
    发明授权

    公开(公告)号:US10956512B2

    公开(公告)日:2021-03-23

    申请号:US14938580

    申请日:2015-11-11

    IPC分类号: G06F16/93

    摘要: Techniques and systems for migrating links in documents are described. For example, during a migration process, a first document may be selected to be migrated from a source document database. A determination may be made that the first document includes a link to a second document. The first document may be migrated to a target document database. The second document may be selected to be migrated from the source document database. The second document may be migrated to the target document database. The link in the first document may be finalized to include an address of the second document in the target document database.

    Systems and methods for dynamic compression of time-series data

    公开(公告)号:US10827039B1

    公开(公告)日:2020-11-03

    申请号:US14886884

    申请日:2015-10-19

    IPC分类号: H04L29/06 H04L29/08

    摘要: In an embodiment, a method includes receiving, from a data source, time-series data of a time-series data stream produced by the data source. The method further includes identifying a target compression algorithm for the time-series data, wherein the target compression algorithm is linked to the data source in memory pursuant to a dynamically-variable assignment. The method also includes compressing the time-series data using the target compression algorithm and transmitting the compressed time-series data to a destination. Furthermore the method includes periodically optimizing the dynamically-variable assignment in real-time as the time-series data is received.

    Dispatcher for adaptive data collection

    公开(公告)号:US10715407B2

    公开(公告)日:2020-07-14

    申请号:US15158826

    申请日:2016-05-19

    IPC分类号: H04L12/26

    摘要: This disclosure describes systems, methods, and computer-readable media for optimizing data collection in a distributed environment by leveraging real-time and historical data collection performance statistics and server performance data. In some configurations, a computing device can be initially configured for data collection. In such configurations, the initial configuration can include preferred target servers for a particular task. The computing device can request batches of data from the preferred target servers, and process the information through a buffer. Techniques and technologies described herein collect the batches of data from servers as well as corresponding data collection statistics (e.g., server performance per task, server historical performance, etc.) and server performance data (e.g. server status).

    Partitioning target data to improve data replication performance

    公开(公告)号:US10671565B2

    公开(公告)日:2020-06-02

    申请号:US14695681

    申请日:2015-04-24

    IPC分类号: G06F16/11 G06F16/22 G06F16/21

    摘要: The presently claimed invention relates to a system and method for organizing data replicated in a target data repository. The method of the presently claimed invention may receive data from a primary data store for replication in the target data repository. The method may then determine that the received data should be organized and stored according to one or more priority metrics. The method may then organize the received data according to the one or more priority metrics, and store the received data based on the priority metrics. Higher priority data may be stored faster data storage devices or be stored in smaller files where lower priority data may be stored in slower data storage devices or be stored in larger files.

    Providing a secure communication channel during active directory disaster recovery

    公开(公告)号:US10375056B2

    公开(公告)日:2019-08-06

    申请号:US15291886

    申请日:2016-10-12

    IPC分类号: H04L29/06 G06F11/14 H04L29/14

    摘要: A secure communication channel can be established between a recovery console and a recovery agent during an Active Directory disaster recovery. This secure channel can be established without employing the Kerberos or NT LAN Manager (NTLM) authentication protocols. Therefore, the recovery console and recovery agent will be able to establish a secure channel even when the domain controller is in Directory Services Restore Mode (DSRM) and NTLM is disabled. A secure channel can be established between the recovery console and the recovery agent based on the Microsoft Secure Channel (Schanel) Security Support Provider (SSP). The Schannel implementation can be modified in a manner that allows the client to be authenticated within the Schannel architecture.

    Systems and methods for event-based authentication

    公开(公告)号:US10326748B1

    公开(公告)日:2019-06-18

    申请号:US14631826

    申请日:2015-02-25

    IPC分类号: H04L29/06 G06F21/31

    摘要: In one embodiment, a method is performed by a computer system. The method includes receiving a request to authenticate a user of an enterprise computing system. The method further includes, responsive to the request, selecting a set of previous user-initiated events of the user on the enterprise computing platform. Further, the method includes accessing user-specific event information related to the selected set of previous user-initiated events. In addition, the method includes generating, from at least a portion of the user-specific event information, a user-specific authentication sequence comprising a plurality of event-information requests. Additionally, the method includes administering the user-specific authentication sequence to the user, the administering comprising requiring the user to provide a valid response to each of the event-information requests as a precondition to successful authentication.

    Systems and methods of real-time container deployment

    公开(公告)号:US10270841B1

    公开(公告)日:2019-04-23

    申请号:US15061260

    申请日:2016-03-04

    摘要: In one embodiment, a method includes receiving a trigger to deploy a particular container on cloud resources accessible thereto such that the cloud resources are provided by a plurality of cloud providers and such that the computer system and the plurality of cloud providers are configured to negotiate container deployment using an information exchange protocol. The information exchange protocol includes a preconfigured inquiry format and a preconfigured inquiry-response format. The method further includes generating a performance inquiry in relation to the particular container. In addition, the method includes transmitting the performance inquiry to the plurality of cloud providers. Moreover, the method includes receiving inquiry responses from at least some of the plurality of cloud providers. Additionally, the method includes causing the particular container to be deployed on resources of the particular cloud provider.

    Usage-based modification of user privileges

    公开(公告)号:US10230734B2

    公开(公告)日:2019-03-12

    申请号:US14962211

    申请日:2015-12-08

    IPC分类号: H04L29/06

    摘要: Systems and techniques to identify and modify unused (or seldom used) access privileges are described. Group membership data may be correlated with access map data to create a user-resource access map identifying privilege levels associated with individual user accounts to access computing resources in a computing system. User activity event logs generated as a result of user accounts accessing the resources may be correlated with the user-resource access map to identify user accounts that do not use (or seldom use) particular privilege levels to access particular resources. The identified user accounts may be modified to remove the unused (or seldom used) privileges levels.

    Dynamically partitioning a mailing list based on a-priori categories and contextual analysis

    公开(公告)号:US10200324B2

    公开(公告)日:2019-02-05

    申请号:US14605229

    申请日:2015-01-26

    IPC分类号: H04L12/58

    摘要: A system, method, and computer-readable medium for dynamically partitioning a directory list to limit recipients to an appropriate context. More specifically, in certain embodiments the dynamic partitioning includes a first component which describes a priori categories. In certain embodiments, the a priori categories could include “inner circle” or “trusted advisors” categories. Other categories could include “friends of the DL” who only want occasional but relevant messages. In certain embodiments, these categories are created by a DL owner. However, in certain embodiments, members (e.g., recipients) could also change their own category. For example, a DL could have categories: All, Required participants, FYI participants, Managers.

    System and method for data aggregation and analysis

    公开(公告)号:US10146954B1

    公开(公告)日:2018-12-04

    申请号:US15664849

    申请日:2017-07-31

    IPC分类号: G06F21/62 G06F17/30

    摘要: In one embodiment, a method includes managing and controlling a plurality of data-access credentials. The method further includes accessing data from a plurality, of sources in a plurality of data formats. The accessing includes using one or more data-access credentials of the plurality of data-access credentials. The one or more data-access credentials are associated with at least a portion of the plurality of data sources. The method also includes abstracting the data into a standardized format for further analysis. The abstracting includes selecting the standardized format based on a type of the data. In addition, the method includes applying a security policy to the data. The applying includes identifying at least a portion of the data for exclusion from storage based on the security policy. Additionally, the method includes filtering from storage any data identified for exclusion. Further, the method includes storing the data in the standardized format.