摘要:
At least some embodiments of the present disclosure provide a system that can collect metadata from objects on at least one platform; evaluate, based on the collected metadata, at least one lifecycle policy to provide derived metadata; evaluate, based on the derived metadata, at least one security and analytics policy; and based on evaluation of the at least one security and analytics policy, perform at least one action on at least one first object, wherein the at least one first object is on the at least one platform.
摘要:
The technology features a system and computer-implemented method for resolving a relationship between objects. A target object index is generated based on a group of target objects. One or more lookup operations is performed on each target object in the target object index for each source object in a group of source objects. A plurality of source target object pairs is generated, each source target object pair comprising one source object and one target object having at least one matching data value. Each source target object pair is converted into a numeric feature vector. The numeric feature vector is classified corresponding to each source target object pair using a binary classifier. A match score to each source target object pair is applied based on the classification using the binary classifier. Any source target object pair having a match score lower than a match threshold value is discarded.
摘要:
This disclosure generally relates to synchronizing non-file content items from a collaborative workspace environment to a local computing device. Once the non-file content item has been synchronized to the local computing device, content or other data contained within the non-file content item may be accessed and edited. Once the edits are complete, the updated non-file content item may be provided back to the collaborative workspace environment. The changes may then be provided back to the original non-file content item such that it includes the most recent updates.
摘要:
A system comprising a database containing user data, an interface engine that communicates with the database and parses the data, an application server that communicates with the interface engine, a user device that receives and displays the parsed data, receives user-provided information, and sends the user-provided information to the application server, wherein the application server automatically updates the user device display with the parsed data, receives user-provided information from said user device, and provides the user-provided information to the interface engine for updating the database.
摘要:
Provided herein is a system and method for implementing a real-time and continuous validation tool for a distributed ledger-based computing system (i.e., blockchain). In one or more examples a. real-time validation tool and system can continuously monitor a blockchain computing system for activities that indicate abnormal or risky behavior, and can generate a report to a user that details those events. The real-time validation tool can be implemented as a node in a blockchain computing system and can use information gleaned from blockchain activity occurring in real-time as well as external data gathered from various sources to determine if one or more events has occurred that is indicative of abnormal or risky activity occurring within the blockchain computing system. The validation tool can be used to improve and secure an existing blockchain computing system against cyber intrusions and various integrity issues.
摘要:
Provided herein is a risk framework tool for a distributed ledger-based computing system (i.e., biockchain) that can present a common risk framework to a user that can then allow for the user to determine what risks are important for it to manage. The risk framework can then take those specified risks and convert them in to a plurality of tests that can be used to validate the organization's biockchain system. In one or more examples, the risk framework can provide a graphical user interface to user that allows them specify the risks they wish to manage within the biockchain computing system, and based on the user's inputs, can determine one or more continuous real-time validation tests to be performed on the biockchain computing system so as to characterize the risk specified by user using the risk framework.
摘要:
Embodiments of the present invention are directed to a two-way data transfer and synchronization system. The data transfer and synchronization system includes a provider system and a customer system. The provider system includes a web service hosted by a web server connected to a computer network and a first database. The customer system includes a client application, connected to the computer network and a second database (e.g., SIS database). The provider system cannot read data from the second database. The client application is configured to send requests to the web service and to receive HTTP responses from the web service. The responses from the web service are executed by the client application so that changes made to the second database are also made to the first database, and vice versa.
摘要:
A distributed key/value store system using asynchronous messaging systems is provided. A plurality of instances in a cloud computing environment each execute software that enables reading from and writing to a respective local cache, and that enables sending messages through a messaging queue to a cloud environment operating system. When a configuration value is updated locally at an instance, the instance sends a message to the cloud environment operating system, instructing it to update a database and broadcast the update to other instances through each instance's messaging queue. In some embodiments, each instance may read and write to the database directly, and may publish updates to the queues of other instances directly. In some embodiments, a managed encryption key service is used to encrypt sensitive information, securely distribute via distributed key/value store systems, and authenticate and decrypt it by instances of the distributed key/value store systems.