The present technology generally pertains to creating a cloud content item from a local file system interface, and more specifically, the present technology pertains to an immediate creation of a representation of the cloud content item in the local file system.
When a user of a computing device makes an input into a computing device they expect to see an immediate response. In general, computing devices have been at a level of responsiveness such that some immediate response is taken for granted. Such computing performance has made it so that when a computing device does not provide an immediate response, the user assumes something is wrong. For actions that might require some patience, it is important to design a user experience that at least signals that action is being taken.
The above-recited and other advantages and features of the present technology will become apparent by reference to specific implementations illustrated in the appended drawings. A person of ordinary skill in the art will understand that these drawings only show some examples of the present technology and would not limit the scope of the present technology to these examples. Furthermore, the skilled artisan will appreciate the principles of the present technology as described and explained with additional specificity and detail through the use of the accompanying drawings in which:
Various examples of the present technology are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the present technology.
The disclosed technology addresses the need in the art for a technology that can provide a user experience on a client device that is responsive to user inputs and that simultaneously allows time for communications to a server and processing by multiple servers.
Specifically, when functionality to create a cloud content item from a file system of a client device is made available to a user, the user is exposed to two competing user experience paradigms that can result in a poor user experience. Users are accustomed to some latency, at least to load a document in a webpage in an Internet browser, when working with cloud content items. However, users expect actions taken on a local file system of a client device to be immediate. They are not accustomed to a user experience that shows local content items to also include content items that require server actions for content item creation. As such, even when creating a cloud content item using a local file system, users expect the same responsiveness they are accustomed to from the local file system, and when they don't experience such responsiveness the user forms a negative impression.
The present technology addresses this problem by immediately creating a content item that is representative of a cloud content item once the user requests a cloud content item to be created. The content item that is representative of the cloud content item is created even before the cloud content item itself is created. Since the content item that is representative of the cloud content item is represented in the file system on the client device, the user receives an experience that matches their expectations.
However, creating the content item that is representative of the cloud content item prior to the existence of the cloud content item creates other challenges. One such challenge is that the cloud content item needs to be created and once created the content item that is representative of the cloud content item need to be linked in some way such that when the user selects the content item that is representative of the cloud content item, the cloud content item opens. Accordingly, after the cloud content item is created, the present technology provides a mechanism to update content item that is representative of the cloud content item. The present technology also contains an additional mechanism whereby the content management system can relate the content item that is representative of the cloud content item with the actual cloud content item.
Another challenge is that since the content item that is representative of the cloud content item exists prior to the existence of the cloud content item, a user might attempt to access the cloud content item before it exists by selecting the content item that is representative of the cloud content item. The present technology includes a mechanism whereby the creation of the cloud content item can be prioritized in such circumstances.
In some embodiments, the disclosed technology is deployed in the context of a content management system having content item synchronization capabilities and collaboration features, among others. An example system configuration 100 is shown in
Accounts
Content management system 110 can store content items in association with accounts, as well as perform a variety of content item management tasks, such as retrieve, modify, browse, and/or share the content item(s). Furthermore, content management system 110 can enable an account to access content item(s) from multiple client devices.
Content management system 110 supports a plurality of accounts. An entity (user, group of users, team, company, etc.) can create an account with content management system, and account details can be stored in account database 140. Account database 140 can store profile information for registered entities. In some cases, profile information for registered entities includes a username and/or email address. Account database 140 can include account management information, such as account type (e.g. various tiers of free or paid accounts), storage space allocated, storage space used, client devices 150 having a registered content management client application 152 resident thereon, security settings, personal configuration settings, etc.
Account database 140 can store groups of accounts associated with an entity. Groups can have permissions based on group policies and/or access control lists, and members of the groups can inherit the permissions. For example, a marketing group can have access to one set of content items while an engineering group can have access to another set of content items. An administrator group can modify groups, modify user accounts, etc.
Content Item Storage
A feature of content management system 110 is the storage of content items, which can be stored in content storage 142. Content items can be any digital data such as documents, collaboration content items, text files, audio files, image files, video files, webpages, executable files, binary files, etc. A content item can also include collections or other mechanisms for grouping content items together with different behaviors, such as folders, zip files, playlists, albums, etc. A collection can refer to a folder, or a plurality of content items that are related or grouped by a common attribute. In some embodiments, content storage 142 is combined with other types of storage or databases to handle specific functions. Content storage 142 can store content items, while metadata regarding the content items can be stored in metadata database 146. Likewise, data regarding where a content item is stored in content storage 142 can be stored in content directory 144. Additionally, data regarding changes, access, etc. can be stored in server file journal 148. Each of the various storages/databases such as content storage 142, content directory 144, server file journal 148, and metadata database 146 can be comprised of more than one such storage or database and can be distributed over many devices and locations. Other configurations are also possible. For example, data from content storage 142, content directory 144, server file journal 148, and/or metadata database 146 may be combined into one or more content storages or databases or further segmented into additional content storages or databases. Thus, content management system 110 may include more or less storages and/or databases than shown in
In some embodiments, content storage 142 is associated with at least one content storage service 116, which includes software or other processor executable instructions for managing the storage of content items including, but not limited to, receiving content items for storage, preparing content items for storage, selecting a storage location for the content item, retrieving content items from storage, etc. In some embodiments, content storage service 116 can divide a content item into smaller chunks for storage at content storage 142. The location of each chunk making up a content item can be recorded in content directory 144. Content directory 144 can include a content entry for each content item stored in content storage 142. The content entry can be associated with a unique ID, which identifies a content item.
In some embodiments, the unique ID, which identifies a content item in content directory 144, can be derived from a deterministic hash function. This method of deriving a unique ID for a content item can ensure that content item duplicates are recognized as such since the deterministic hash function will output the same identifier for every copy of the same content item, but will output a different identifier for a different content item. Using this methodology, content storage service 116 can output a unique ID for each content item.
Content storage service 116 can also designate or record a content path for a content item in metadata database 146. The content path can include the name of the content item and/or folder hierarchy associated with the content item. For example, the content path can include a folder or path of folders in which the content item is stored in a local file system on a client device. While content items are stored in content storage 142 in blocks and may not be stored under a tree like directory structure, such directory structure is a comfortable navigation structure for users. Content storage service 116 can define or record a content path for a content item wherein the “root” node of a directory structure can be a namespace for each account. Within the namespace can be a directory structure defined by a user of an account and/or content storage service 116. Metadata database 146 can store the content path for each content item as part of a content entry.
In some embodiments, the namespace can include additional namespaces nested in the directory structure as if they are stored within the root node. This can occur when an account has access to a shared collection. Shared collections can be assigned their own namespace within content management system 110. While some shared collections are actually a root node for the shared collection, they are located subordinate to the account namespace in the directory structure, and can appear as a folder within a folder for the account. As addressed above, the directory structure is merely a comfortable navigation structure for users, but does not correlate to storage locations of content items in content storage 142.
While the directory structure in which an account views content items does not correlate to storage locations at content management system 110, the directory structure can correlate to storage locations on client device 150 depending on the file system used by client device 150.
As addressed above, a content entry in content directory 144 can also include the location of each chunk making up a content item. More specifically, the content entry can include content pointers that identify the location in content storage 142 of the chunks that make up the content item.
In addition to a content path and content pointer, a content entry in content directory 144 can also include a user account identifier that identifies the user account that has access to the content item and/or a group identifier that identifies a group with access to the content item and/or a namespace to which the content entry belongs.
Content storage service 116 can decrease the amount of storage space required by identifying duplicate content items or duplicate blocks that make up a content item or versions of a content item. Instead of storing multiple copies, content storage 142 can store a single copy of the content item or block of the content item and content directory 144 can include a pointer or other mechanism to link the duplicates to the single copy.
Content storage service 116 can also store metadata describing content items, content item types, folders, file path, and/or the relationship of content items to various accounts, collections, or groups in metadata database 146, in association with the unique ID of the content item.
Content storage service 116 can also store a log of data regarding changes, access, etc. in server file journal 148. Server file journal 148 can include the unique ID of the content item and a description of the change or access action along with a time stamp or version number and any other relevant data. Server file journal 148 can also include pointers to blocks affected by the change or content item access. Content storage service can provide the ability to undo operations, by using a content item version control that tracks changes to content items, different versions of content items (including diverging version trees), and a change history that can be acquired from the server file journal 148.
Content Item Synchronization
Another feature of content management system 110 is synchronization of content items with at least one client device 150. Client device(s) can take different forms and have different capabilities. For example, client device 1501 is a computing device having a local file system accessible by multiple applications resident thereon. Client device 1502 is a computing device wherein content items are only accessible to a specific application or by permission given by the specific application, and the content items are typically stored either in an application specific space or in the cloud. Client device 1503 is any client device accessing content management system 110 via a web browser and accessing content items via a web interface. While example client devices 1501, 1502, and 1503 are depicted in form factors such as a laptop, mobile device, or web browser, it should be understood that the descriptions thereof are not limited to devices of these example form factors. For example a mobile device such as client 1502 might have a local file system accessible by multiple applications resident thereon, or client 1502 might access content management system 110 via a web browser. As such, the form factor should not be considered limiting when considering client 150's capabilities. One or more functions described herein with respect to client device 150 may or may not be available on every client device depending on the specific capabilities of the device—the file access model being one such capability.
In many embodiments, client devices are associated with an account of content management system 110, but in some embodiments, client devices can access content using shared links and do not require an account.
As noted above, some client devices can access content management system 110 using a web browser. However, client devices can also access content management system 110 using client application 152 stored and running on client device 150. Client application 152 can include a client synchronization service 156.
Client synchronization service 156 can be in communication with server synchronization service 112 to synchronize changes to content items between client device 150 and content management system 110.
Client device 150 can synchronize content with content management system 110 via client synchronization service 156. The synchronization can be platform agnostic. That is, content can be synchronized across multiple client devices of varying type, capabilities, operating systems, etc. Client synchronization service 156 can synchronize any changes (new, deleted, modified, copied, or moved content items) to content items in a designated location of a file system of client device 150.
Content items can be synchronized from client device 150 to content management system 110, and vice versa. In embodiments wherein synchronization is from client device 150 to content management system 110, a user can manipulate content items directly from the file system of client device 150, while client synchronization service 156 can monitor directory on client device 150 for changes to files within the monitored folders.
When client synchronization service 156 detects a write, move, copy, or delete of content in a directory that it monitors, client synchronization service 156 can synchronize the changes to content management storage service 116. In some embodiments, client synchronization service 156 can perform some functions of content management storage service 116 including functions addressed above such as dividing the content item into blocks, hashing the content item to generate a unique identifier, etc. Client synchronization service 156 can index content within client storage index 164 and save the result in storage index 164. Indexing can include storing paths plus a unique server identifier, and a unique client identifier for each content item. In some embodiments, client synchronization service 156 learns the unique server identifier from server synchronization service 112, and learns the unique client identifier from the operating system of client device 150.
Client synchronization service 156 can use storage index 164 to facilitate the synchronization of at least a portion of the content within client storage with content associated with a user account on content management system 110. For example, client synchronization service 156 can compare storage index 164 with content management system 110 and detect differences between content on client storage and content associated with a user account on content management system 110. Client synchronization service 156 can then attempt to reconcile differences by uploading, downloading, modifying, and deleting content on client storage as appropriate. Content storage service 116 can store the changed or new block for the content item and update server file journal 148, metadata database 146, content directory 144, content storage 142, account database 140, etc. as appropriate.
When synchronizing from content management system 110 to client device 150, a mount, modification, addition, deletion, move of a content item recorded in server file journal 148 can trigger a notification to be sent to client device 150 using notification service 117. When client device 150 is informed of the change a request changes listed in server file journal 148 since the last synchronization point known to the client device. When client device 150 determines that it is out of synchronization with content management system 110, client synchronization service 156 requests content item blocks including the changes, and updates its local copy of the changed content items.
In some embodiments, storage index 164 stores tree data structures wherein one tree reflects the latest representation of a directory according to server synchronization service 112, while another tree reflects the latest representation of the directory according to client synchronization service 156. Client synchronization service can work to ensure that the tree structures match by requesting data from server synchronization service 112 or committing changes on client device 150 to content management system 110.
Sometimes client device 150 might not have a network connection available. In this scenario, client synchronization service 156 can monitor the linked collection for content item changes and queue those changes for later synchronization to content management system 110 when a network connection is available. Similarly, a user can manually start, stop, pause, or resume synchronization with content management system 110.
Client synchronization service 156 can synchronize all content associated with a particular user account on content management system 110. Alternatively, client synchronization service 156 can selectively synchronize a portion of the content of the total content associated with the particular user account on content management system 110. Selectively synchronizing only a portion of the content can preserve space on client device 150 and save bandwidth.
In some embodiments, client synchronization service 156 selectively stores a portion of the content associated with the particular user account and stores placeholder content items in client storage for the remainder portion of the content. For example, client synchronization service 156 can store a placeholder content item that has the same filename, path, extension, metadata, of its respective complete content item on content management system 110, but lacking the data of the complete content item. The placeholder content item can be a few bytes or less in size while the respective complete content item might be significantly larger. After client device 150 attempts to access the content item, client synchronization service 156 can retrieve the data of the content item from content management system 110 and provide the complete content item to accessing client device 150. This approach can provide significant space and bandwidth savings while still providing full access to a user's content on content management system 110.
Collaboration Features
Another feature of content management system 110 is to facilitate collaboration between users. Collaboration features include content item sharing, commenting on content items, co-working on content items, instant messaging, providing presence and seen state information regarding content items, etc.
Sharing
Content management system 110 can manage sharing content via sharing service 128. Sharing content by providing a link to the content can include making the content item accessible from any computing device in network communication with content management system 110. However, in some embodiments, a link can be associated with access restrictions enforced by content management system 110 and access control list 145. Sharing content can also include linking content using sharing service 128 to share content within content management system 110 with at least one additional user account (in addition to the original user account associated with the content item) so that each user account has access to the content item. The additional user account can gain access to the content by accepting the content, which will then be accessible through either web interface service 124 or directly from within the directory structure associated with their account on client device 150. The sharing can be performed in a platform agnostic manner. That is, the content can be shared across multiple client devices 150 of varying type, capabilities, operating systems, etc. The content can also be shared across varying types of user accounts.
To share a content item within content management system 110 sharing service 128 can add a user account identifier or multiple user account identifiers to a content entry in access control list database 145 associated with the content item, thus granting the added user account access to the content item. Sharing service 128 can also remove user account identifiers from a content entry to restrict a user account's access to the content item. Sharing service 128 can record content item identifiers, user account identifiers given access to a content item, and access levels in access control list database 145. For example, in some embodiments, user account identifiers associated with a single content entry can specify different permissions for respective user account identifiers with respect to the associated content item.
To share content items outside of content management system 110, sharing service 128 can generate a custom network address, such as a uniform resource locator (URL), which allows any web browser to access the content item or collection in content management system 110 without any authentication. To accomplish this, sharing service 128 can include content identification data in the generated URL, which can later be used to properly identify and return the requested content item. For example, sharing service 128 can include the account identifier and the content path or a content item identifying code in the generated URL. Upon selection of the URL, the content identification data included in the URL can be transmitted to content management system 110, which can use the received content identification data to identify the appropriate content item and return the content item.
In addition to generating the URL, sharing service 128 can also be configured to record in access control list database 145 that a URL to the content item has been created. In some embodiments, the content entry associated with a content item can include a URL flag indicating whether a URL to the content item has been created. For example, the URL flag can be a Boolean value initially set to 0 or false to indicate that a URL to the content item has not been created. Sharing service 128 can change the value of the flag to 1 or true after generating a URL to the content item.
In some embodiments, sharing service 128 can associate a set of permissions to a URL for a content item. For example, if a user attempts to access the content item via the URL, sharing service 128 can provide a limited set of permissions for the content item. Examples of limited permissions include restrictions that the user cannot download the content item, save the content item, copy the content item, modify the content item, etc. In some embodiments, limited permissions include restrictions that only permit a content item to be accessed from with a specified domain, i.e., from within a corporate network domain, or by accounts associated with a specified domain, e.g., accounts associated with a company account (e.g., @acme.com).
In some embodiments, sharing service 128 can also be configured to deactivate a generated URL. For example, each content entry can also include a URL active flag indicating whether the content should be returned in response to a request from the generated URL. For example, sharing service 128 can only return a content item requested by a generated link if the URL active flag is set to 1 or true. Thus, access to a content item for which a URL has been generated can be easily restricted by changing the value of the URL active flag. This allows a user to restrict access to the shared content item without having to move the content item or delete the generated URL. Likewise, sharing service 128 can reactivate the URL by again changing the value of the URL active flag to 1 or true. A user can thus easily restore access to the content item without the need to generate a new URL.
In some embodiments, content management system 110 can designate a URL for uploading a content item. For example, a first user with a user account can request such a URL, provide the URL to a contributing user and the contributing user can upload a content item to the first user's user account using the URL.
Team Service
In some embodiments, content management system 110 includes team service 130. Team service 130 can provide functionality for creating and managing defined teams of user accounts. Teams can be created for a company, with sub-teams (e.g., business units, or project teams, etc.), and user accounts assigned to teams and sub-teams, or teams can be created for any defined group of user accounts. Teams service 130 can provide a common shared space for the team, private user account folders, and access limited shared folders. Teams service can also provide a management interface for an administrator to manage collections and content items within team, and can manage user accounts that are associated with the team.
Authorization Service
In some embodiments, content management system 110 includes authorization service 132. Authorization service 132 ensures that a user account attempting to access a namespace has appropriate rights to access the namespace. Authorization service 132 can receive a token from client application 152 that follows a request to access a namespace and can return the capabilities permitted to the user account. For user accounts with multiple levels of access (e.g. a user account with user rights and administrator rights) authorization service 132 can also require explicit privilege escalation to avoid unintentional actions by administrators.
Presence and Seen State
In some embodiments, content management system can provide information about how users with which a content item is shared are interacting or have interacted with the content item. In some embodiments, content management system 110 can report that a user with which a content item is shared is currently viewing the content item. For example, client collaboration service 160 can notify notifications service 117 when client device 150 is accessing the content item. Notifications service 117 can then notify all client devices of other users having access to the same content item of the presence of the user of client device 150 with respect to the content item.
In some embodiments, content management system 110 can report a history of user interaction with a shared content item. Collaboration service 126 can query data sources such as metadata database 146 and server file journal 148 to determine that a user has saved the content item, that a user has yet to view the content item, etc., and disseminate this status information using notification service 117 to other users so that they can know who currently is or has viewed or modified the content item.
Collaboration service 126 can facilitate comments associated with content, even if a content item does not natively support commenting functionality. Such comments can be stored in metadata database 146.
Collaboration service 126 can originate and transmit notifications for users. For example, a user can mention another user in a comment and collaboration service 126 can send a notification to that user that he has been mentioned in the comment. Various other content item events can trigger notifications, including deleting a content item, sharing a content item, etc.
Collaboration service 126 can provide a messaging platform whereby users can send and receive instant messages, voice calls, emails, etc.
Collaboration Content Items
In some embodiments, content management service can also include Collaborative document service 134 which can provide an interactive content item collaboration platform whereby users can simultaneously create collaboration content items, comment in the collaboration content items, and manage tasks within the collaboration content items. Collaboration content items can be files that users can create and edit using a collaboration content item editor, and can contain collaboration content item elements. Collaboration content item elements may include a collaboration content item identifier, one or more author identifiers, collaboration content item text, collaboration content item attributes, interaction information, comments, sharing users, etc. Collaboration content item elements can be stored as database entities, which allows for searching and retrieving the collaboration content items. Multiple users may access, view, edit, and collaborate on collaboration content items at the same time or at different times. In some embodiments, this can be managed by requiring two users access a content item through a web interface and there they can work on the same copy of the content item at the same time.
Collaboration Companion Interface
In some embodiments, client collaboration service 160 can provide a native application companion interface for the purpose of displaying information relevant to a content item being presented on client device 150. In embodiments wherein a content item is accessed by a native application stored and executed on client device 150, where the content item is in a designated location of the file system of client device 150 such that the content item is managed by content application 152, the native application may not provide any native way to display the above addressed collaboration data. In such embodiments, client collaboration service 160 can detect that a user has opened a content item, and can provide an overlay with additional information for the content item, such as collaboration data. For example, the additional information can include comments for the content item, status of the content item, activity of other users previously or currently viewing the content item. Such an overlay can warn a user that changes might be lost because another user is currently editing the content item.
In some embodiments, one or more of the services or storages/databases discussed above can be accessed using public or private application programming interfaces.
Certain software applications can access content storage 142 via an API on behalf of a user. For example, a software package such as an application running on client device 150, can programmatically make API calls directly to content management system 110 when a user provides authentication credentials, to read, write, create, delete, share, or otherwise manipulate content.
A user can view or manipulate content stored in a user account via a web interface generated and served by web interface service 124. For example, the user can navigate in a web browser to a web address provided by content management system 110. Changes or updates to content in the content storage 142 made through the web interface, such as uploading a new version of a content item, can be propagated back to other client devices associated with the user's account. For example, multiple client devices, each with their own client software, can be associated with a single account and content items in the account can be synchronized between each of the multiple client devices.
Client device 150 can connect to content management system 110 on behalf of a user. A user can directly interact with client device 150, for example when client device 150 is a desktop or laptop computer, phone, television, internet-of-things device, etc. Alternatively or additionally, client device 150 can act on behalf of the user without the user having physical access to client device 150, for example when client device 150 is a server.
Some features of client device 150 are enabled by an application installed on client device 150. In some embodiments, the application can include a content management system specific component. For example, the content management system specific component can be a stand-alone application 152, one or more application plug-ins, and/or a browser extension. However, the user can also interact with content management system 110 via a third-party application, such as a web browser, that resides on client device 150 and is configured to communicate with content management system 110. In various implementations, the client-side application 152 can present a user interface (UI) for a user to interact with content management system 110. For example, the user can interact with the content management system 110 via a file system explorer integrated with the file system or via a webpage displayed using a web browser application.
In some embodiments, client application 152 on client device 150 can be enabled with functionality to create cloud content items through local cloud content item creation service 170. In some embodiments, a collaborative document such as provided by collaborative document service 134 is one type of cloud content item. A cloud content item is a content item that only resides in the cloud. Examples of cloud content items include GOOGLE DOCS, and DROPBOX PAPER. Notwithstanding the fact that cloud content items reside in the cloud, the present technology can create a client content item that represents the cloud content item, which gives the appearance that the cloud content item is synchronized to client application 152.
In some embodiments, client application 152 can be configured to manage and synchronize content for more than one account of content management system 110. In such embodiments client application 152 can remain logged into multiple accounts and provide normal services for the multiple accounts. In some embodiments, each account can appear as folder in a file system, and all content items within that folder can be synchronized with content management system 110. In some embodiments, client application 152 can include a selector to choose one of the multiple accounts to be the primary account or default account.
While content management system 110 is presented with specific components, it should be understood by one skilled in the art, that the architectural configuration of system 100 is simply one possible configuration and that other configurations with more or fewer components are possible. Further, a service can have more or less functionality, even including functionality described as being with another service. Moreover, features described herein with respect to an embodiment can be combined with features described with respect to another embodiment.
While system 100 is presented with specific components, it should be understood by one skilled in the art, that the architectural configuration of system 100 is simply one possible configuration and that other configurations with more or fewer components are possible.
Greater detail with respect to the functions of the entities represented in
While
The method illustrated in
It can be advantageous if the content item ID for the cloud content item does not conflict with any other content item ID that is managed by content management system 110. As such, local cloud content item creation service 170 can generate a portion of a content item ID in a format that is similar to the format of content item IDs ordinarily generated by content management system 110, and to ensure that the generated portion of the content item ID does not conflict with any other content item ID that is managed by the content management system 110, local cloud content item creation service 170 can prepend or append a namespace to the generated portion of the content item ID. Thus, in some embodiments, the content item ID for the cloud content item consists of a namespace plus the generated portion of the content item ID.
In some embodiments, the namespace portion of the content item ID can be guaranteed to be unique itself, which ensures that the content item ID is unique. The namespace portion of the content item ID can be a hostID of client device 150 generated in coordination with content managements system 110. The hostID corresponds to a specific content management system 110 user ID being signed into a specific installation of client application 152 on a given client device 150. The hostID guaranteed to be unique because this identifier is generated at the time the user ID signs into the client application 152 and as such content management system 110 will issue this unique user ID.
In some embodiments, the generated portion of the content item ID can be a string of arbitrary (e.g., pseudo-randomly generated) characters. In some embodiments, the string can have a predefined length.
The content item ID for the cloud content item can be stored as a metadata attribute of the client content item that is a representation of the cloud content item. In some embodiments, other data can also be stored as a metadata attribute of the client content item that is a representation of the cloud content item. For example a title of the cloud content item can be provided by the user and stored as metadata. In another example, a designation of the content item as a representation of a cloud content item can be stored in metadata. Additionally a URL pointing to cloud content item service 204 can also be stored in metadata. In some embodiments, the metadata can take the form of extended attributes or alternate data streams associated with the client content item.
While steps 304 and 306 appear in sequence it will be appreciated by those of ordinary skill in the art that steps 304 and 306 can also occur in a different order, asynchronously, or simultaneously.
After the client content item is created (304) and has been assigned (306) at least a content item ID for the cloud content item, client application 152 can send an instruction (308) to content management system 110 to create the cloud content item with the assigned content item ID.
The instruction can be received (309) by event handler 202 which can determine (311) based on the content item ID that the cloud content item does not yet exist and can pass the request to cloud content item service 204.
Cloud content item service 204 can create (313) the cloud content item having the content item ID assigned by the client device. In some embodiments, cloud content item service 204 creates (313) the cloud content item by communicating with cloud content item service provider 215 (or collaborative document service 134) via published application programming interfaces (APIs), while at the same time recording the existence of the created cloud content item with the cloud content item service provider in server file journal 148.
After the cloud content item has been created content management system 110 can send (315) information describing created cloud content item to client device 150.
Client device 150 can receive (316) the information from content management system 110 regarding the created cloud content item, and can update (320) the client content item representing the cloud content item with any new or revised information. Since the client content item representing the cloud content item was created before the cloud content item, the client content item may include placeholder information that needs to be replaced once the cloud content item is actually created. In some embodiments the information received from content management system that is used to update (320) the client content item can include information indicating that the cloud content item was created, an updated reference to the actual location in the cloud where the cloud content item exists (e.g., in the form of a URL), an updated content item ID for the cloud content item (e.g., if the originally assigned content item ID was found to conflict with an existing content item ID on content management system 110), or any other relevant information.
As soon as the client content item representing the cloud content item is presented in a file system user interface on client device 150, a user can select the client content item in an attempt to open the cloud content item. Client application 152 can receive (322) a selection of the local content item representing the cloud content item, and in response can connect (324) to a URL stored as metadata with the local content item that points to cloud content item service 204 at content management system 110.
Cloud content item service 204 can receive (325) a request for the cloud content item. Cloud content item service 204 can determine (327) whether the cloud content item exists by referencing server file journal 148 or other resource at content management system 110. Cloud content item service 204 can identify a URL for the cloud content item at the cloud content item provider and can redirect (329) the client device to that URL.
Client application 152 can receive (332) the redirection to the URL provided by cloud content item service 204 and can connect (334) to the URL for the cloud content item and present it to the user.
However, in some embodiments, when cloud content item service 204 receives (325) request for the cloud content item, cloud content item service 204 may determine (327) that the cloud content item does not exist. This can occur because the creation of the cloud content item is an asynchronous process. One objective of the present technology is to provide a user interface on client device 150 to allow a user to create a cloud content item that is also associated with a good user experience. However, as explained above, the creation of a cloud content item may come with some period of delay, and if the present technology did not immediately create a client content item that is a representation of the cloud content item the user may think the process of creating the cloud content item failed when the process of creating the cloud content item is really just delayed.
Since the client content item immediately exists, it is available to be the subject of some user interactions, even if the corresponding cloud content item has not yet been created. For example, since the client content item is a content item on the local file system of client device 150, a user can rename the content item, or move the content item to another directory. In some embodiments, renaming the client content item can cause the cloud content item to be named with the file name of the client content item and as such, some interactions with the client content item can affect the cloud content item. However, changing the location of the client content item to a different directory might not have any effect on the cloud content item.
The immediate creation of the client content item as a representation of the cloud content item can create a race situation wherein content management system 110 may not have created the cloud content item yet, but a user of client device 150 can request to open the cloud content item.
For example, client device 150 can receive (372) a selection of the client content item wherein the user of client device 150 wishes to open the cloud content item that it represents. Client application 152 can connect (374) to the URL stored in the metadata of the client content item which points to cloud content item service 204. Cloud content item service 204 can receive (325) the request for the cloud content item and can determine (327) that the content item does not exist. In response cloud content item service 204 can proceed to create (313) the cloud content item, and once the cloud content item is created the method can proceed to both steps 315, in order to update the client device of the creation of the cloud content item, and to step 329, in order to fulfill the users request to access the cloud content item.
Specifically, after the client content item representing the cloud content item has been created (304) and has been assigned (306) a content item ID, the client content item can be synchronized (348) by client synchronization service 156 as client synchronization service 156 would do with any other content item stored in a directory for which it is responsible.
Server synchronization service 112 at content management system 110 can receive (349) the client content item from the synchronization queue of client synchronization service 156. When processing the local content item in the synchronization process, server synchronization service 112 can determine (311) that the client content item represents a cloud content item that does not exist and can create an error that is passed to event handler 202. Event handler 202 can determine that the solution to this error is to instruct cloud content item service 204 to create (313) the cloud content item having the content item ID assigned at the client device.
In some embodiments, synchronization events pertaining to creating a cloud content item can be prioritized in the synchronization queue.
Once the cloud content item has been created (313), server synchronization service 112 can synchronize (351) information describing the created cloud content item with the local content item which can be received (353) by client synchronization service 156 which can synchronize information regarding the created cloud content item with the local content item. For example, since the client content item representing the cloud content item was created before the cloud content item, the client content item may include placeholder information that needs to be replaced once the cloud content item is actually created. In some embodiments, the information received from content management system in the synchronization (351) (353) that is used to update (320) the client content item can be information that the cloud content item was created, can be an updated reference to the actual location in the cloud where the cloud content item exists, and/or can be an updated identifier for the cloud content item.
In some embodiments, computing system 500 is a distributed system in which the functions described in this disclosure can be distributed within a datacenter, multiple datacenters, a peer network, etc. In some embodiments, one or more of the described system components represents many such components each performing some or all of the function for which the component is described. In some embodiments, the components can be physical or virtual devices.
Example system 500 includes at least one processing unit 510 and connection 505 that couples various system components including system memory 515, such as read only memory (ROM) 520 and random access memory (RAM) 525 to processor 510. Computing system 500 can include a cache of high-speed memory 512 connected directly with, in close proximity to, or integrated as part of processor 510.
Processor 510 can include any general purpose processor and a hardware service or software service, such as services 532, 534, and 536 stored in storage device 530, configured to control processor 510 as well as a special-purpose processor where software instructions are incorporated into the actual processor design. Processor 510 may essentially be a completely self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc. A multi-core processor may be symmetric or asymmetric.
To enable user interaction, computing system 500 includes an input device 545, which can represent any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech, etc. Computing system 500 can also include output device 535, which can be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems can enable a user to provide multiple types of input/output to communicate with computing system 500. Computing system 500 can include communications interface 540, which can generally govern and manage the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.
Storage device 530 can be a non-volatile memory device and can be a hard disk or other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, solid state memory devices, digital versatile disks, cartridges, random access memories (RAMs), read only memory (ROM), and/or some combination of these devices.
The storage device 530 can include software services, servers, services, etc., that when the code that defines such software is executed by the processor 510, it causes the system to perform a function. In some embodiments, a hardware service that performs a particular function can include the software component stored in a computer-readable medium in connection with the necessary hardware components, such as processor 510, connection 505, output device 535, etc., to carry out the function.
For clarity of explanation, in some instances the present technology may be presented as including individual functional blocks including functional blocks comprising devices, device components, steps or routines in a method embodied in software, or combinations of hardware and software.
Any of the steps, operations, functions, or processes described herein may be performed or implemented by a combination of hardware and software services or services, alone or in combination with other devices. In some embodiments, a service can be software that resides in memory of a client device and/or one or more servers of a content management system and perform one or more functions when a processor executes the software associated with the service. In some embodiments, a service is a program, or a collection of programs that carry out a specific function. In some embodiments, a service can be considered a server. The memory can be a non-transitory computer-readable medium.
In some embodiments, the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like. However, when mentioned, non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.
Methods according to the above-described examples can be implemented using computer-executable instructions that are stored or otherwise available from computer readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, solid state memory devices, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.
Devices implementing methods according to these disclosures can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include servers, laptops, smart phones, small form factor personal computers, personal digital assistants, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.
The instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.
Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
5581765 | Munroe et al. | Dec 1996 | A |
5893116 | Simmonds et al. | Apr 1999 | A |
5907848 | Zaiken et al. | May 1999 | A |
5926821 | Hirose et al. | Jul 1999 | A |
6061743 | Thatcher et al. | May 2000 | A |
6065018 | Beier et al. | May 2000 | A |
6108703 | Leighton et al. | Aug 2000 | A |
6336173 | Day, III et al. | Jan 2002 | B1 |
6470329 | Livschitz et al. | Oct 2002 | B1 |
6473426 | Killian et al. | Oct 2002 | B1 |
6560591 | Memmott et al. | May 2003 | B1 |
6728723 | Kathail et al. | Apr 2004 | B1 |
6834284 | Acker et al. | Dec 2004 | B2 |
6915315 | Autrey et al. | Jul 2005 | B2 |
7035847 | Brown et al. | Apr 2006 | B2 |
7117303 | Zayas et al. | Oct 2006 | B1 |
7308545 | Kekre et al. | Dec 2007 | B1 |
7318134 | Oliveira et al. | Jan 2008 | B1 |
7340723 | Antonov et al. | Mar 2008 | B2 |
7401089 | Benton et al. | Jul 2008 | B2 |
7437405 | Theis et al. | Oct 2008 | B1 |
7512638 | Jhaveri et al. | Mar 2009 | B2 |
7558926 | Oliveira et al. | Jul 2009 | B1 |
7599941 | Bahar et al. | Oct 2009 | B2 |
7685171 | Beaverson et al. | Mar 2010 | B1 |
7689510 | Lamkin et al. | Mar 2010 | B2 |
7716180 | Vermeulen et al. | May 2010 | B2 |
7814499 | Straube et al. | Oct 2010 | B2 |
7865571 | Ho et al. | Jan 2011 | B2 |
7869425 | Elliott et al. | Jan 2011 | B2 |
7870355 | Erofeev et al. | Jan 2011 | B2 |
7890646 | Khosravy et al. | Feb 2011 | B2 |
7925966 | Kaler et al. | Apr 2011 | B2 |
7937686 | Sorensen et al. | May 2011 | B2 |
7953785 | Li et al. | May 2011 | B2 |
8015491 | Shaver et al. | Sep 2011 | B2 |
8019900 | Sekar et al. | Sep 2011 | B1 |
8082231 | McDaniel et al. | Dec 2011 | B1 |
8112505 | Ben-Shaul et al. | Feb 2012 | B1 |
8140473 | Sun et al. | Mar 2012 | B2 |
8185601 | Rauhala et al. | May 2012 | B2 |
8214747 | Yankovich et al. | Jul 2012 | B1 |
8301597 | Zhou et al. | Oct 2012 | B1 |
8307028 | Kakivaya et al. | Nov 2012 | B2 |
8312046 | Eisler et al. | Nov 2012 | B1 |
8341532 | Ryan et al. | Dec 2012 | B2 |
8429540 | Yankovich et al. | Apr 2013 | B1 |
8458299 | Lin et al. | Jun 2013 | B2 |
8484260 | Caso et al. | Jul 2013 | B2 |
8503984 | Winbush, III et al. | Aug 2013 | B2 |
8527549 | Cidon | Sep 2013 | B2 |
8650159 | Zhang et al. | Feb 2014 | B1 |
8656218 | Erofeev et al. | Feb 2014 | B2 |
8661428 | Clark et al. | Feb 2014 | B2 |
8713106 | Spataro et al. | Apr 2014 | B2 |
8745755 | Borzycki | Jun 2014 | B2 |
8775374 | Araki et al. | Jul 2014 | B2 |
8805793 | Patiejunas et al. | Aug 2014 | B2 |
8819587 | Shrum et al. | Aug 2014 | B1 |
8825597 | Houston et al. | Sep 2014 | B1 |
8874799 | Derbeko et al. | Oct 2014 | B1 |
8880538 | Petersson et al. | Nov 2014 | B1 |
8892679 | Destagnol et al. | Nov 2014 | B1 |
8930412 | Nelson et al. | Jan 2015 | B2 |
8949179 | Besen | Feb 2015 | B2 |
8949208 | Xu et al. | Feb 2015 | B1 |
8959067 | Patiejunas et al. | Feb 2015 | B1 |
8959607 | Yadav et al. | Feb 2015 | B2 |
9037556 | Castellano et al. | May 2015 | B2 |
9037797 | McGroddy-Goetz et al. | May 2015 | B2 |
9043567 | Modukuri et al. | May 2015 | B1 |
9183303 | Goel et al. | Nov 2015 | B1 |
9185164 | Newhouse | Nov 2015 | B1 |
9213709 | Patiejunas et al. | Dec 2015 | B2 |
9251114 | Ancin | Feb 2016 | B1 |
9253166 | Gauda et al. | Feb 2016 | B2 |
9282169 | Chang | Mar 2016 | B1 |
9286102 | Harel et al. | Mar 2016 | B1 |
9294558 | Vincent et al. | Mar 2016 | B1 |
9361349 | Newhouse | Jun 2016 | B1 |
9384226 | Goel et al. | Jul 2016 | B1 |
9479548 | Jensen et al. | Oct 2016 | B2 |
9479567 | Koorapati et al. | Oct 2016 | B1 |
9479578 | Swanson | Oct 2016 | B1 |
9563681 | Patiejunas et al. | Feb 2017 | B1 |
9652741 | Goldberg et al. | May 2017 | B2 |
9697269 | Koorapati et al. | Jul 2017 | B2 |
9727470 | Cande et al. | Aug 2017 | B1 |
9773051 | Smith | Sep 2017 | B2 |
9817878 | Newhouse | Nov 2017 | B2 |
9819740 | Tataroiu et al. | Nov 2017 | B2 |
9852147 | Von Muhlen et al. | Dec 2017 | B2 |
9852149 | Taylor | Dec 2017 | B1 |
9852150 | Sharpe et al. | Dec 2017 | B2 |
9961149 | Poletto et al. | May 2018 | B2 |
10116732 | Canton et al. | Oct 2018 | B1 |
10146873 | Mullins | Dec 2018 | B2 |
10198452 | Habouzit et al. | Feb 2019 | B2 |
10229134 | Chiu | Mar 2019 | B2 |
10324903 | Goldberg et al. | Jun 2019 | B1 |
10503822 | Spencer | Dec 2019 | B1 |
10599673 | Goldberg | Mar 2020 | B2 |
10866931 | Lee | Dec 2020 | B2 |
10958732 | Procopio | Mar 2021 | B1 |
20020048174 | Pederson | Apr 2002 | A1 |
20020078174 | Sim et al. | Jun 2002 | A1 |
20020112058 | Weisman et al. | Aug 2002 | A1 |
20020120763 | Miloushev et al. | Aug 2002 | A1 |
20020174180 | Brown et al. | Nov 2002 | A1 |
20030018878 | Dorward et al. | Jan 2003 | A1 |
20040024786 | Anderson et al. | Feb 2004 | A1 |
20040034712 | Rajwan et al. | Feb 2004 | A1 |
20040064488 | Sinha et al. | Apr 2004 | A1 |
20040068523 | Keith et al. | Apr 2004 | A1 |
20040133573 | Miloushev et al. | Jul 2004 | A1 |
20040133606 | Miloushev et al. | Jul 2004 | A1 |
20040133607 | Miloushev et al. | Jul 2004 | A1 |
20040133652 | Miloushev et al. | Jul 2004 | A1 |
20040162900 | Bucher et al. | Aug 2004 | A1 |
20050071336 | Najork et al. | Mar 2005 | A1 |
20050091672 | Debique et al. | Apr 2005 | A1 |
20050262371 | Luke et al. | Nov 2005 | A1 |
20050289237 | Matsubara et al. | Dec 2005 | A1 |
20060041844 | Homiller et al. | Feb 2006 | A1 |
20060064467 | Libby | Mar 2006 | A1 |
20060179083 | Kulkarni et al. | Aug 2006 | A1 |
20060206547 | Kulkarni et al. | Sep 2006 | A1 |
20060277196 | Oosawa et al. | Dec 2006 | A1 |
20070024919 | Wong et al. | Feb 2007 | A1 |
20070028215 | Kamath et al. | Feb 2007 | A1 |
20070043747 | Benton et al. | Feb 2007 | A1 |
20070055703 | Zimran et al. | Mar 2007 | A1 |
20070079083 | Gladwin et al. | Apr 2007 | A1 |
20070088702 | Fridella et al. | Apr 2007 | A1 |
20070100829 | Allen et al. | May 2007 | A1 |
20070100913 | Sumner et al. | May 2007 | A1 |
20070136308 | Tsirigotis et al. | Jun 2007 | A1 |
20070198710 | Gopalakrishnan | Aug 2007 | A1 |
20070214497 | Montgomery et al. | Sep 2007 | A1 |
20070220220 | Ziv et al. | Sep 2007 | A1 |
20070250552 | Lango et al. | Oct 2007 | A1 |
20070294366 | Ozzie et al. | Dec 2007 | A1 |
20080005195 | Li et al. | Jan 2008 | A1 |
20080046218 | Dontcheva et al. | Feb 2008 | A1 |
20080141250 | Dorn et al. | Jun 2008 | A1 |
20080208870 | Tsang | Aug 2008 | A1 |
20080212616 | Augustine et al. | Sep 2008 | A1 |
20080267221 | Ozzie et al. | Oct 2008 | A1 |
20090030986 | Bates | Jan 2009 | A1 |
20090037514 | Lankford et al. | Feb 2009 | A1 |
20090055464 | Multer et al. | Feb 2009 | A1 |
20090083394 | Diot et al. | Mar 2009 | A1 |
20090094252 | Wong et al. | Apr 2009 | A1 |
20090125522 | Kodama et al. | May 2009 | A1 |
20090138529 | Bellessort et al. | May 2009 | A1 |
20090144784 | Li et al. | Jun 2009 | A1 |
20090192845 | Gudipaty et al. | Jul 2009 | A1 |
20090216745 | Allard et al. | Aug 2009 | A1 |
20090222741 | Shaw et al. | Sep 2009 | A1 |
20090271412 | Lacapra et al. | Oct 2009 | A1 |
20090271502 | Xue et al. | Oct 2009 | A1 |
20090271779 | Clark | Oct 2009 | A1 |
20090300071 | Arcese et al. | Dec 2009 | A1 |
20090313353 | Lou et al. | Dec 2009 | A1 |
20090327405 | Fitzgerald et al. | Dec 2009 | A1 |
20100011088 | Gautier et al. | Jan 2010 | A1 |
20100146569 | Janardhan et al. | Jun 2010 | A1 |
20100198944 | Ho et al. | Aug 2010 | A1 |
20100241711 | Ansari et al. | Sep 2010 | A1 |
20100293147 | Snow et al. | Nov 2010 | A1 |
20100332401 | Prahlad et al. | Dec 2010 | A1 |
20110153759 | Rathod et al. | Jun 2011 | A1 |
20110154431 | Walsh et al. | Jun 2011 | A1 |
20110225293 | Rathod et al. | Sep 2011 | A1 |
20110258488 | Nightingale et al. | Oct 2011 | A1 |
20120084379 | Peng et al. | Apr 2012 | A1 |
20120151201 | Clerc et al. | Jun 2012 | A1 |
20120197844 | Wang et al. | Aug 2012 | A1 |
20120203817 | Hu et al. | Aug 2012 | A1 |
20120221520 | Garrett et al. | Aug 2012 | A1 |
20120221811 | Sparkes et al. | Aug 2012 | A1 |
20120226649 | Kovacs et al. | Sep 2012 | A1 |
20130013560 | Goldberg et al. | Jan 2013 | A1 |
20130014023 | Lee et al. | Jan 2013 | A1 |
20130041872 | Aizman et al. | Feb 2013 | A1 |
20130073689 | Kolam et al. | Mar 2013 | A1 |
20130080919 | Kiang et al. | Mar 2013 | A1 |
20130094445 | De et al. | Apr 2013 | A1 |
20130135608 | Payne et al. | May 2013 | A1 |
20130138608 | Smith | May 2013 | A1 |
20130138619 | Krislov | May 2013 | A1 |
20130160072 | Reus et al. | Jun 2013 | A1 |
20130191339 | Haden et al. | Jul 2013 | A1 |
20130198600 | Lockhart et al. | Aug 2013 | A1 |
20130212112 | Blom et al. | Aug 2013 | A1 |
20130212484 | Joshi et al. | Aug 2013 | A1 |
20130212485 | Yankovich et al. | Aug 2013 | A1 |
20130218837 | Bhatnagar et al. | Aug 2013 | A1 |
20130227083 | Kim et al. | Aug 2013 | A1 |
20130268480 | Dorman | Oct 2013 | A1 |
20130275398 | Dorman et al. | Oct 2013 | A1 |
20130275509 | Micucci et al. | Oct 2013 | A1 |
20130297887 | Woodward et al. | Nov 2013 | A1 |
20130318229 | Bakre et al. | Nov 2013 | A1 |
20130318593 | Smith | Nov 2013 | A1 |
20130332418 | Kim | Dec 2013 | A1 |
20130339407 | Sharpe et al. | Dec 2013 | A1 |
20130346374 | Wolf et al. | Dec 2013 | A1 |
20130346557 | Chang et al. | Dec 2013 | A1 |
20140013112 | Cidon | Jan 2014 | A1 |
20140025948 | Bestler et al. | Jan 2014 | A1 |
20140032710 | Shin | Jan 2014 | A1 |
20140046906 | Patiejunas et al. | Feb 2014 | A1 |
20140047070 | Lee et al. | Feb 2014 | A1 |
20140053227 | Ruppin et al. | Feb 2014 | A1 |
20140059642 | Deasy et al. | Feb 2014 | A1 |
20140067990 | Abdelhameed | Mar 2014 | A1 |
20140074663 | Alsina et al. | Mar 2014 | A1 |
20140074783 | Alsina et al. | Mar 2014 | A1 |
20140101310 | Savage | Apr 2014 | A1 |
20140101434 | Senthurpandi | Apr 2014 | A1 |
20140115115 | Kuang et al. | Apr 2014 | A1 |
20140122428 | Zhou et al. | May 2014 | A1 |
20140126800 | Lang et al. | May 2014 | A1 |
20140143446 | Jacobson et al. | May 2014 | A1 |
20140149794 | Shetty | May 2014 | A1 |
20140156793 | Chan et al. | Jun 2014 | A1 |
20140164315 | Golshan | Jun 2014 | A1 |
20140172783 | Suzuki et al. | Jun 2014 | A1 |
20140173027 | Kappes et al. | Jun 2014 | A1 |
20140173137 | Jacobson et al. | Jun 2014 | A1 |
20140181697 | Kirigin | Jun 2014 | A1 |
20140188803 | James et al. | Jul 2014 | A1 |
20140195652 | Yerkes | Jul 2014 | A1 |
20140208220 | Watal | Jul 2014 | A1 |
20140215303 | Grigorovitch | Jul 2014 | A1 |
20140215436 | Deluca et al. | Jul 2014 | A1 |
20140215551 | Allain et al. | Jul 2014 | A1 |
20140215568 | Kirigin et al. | Jul 2014 | A1 |
20140229839 | Lynch et al. | Aug 2014 | A1 |
20140250073 | Zalpuri et al. | Sep 2014 | A1 |
20140280602 | Quatrano | Sep 2014 | A1 |
20140304384 | Varenhorst et al. | Oct 2014 | A1 |
20140304618 | Carriero et al. | Oct 2014 | A1 |
20140324777 | Novak et al. | Oct 2014 | A1 |
20140324945 | Novak et al. | Oct 2014 | A1 |
20140330874 | Novak et al. | Nov 2014 | A1 |
20140358860 | Wautier et al. | Dec 2014 | A1 |
20140359465 | Litan et al. | Dec 2014 | A1 |
20140365432 | Jain et al. | Dec 2014 | A1 |
20140379586 | Sawyer | Dec 2014 | A1 |
20150006146 | Wilkes et al. | Jan 2015 | A1 |
20150006475 | Guo et al. | Jan 2015 | A1 |
20150019432 | Burns et al. | Jan 2015 | A1 |
20150046557 | Rosenberg | Feb 2015 | A1 |
20150052392 | Mickens et al. | Feb 2015 | A1 |
20150058932 | Faitelson et al. | Feb 2015 | A1 |
20150082198 | Destagnol et al. | Mar 2015 | A1 |
20150113222 | Naik et al. | Apr 2015 | A1 |
20150134808 | Fushman et al. | May 2015 | A1 |
20150142742 | Hong | May 2015 | A1 |
20150149410 | Haon | May 2015 | A1 |
20150161016 | Bulkowski et al. | Jun 2015 | A1 |
20150172120 | Dwarampudi | Jun 2015 | A1 |
20150180948 | Shao | Jun 2015 | A1 |
20150186395 | Yan et al. | Jul 2015 | A1 |
20150207844 | Tataroiu et al. | Jul 2015 | A1 |
20150227757 | Bestler et al. | Aug 2015 | A1 |
20150249647 | Mityagin et al. | Sep 2015 | A1 |
20150254320 | Cowling et al. | Sep 2015 | A1 |
20150261732 | Kim | Sep 2015 | A1 |
20150278168 | Hawa | Oct 2015 | A1 |
20150278764 | Patil | Oct 2015 | A1 |
20150278884 | Manzari et al. | Oct 2015 | A1 |
20150288754 | Mosko et al. | Oct 2015 | A1 |
20150288755 | Mosko et al. | Oct 2015 | A1 |
20150347552 | Habouzit et al. | Dec 2015 | A1 |
20150347553 | Aizman et al. | Dec 2015 | A1 |
20150358373 | Famaey et al. | Dec 2015 | A1 |
20160006646 | Lin et al. | Jan 2016 | A1 |
20160021172 | Mahadevan et al. | Jan 2016 | A1 |
20160044126 | Mahadevan et al. | Feb 2016 | A1 |
20160050177 | Cue et al. | Feb 2016 | A1 |
20160055248 | Goel et al. | Feb 2016 | A1 |
20160057217 | Beaverson et al. | Feb 2016 | A1 |
20160062963 | Umapathy | Mar 2016 | A1 |
20160078068 | Agrawal et al. | Mar 2016 | A1 |
20160087931 | Kim et al. | Mar 2016 | A1 |
20160092443 | Hayes et al. | Mar 2016 | A1 |
20160154817 | Mason, Jr | Jun 2016 | A1 |
20160164761 | Sathyanarayana et al. | Jun 2016 | A1 |
20160217387 | Okanohara et al. | Jul 2016 | A1 |
20160224548 | Massand | Aug 2016 | A1 |
20160226970 | Newhouse et al. | Aug 2016 | A1 |
20160267103 | Slik et al. | Sep 2016 | A1 |
20160291856 | von Muhlen | Oct 2016 | A1 |
20160292179 | Von Muhlen et al. | Oct 2016 | A1 |
20160292443 | Von Muhlen et al. | Oct 2016 | A1 |
20160313934 | Isherwood et al. | Oct 2016 | A1 |
20160321311 | Tallamraju | Nov 2016 | A1 |
20160321338 | Isherwood et al. | Nov 2016 | A1 |
20160371241 | Wong | Dec 2016 | A1 |
20170017551 | Nichols | Jan 2017 | A1 |
20170017779 | Huang | Jan 2017 | A1 |
20170078383 | Murstein | Mar 2017 | A1 |
20170103066 | Kisin | Apr 2017 | A1 |
20170109370 | Newhouse | Apr 2017 | A1 |
20170124111 | Sharma et al. | May 2017 | A1 |
20170124170 | Koorapati et al. | May 2017 | A1 |
20170126782 | Koorapati et al. | May 2017 | A1 |
20170126800 | Koorapati et al. | May 2017 | A1 |
20170126802 | Koorapati et al. | May 2017 | A1 |
20170177332 | Deluca et al. | Jun 2017 | A1 |
20170195417 | Brand | Jul 2017 | A1 |
20170208052 | Jai | Jul 2017 | A1 |
20170208125 | Jai | Jul 2017 | A1 |
20170222865 | Koorapati et al. | Aug 2017 | A1 |
20170249328 | Liang | Aug 2017 | A1 |
20170255687 | Koorapati et al. | Sep 2017 | A1 |
20180048687 | Bryant et al. | Feb 2018 | A1 |
20180060410 | Stading et al. | Mar 2018 | A1 |
20180150435 | Kim | May 2018 | A1 |
20180157467 | Stachura | Jun 2018 | A1 |
20180196816 | Maybee | Jul 2018 | A1 |
20180343134 | Press | Nov 2018 | A1 |
20190155534 | Eda | May 2019 | A1 |
20190155870 | Prakash | May 2019 | A1 |
20190171729 | Christiansen | Jun 2019 | A1 |
20190188187 | Brand | Jun 2019 | A1 |
20190295103 | Tehranchi | Sep 2019 | A1 |
20190332688 | Valentine | Oct 2019 | A1 |
20190364108 | Berger | Nov 2019 | A1 |
20200210383 | Demaris | Jul 2020 | A1 |
20200296100 | Prahlad | Sep 2020 | A1 |
20200304481 | Rathore | Sep 2020 | A1 |
20200358779 | Momchilov | Nov 2020 | A1 |
20210055999 | Bhange | Feb 2021 | A1 |
Number | Date | Country |
---|---|---|
1517260 | Mar 2005 | EP |
2924244 | May 2009 | FR |
H0816444 | Jan 1996 | JP |
2003030026 | Jan 2003 | JP |
2005011354 | Jan 2005 | JP |
2005141475 | Jun 2005 | JP |
2008538843 | Nov 2008 | JP |
2008305221 | Dec 2008 | JP |
2010074604 | Apr 2010 | JP |
2012079042 | Apr 2012 | JP |
2012079043 | Apr 2012 | JP |
2012093911 | May 2012 | JP |
2012513632 | Jun 2012 | JP |
2012182292 | Sep 2012 | JP |
2013182292 | Sep 2013 | JP |
2014038569 | Feb 2014 | JP |
2015505627 | Feb 2015 | JP |
2015058627 | Mar 2015 | JP |
2016505964 | Feb 2016 | JP |
2005060387 | Apr 2009 | WO |
2009124014 | Oct 2009 | WO |
2010073110 | Jul 2010 | WO |
2014099044 | Jun 2014 | WO |
2015031755 | Mar 2015 | WO |
2015153045 | Oct 2015 | WO |
Entry |
---|
Ganzha M., et al., “Identifier Management in Semantic Interoperability Solutions for IoT,” IEEE International Conference on Communications Workshops, Jul. 12, 2018, downloaded from the Internet: https://www.researchgate.net/publication/326218197_Identifier_Management_in_Semantic_Interoperabilit . . . , 7 pages. |
Office Action for U.S. Appl. No. 15/010,220 dated Oct. 25, 2016, 15 pages. |
Office Action for U.S. Appl. No. 15/010,220 dated Sep. 28, 2017, 24 pages. |
Office Action for U.S. Appl. No. 15/010,235 dated May 12, 2016, 11 pages. |
Office Action for U.S. Appl. No. 15/332,782 dated Oct. 5, 2018, 39 pages. |
Office Action for U.S. Appl. No. 15/355,286 dated Mar. 19, 2019, 17 pages. |
Office Action for U.S. Appl. No. 15/355,305 dated May 22, 2017, 11 pages. |
Office Action for U.S. Appl. No. 15/603,193 dated Sep. 11, 2017, 11 pages. |
Office Action for U.S. Appl. No. 15/870,365 dated Jul. 25, 2019, 14 pages. |
Search Report for Japanese Application No. 2017-550811 dated Dec. 20, 2018, 6 pages. |
Search Report for Japanese Application No. 2017-550817 dated Dec. 25, 2018, 8 pages. |
Second Examination Report for Australian Application No. 2016243644 dated Dec. 18, 2018, 4 pages. |
Summons to Attend Oral Proceedings Pursuant to Rule 115(1) EPC for EP Application No. 16791146.0 dated Jan. 13, 2020, 13 pages. |
Syncovery, “Syncovery: Blocking Level Copying,” downloaded from www.synovery.com/block-level-copying/ on May 22, 2014, 2 pages. |
Tridgell A., et al., “TR-CS-96-05 The Rsync Algorithm,” Jun. 1996, 8 pages. |
White T., “Chapter 3: The Hadoop Distributed Filesystem,” Hadoop—The Definitive Guide, 4th Edition, Apr. 17, 2015, pp. 43-78. |
Zhu Z., et al., “Let's ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking,” 21st IEEE International Conference on Network Protocols (ICNP), 2013, 10 pages. |
Final Office Action from U.S. Appl. No. 15/332,782, dated Jan. 22, 2020, 20 pages. |
Final Office Action from U.S. Appl. No. 15/984,968, dated Feb. 3, 2020, 20 pages. |
Final Office Action from U.S. Appl. No. 15/984,968, dated Sep. 8, 2020, 24 pages. |
First Examination Report for Australian Application No. 2016346892 dated Jan. 21, 2019, 3 pages. |
First Office Action for Japanese Application No. 2018-504709 dated May 31, 2019, 12 pages. |
Griffith-Jones G., “Log file,” Wikipedia, XP055701533, Aug. 21, 2015, Retrieved from https://en.wikipedia.org/w/index.php?title=Log_file&oldid=677169702 on Jun. 5, 2020, 3 pages. |
Hendrickson M., “Dropbox: The Online Storage Solution We've Been Waiting for?,” TechCrunch.com, Mar. 11, 2008, Downloaded from https://techcrunch.com/2008/03/11/dropbox-the-online-storage-solution-wev-e-been-waiting-for/, 6 pages. |
International Search Report and Written Opinion for PCT Application No. PCT/US2016/025014, dated Jul. 14, 2016, 11 pages. |
International Search Report and Written Opinion for PCT Application No. PCT/US2016/025015, dated Jun. 16, 2016, 11 pages. |
International Search Report and Written Opinion for PCT Application No. PCT/US2016/056344, dated Feb. 28, 2017, 22 pages. |
International Search Report and Written Opinion for PCT Application No. PCT/US2016/056345, dated Feb. 28, 2017, 20 pages. |
International Search Report and Written Opinion for PCT Application No. PCT/US2016/056346, dated Jan. 5, 2017, 11 pages. |
International Search Report and Written Opinion for PCT Application No. PCT/US2017/014945, dated Mar. 14, 2017, 11 pages. |
International Search Report and Written Opinion for PCT Application No. PCT/US2016/0056349, dated Jan. 18, 2017, 12 pages. |
International Search Report for PCT Application No. PCT/US2016/056348, dated Jan. 19, 2007, 14 pages. |
Interview Summary for U.S. Appl. No. 14/961,067 dated Oct. 11, 2017, 2 pages. |
Interview summary for U.S. Appl. No. 14/979,252 dated Aug. 27, 2019, 3 Pages. |
Interview Summary for U.S. Appl. No. 14/979,252 dated Mar. 15, 2019, 4 pages. |
Interview Summary for U.S. Appl. No. 15/332,782 dated Oct. 23, 2019, 3 pages. |
Jia A.L., et al., “Designs and Evaluation of a Tracker in P2P Networks”, Peer-to-Peer Computing , 2008, P2P'08, Eighth International Conference on IEEE, Piscataway, NJ, USA, ISBN 978-0-7695-3318-6, Sep. 8, 2008, pp. 227-230. |
Koorapati N., “Streaming File Synchronization,” Dropbox Tech Blog, Jul. 11, 2014, 14 pages. |
Lefebvre R., “Mastering iCloud on Your Mac: Use iClouDrive to Access Your Files Like Dropbox [OS X Tips],” Posted on Mar. 28, 2013 at Cult of Mac, retrieved on Oct. 17, 2016, 3 pages. |
Li B., “Simplifying Data Management: NFS access to HDFS,” Hortonworks, May 13, 2013, retrieved from http://nortonworks.com/blog/simplifying-data-management-nfs-access-to-hdfs/, 13 pages. |
Nikkei Business Publications Inc., “One Device for on the Go or at Home! Evolution of the Notebook PC, Windows Tablet Complete Strategy, PC Cooperation Volume: Simple File Sharing Via Cloud”, Nikkei PC21, Aug. 24, 2014, vol. 19(14), pp. 30-35 (11 pages). |
Non-Final Office Action from U.S. Appl. No. 15/870,365, dated Apr. 15, 2020, 15 pages. |
Non-Final Office Action from U.S. Appl. No. 15/891,296, dated Jan. 16, 2020, 12 pages. |
Non-Final Office Action from U.S. Appl. No. 15/984,968, dated May 20, 2020, 17 pages. |
Non-Final Office Action from U.S. Appl. No. 15/984,968, dated Oct. 3, 2019, 17 pages. |
Notice of Acceptance for Australian Application No. 2016242857 dated Dec. 18, 2018, 3 pages. |
Notice of Allowance from U.S. Appl. No. 14/979,252, dated Apr. 2, 2020, 6 pages. |
Notice of Allowance from U.S. Appl. No. 14/979,252, dated Apr. 24, 2020, 3 pages. |
Notice of Allowance from U.S. Appl. No. 14/979,252, dated Dec. 11, 2019, 11 pages. |
Notice of Allowance from U.S. Appl. No. 14/979,252, dated May 19, 2020, 2 pages. |
Notice of Allowance from U.S. Appl. No. 15/332,782, dated Apr. 6, 2020, 11 pages. |
Notice of Allowance from U.S. Appl. No. 15/332,782, dated Apr. 29, 2020, 13 pages. |
Notice of Allowance from U.S. Appl. No. 15/355,286, dated Jan. 15, 2020, 5 pages. |
Notice of Allowance from U.S. Appl. No. 15/355,286, dated Jul. 8, 2020, 2 pages. |
Notice of Allowance from U.S. Appl. No. 15/870,365, dated Aug. 17, 2020, 12 pages. |
Notice of Allowance from U.S. Appl. No. 15/870,365, dated Jan. 23, 2020, 2 pages. |
Notice of Allowance from U.S. Appl. No. 15/870,365, dated Nov. 8, 2019, 11 pages. |
Notice of Allowance from U.S. Appl. No. 15/891,296, dated Apr. 29, 2020, 8 pages. |
Moticeof Allowance for U.S. Appl. No. 14/961,067 dated Nov. 6, 2017, 10 pages. |
Notice of Allowance for U.S. Appl. No. 14/979,234 dated Jun. 13, 2016, 14 pages. |
Notice of Allowance for U.S. Appl. No. 14/979,256 dated Aug. 5, 2016, 8 pages. |
Notice of Allowance for U.S. Appl. No. 14/979,268 dated Mar. 23, 2017, 9 pages. |
Notice of Allowance for U.S. Appl. No. 15/010,235 dated Aug. 30, 2016, 7 pages. |
Notice of Allowance for U.S. Appl. No. 15/355,305 dated Sep. 22, 2017, 5 pages. |
Notice of Allowance for U.S. Appl. No. 15/603,193 dated Jul. 10, 2018, 8 pages. |
Notice of Allowance for U.S. Appl. No. 15/010,220 dated Feb. 22, 2018, 9 pages. |
Office Action for U.S. Appl. No. 14/961,067 dated Jul. 7, 2017, 13 pages. |
Office Action for U.S. Appl. No. 14/979,226 dated Jun. 16, 2016, 8 pages. |
Office Action for U.S. Appl. No. 14/979,226 dated Mar. 23, 2017, 10 pages. |
Office Action for U.S. Appl. No. 14/979,226 dated Nov. 16, 2016, 10 pages. |
Office Action for U.S. Appl. No. 14/979,252 dated Dec. 14, 2018, 30 pages. |
Office Action for U.S. Appl. No. 14/979,252 dated May 23, 2016, 17 pages. |
Office Action for U.S. Appl. No. 14/979,252 dated Oct. 26, 2017, 24 pages. |
Office Action for U.S. Appl. No. 14/979,256 dated May 4, 2016, 11 pages. |
Office Action for U.S. Appl. No. 14/979,268 dated May 18, 2016, 20 pages. |
Australian Claims in application No. 2016346892, dated Jan. 2019, 9 pages. |
Barr, J., “Amazon S3: Multipart Upload,” Nov. 10, 2010, Retrieved from https://aws.amazon.com/blogs/aws/amazon-s3-multipart-upload/ on Feb. 3, 2015, 3 pages. |
Bonadea, et al., “Cloud Storage,” Wikipedia, Oct. 28, 2015, downloaded from https://en.wikipedia.org/w/index.php?title=Cloud_storage&oldid=687899972 on Dec. 20, 2016, 5 pages. |
Brim M., “Control and Inspection of Distributed Process Groups at Extreme Scale via Group File Semantics,” ProQuest Dissertations Publishing, 2012, Dissertation/thesis No. 3508182, 202 pages. |
Camacho H.E., et al., “A Cloud Environment for Backup and Data Storage”, International Conference on Electronics, Communications and Computers (CONIELECOMP), 2014, 7 pages. |
Claims for Japanese Application No. 2017-550811 dated Dec. 2018, 4 pages. |
Claims for Japanese Application No. 2017-550817 dated Dec. 2018, 4 pages. |
Claims for Japanese Application No. 2018-504709 dated May 2019, 9 pages. |
Claims in Australian Application No. 2016242857, dated Dec. 2018, 4 pages. |
Claims in Australian Application No. 2016243644, dated Dec. 2018, 4 pages. |
Communication Pursuant to Article 94(3) EPC for European Application No. 16791147.8 mailed on Nov. 28, 2019, 4 pages. |
Communication Pursuant to Article 94(3) for EP Application No. 16715433.5 dated Oct. 9, 2019, 6 pages. |
Communication Pursuant to Article 94(3) EPC for European Application No. 17703601.9 mailed on Mar. 4, 2020, 8 pages. |
Communication Pursuant to Article 94(3) for EP Application No. 16791147.8 dated Feb. 18, 2019, 5 pages. |
Communication under rule 71(3) EPC for European Application No. 16715433.5 mailed on Jul. 20, 2020, 42 pages. |
Communication under rule 71(3) EPC Intention to Grant for European Application No. 16791147.8 dated Apr. 30, 2020, 7 pages. |
Communication under Rule 71(3) EPC of Intention to Grant for European Application No. 16790778.1 dated May 4, 2020, 7 pages. |
Communication under Rule 71(3) EPC of Intention to Grant for European Application No. 16791148.6 dated May 11, 2020, 7 pages. |
Result of consultation for European Application No. 16715433.5 mailed on May 28, 2020, 3 pages. |
Current Claims in PCT Application No. PCT /US2016/0056349, dated Jan. 2017, 3 pages. |
Current Claims in PCT Application No. PCT/US2016/056348, dated Jan. 2017, 4 pages. |
Dee M., “Inside LAN Sync”, DropBox Tech Blog, Oct. 13, 2015, 9 pages. |
Drago I., et al., “Inside Dropbox: Understanding Personal Cloud Storage Services,” Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC, XP055131706, Nov. 14, 2012, vol. 16, 14 pages. |
“Dropbox Screenshot,” Publically available Jul. 3, 2013, retrieved from http://www.filewin.net/Dropbox/] via Internet Archive on Oct. 17, 2016, 2 pages. |
European Claims in application No. 16791146.0, dated Dec. 2018, 4 pages. |
European Claims in application No. 16791147.8, dated Feb. 2019, 5 pages. |
European Claims in PCT Application No. PCT/US2016/025014, dated Jul. 2016, 7 pages. |
European Claims in PCT Application No. PCT/US2016/025015, dated Jun. 2016, 6 pages. |
European Claims in PCT Application No. PCT/US2016/056344, dated Feb. 2017, 4 pages. |
European Claims in PCT Application No. PCT/US2016/056345, dated Feb. 2017, 6 pages. |
European Claims in PCT Application No. PCT/US2016/056346, dated Jan. 2017, 9 pages. |
European Claims in PCT Application No. PCT/US2017/014945, dated Mar. 2017, 4 pages. |
European Search Report for EP Application No. 16791146.0 dated Dec. 7, 2013, 15 pages. |
Extended European Search Report for EP Application No. 20152072.3 dated Jun. 16, 2020, 11 pages. |
Final Office Action for U.S. Appl. No. 14/979,252 dated Jul. 1, 2019, 24 pages. |
Final Office Action for U.S. Appl. No. 14/979,252 dated May 3, 2018, 27 pages. |
Final Office Action for U.S. Appl. No. 14/979,252 dated Nov. 21, 2016, 22 pages. |
Final Office Action for U.S. Appl. No. 14/979,268 dated Nov. 18, 2016, 15 pages. |
Final Office Action for U.S. Appl. No. 15/010,220 dated Feb. 22, 2017, 22 pages. |
Final Office Action for U.S. Appl. No. 15/332,782 dated Feb. 7, 2019, 28 pages. |
Final Office Action for U.S. Appl. No. 15/355,286 dated Aug. 29, 2019, 12 pages. |
Final Office Action for U.S. Appl. No. 15/603,193 dated Jan. 29, 2018, 21 pages. |
Number | Date | Country | |
---|---|---|---|
20210176312 A1 | Jun 2021 | US |