Abstract:
The present application is directed towards using a distributed hash table to track the use of resources and/or maintain the persistency of resources across the plurality of nodes in the multi-node system. More specifically, the systems and methods can maintain the persistency of resources across the plurality of nodes by the use of a global table. A global table may be maintained on each node. Each node's global table enables efficient storage and retrieval of distributed hash table entries. Each global table may contain a linked list of the cached distributed hash table entries that are currently stored on a node.
Abstract:
The present disclosure is directed generally to systems and methods for providing load balancing as a service. A load balancer executing on a device intermediary to a server and a plurality of clients can receive a request from an agent executing on the server. The request can be to initiate establishment of a transport layer connection. The load balancer can accept the request to establish the transport layer connection with the server. The load balancer can receive a request to access the server from a client of the plurality of clients. The load balancer can forward the request to the server via the transport layer connection established between the load balancer and the server responsive to the request of the server.
Abstract:
The present application is directed towards systems and methods of hunting for a hash table entry in a hash table distributed over a multi-node system. More specifically, when entries are created in an ASDR table, the owner node of the entry may replicate the entry onto a non-owner node. The replica can act as a backup of the ASDR table entry in the event the node leaves the multi-mode system. When the node returns to the multi-node system, the node may no longer have the most up to date ASDR table entries, and may hunt to find the existence of the value associated with the entry. Responsive to receiving a request for an entry that may be outdated on the node, the node sends a request down a replication chain for an updated copy of the ASDR table entry from one of the replicas. Responsive to receiving the replica copy of the entry, the node responds to the client's request for the entry.
Abstract:
Embodiments described include systems and methods for executing in an embedded browser an application script for network applications of different origins. A client application can establish a first session with a first network application of a first entity at a first origin via an embedded browser within the client application and a second session with a second network application of a second entity at a second origin via the embedded browser within the client application. A scripting engine within the client application of a client device of a user at a third origin can identify an application script having instructions to interact with the first network application and the second network application, and can execute the instructions to perform a task across the first network application of the first entity at the first origin and the second network application of the second entity at the second origin.
Abstract:
Systems and methods for providing a privacy screen to a network application accessed via an embedded browser of a client application are described. The method includes establishing, by a client application on a client device, a session to a network application hosted on a third party server. The client application includes an embedded browser for accessing the network application. The method further includes identifying, by the client application, a policy for providing a privacy screen to one or more portions of the network application, detecting, by the embedded browser, that the one or more portions of the network application are to be rendered on a display of the client device, and displaying a privacy screen including one or more masks displayed over at least the one or more portions of the network application rendered on the display of the client device via the embedded browser.
Abstract:
Embodiments described herein include systems and methods for encapsulating HTML. A remote browser executing on a server may be configured to provide a document object model (DOM) of HTML of a webpage rendered by the remote browser at the server. A transcoding agent executing in the remote browser may be configured to encapsulate the HTML. The transcoding agent may be configured to send the encapsulated HTML via a remote delivery session to a local browser for rendering. The local browser may execute on a client device and may maintain a DOM for the encapsulated HTML. The transcoding agent may be configured to receive events corresponding to the DOM maintained by the local browser. The remote browser may further be configured to cause the received events to execute on the DOM provided by the remote browser.
Abstract:
Embodiments described herein include systems and methods for encapsulating HTML. A remote browser executing on a server may be configured to provide a document object model (DOM) of HTML of a webpage rendered by the remote browser at the server. A transcoding agent executing in the remote browser may be configured to encapsulate the HTML. The transcoding agent may be configured to send the encapsulated HTML via a remote delivery session to a local browser for rendering. The local browser may execute on a client device and may maintain a DOM for the encapsulated HTML. The transcoding agent may be configured to receive events corresponding to the DOM maintained by the local browser. The remote browser may further be configured to cause the received events to execute on the DOM provided by the remote browser.
Abstract:
Embodiments described include systems and methods for encoding and decoding data for a network application. A client application may include an embedded browser. The embedded browser may establish a session with a network application. The client application may identify a policy specifying a type of data to encode upon input. The embedded browser may detect the type of data of an input field of the network application being displayed in the embedded browser. The embedded browser may, responsive to the detection and the policy, encode the data inputted into the input field or decode encoded data displayed in the input field.
Abstract:
In some aspects, a method for revoking access to a network application on a client device. The method includes establishing, by a client application on a client device responsive to authenticating a user, access to one or more network applications of one or more first servers of a first entity via an embedded browser of the client application, receiving, by the client application, a notification from a second server of a second entity that access for the user to a network application of the one or more network applications is to be revoked, and performing, by the client application responsive to the notification, one or more revoking actions based at least on a policy.
Abstract:
Embodiments described include systems and methods for presenting additional content for a network application accessed via an embedded browser of a client application are provided. Additional content related to network applications may be presented on client devices. Specifically, activity such as embedded browser activity may be monitored. Responsive to detecting an event based on the monitored activity, additional content related to the network application may be provided. In various embodiments, the additional content is provided to a client application on the client device for presentation on the client device.