Abstract:
The present disclosure is directed generally to systems and methods for providing load balancing as a service. A load balancer executing on a device intermediary to a server and a plurality of clients can receive a request from an agent executing on the server. The request can be to initiate establishment of a transport layer connection. The load balancer can accept the request to establish the transport layer connection with the server. The load balancer can receive a request to access the server from a client of the plurality of clients. The load balancer can forward the request to the server via the transport layer connection established between the load balancer and the server responsive to the request of the server.
Abstract:
The present application is directed towards ASDR table contract renewal. In some embodiments, a core may cache an ASDR table entry received from an owner core such that when the entry is needed again the core does not need to re-request the entry from the owner core. As storing a cached copy of the entry allows the non-owner core to use an ASDR table entry without requesting the entry from the owner core, the owner core may be unaware of an ASDR table entry's use by a non-owner core. To ensure the owner core keeps the ASDR table entry alive, which the non-owner core has cached, the non-owner core may perform contract renewal for each of its recently used cached entries. The contract renewal method may include sending a message to the owner core that indicates which cached ASDR table entries the non-owner core has recently used or accessed. Responsive to receiving the message the owner core may reset a timeout period associated with the ASDR table entry.
Abstract:
Data from a SaaS application may be stored and accessed locally, enabling SaaS data to be interacted with, regardless of connectivity, while providing secure authentication when offline. When online, a user may perform an authentication procedure and provide credentials to an application server, which may provide an authentication token for access to secure data or applications. The authentication token and user credentials may be cached locally. When offline or experiencing intermittent connectivity, if user provided credentials match the cached credentials, then the client application may retrieve the cached authentication token and allow the embedded browser to resume utilizing the network application and/or data; while if the new credentials do not match the previously provided and cached credentials, access may be denied. Thus, the embedded browser may perform authentication agnostic to whether the device is online or offline at that time, requiring no changes to the browser or network application.
Abstract:
Embodiments described include systems and methods for presenting additional content for a network application accessed via an embedded browser of a client application are provided. Additional content related to network applications may be presented on client devices. Specifically, activity such as embedded browser activity may be monitored. Responsive to detecting an event based on the monitored activity, additional content related to the network application may be provided. In various embodiments, the additional content is provided to a client application on the client device for presentation on the client device.
Abstract:
Described embodiments provide systems and methods for displaying a service graph in association with a time of a detected anomaly. A device may store a plurality of snapshots of a service graph of a plurality of microservices. Each of the snapshots of the service graphs include metrics at a respective time increment from execution of each of the plurality of microservices. The device may detect an anomaly with operation of one or more microservices of the plurality of services. The device may identify a set of snapshots of the service graph within a predetermined time period of a time of the anomaly. The device may display each of the snapshots in the set of snapshots of in sequence corresponding to time increments within the predetermined time period of the time of the anomaly.
Abstract:
Systems and methods for enhancing user engagement with network applications include client application executed by a client device, the client application comprising an embedded browser, in communication with one or more application servers providing a plurality of network applications. The embedded browser is configured to access a first network application and a second network application. The client application is configured to: track interactions of a user via the embedded browser with the first network application and the second network application, each interaction having a corresponding score; generate an aggregate score for the user from the scores of each tracked interaction; transmit, to a first application server, the aggregate score for the user; and receive, from the first application server, a score table comprising a plurality of scores of users including the aggregate score for the user. The embedded browser is further configured to display the score table to the user.
Abstract:
A client application installed on a client device may monitor communications flows between embedded browsers of the client application and one or more servers, including enterprise servers and non-enterprise servers, at upper layers of a network stack of the client device including the application layer, session layer, and presentation layer. Communications to different endpoints may be classified as enterprise or non-enterprise, measured, and aggregated to provide disambiguation of enterprise and non-enterprise communications of the device transiting a single communications link (e.g. cellular data connection). Server and network policies may be applied in accordance with the measurements with higher accuracy than policies based on total bandwidth utilized by the device without regard to its classification. These policies may include load balancing, communication pooling, multiplexing, buffering, pre-fetching or edge caching of data, instantiating or halting execution of virtual machines in a cloud environment, or other such functions.
Abstract:
In some aspects, a method for using a transparent window to augment an application includes establishing a transparent window to be displayed in synchronization over a first window of an application on a client device. The content of the application in the first window is viewable through the transparent window. The method further includes detecting, by the transparent window, one or more encoded portions of content of the application being displayed in the first window, and displaying, by and in the transparent window, a decoded form of the one or more encoded portions of the content of the application displayed in the first window.
Abstract:
Data from a SaaS application may be stored and accessed locally, enabling SaaS data to be interacted with, regardless of connectivity, while providing secure authentication when offline. When online, a user may perform an authentication procedure and provide credentials to an application server, which may provide an authentication token for access to secure data or applications. The authentication token and user credentials may be cached locally. When offline or experiencing intermittent connectivity, if user provided credentials match the cached credentials, then the client application may retrieve the cached authentication token and allow the embedded browser to resume utilizing the network application and/or data; while if the new credentials do not match the previously provided and cached credentials, access may be denied. Thus, the embedded browser may perform authentication agnostic to whether the device is online or offline at that time, requiring no changes to the browser or network application.
Abstract:
Embodiments described include systems and methods for incorporating a watermark in an audio output. An embedded browser, which is executable on one or more processors of a client device, may detect an audio data stream from a network application accessed via the embedded browser. A watermarking engine of the embedded browser intercepts the audio data stream responsive to detecting the audio data stream. The watermarking engine incorporates a digital signal corresponding to a watermark into the audio data stream, prior to being produced as an audio output by an audio speaker. The watermarking engine causes the watermark to be present in the audio output produced by the audio speaker, the watermark configured to be inaudible by a human and recordable by an audio recording device.