Abstract:
Systems, methods, and computer-readable media for lazy tracking mechanisms for web caching systems are provided. The lazy tracking mechanism may track and perform asynchronous (async) computation of dirty records for client-side caching mechanisms. The async computation of dirty records may include tracking or accounting for invalidated records relevant to a particular client or user system. Invalidation messages may be sent to client/user systems in response to receipt of a request for updated records, or in response to a request for a particular item. Other embodiments may be described and/or claimed.
Abstract:
Computer-implemented systems and methods are provided for configuring action buttons of a particular page that is displayed at a graphical user interface (GUI) of a particular client device of a particular tenant. In one embodiment, a console computer of a particular tenant is in communication with a server of an application provider. Based on a context that is specified by that particular tenant for that particular page, the console computer can be used to define a subset of relevant action buttons to be displayed at the GUI for the particular page, and an arrangement that orders the subset of relevant action buttons. The particular page can then be displayed at the GUI of the particular client device such that it includes the subset of relevant action buttons that have been arranged according to the arrangement.
Abstract:
Systems, methods, and computer-readable media for lazy tracking mechanisms for web caching systems are provided. The lazy tracking mechanism may track and perform asynchronous (async) computation of dirty records for client-side caching mechanisms. The async computation of dirty records may include tracking or accounting for invalidated records relevant to a particular client or user system. Invalidation messages may be sent to client/user systems in response to receipt of a request for updated records, or in response to a request for a particular item. Other embodiments may be described and/or claimed.
Abstract:
Techniques are disclosed relating to invalidating keys in a cache. In some embodiments, a computer system may implement a cache for a data store, where the cache stores a data set and is organized such that a stored data item of the data set is specified by a corresponding key having one or more portions. The computer system may store metadata for the cache, where the metadata includes nodes organized in a hierarchy. The computer system may receive a request to invalidate one or more keys of the cache, and may invalidate a particular node within the metadata based on a key value corresponding to the request.