H04L67/56

MICROSERVICE CALL METHOD AND APPARATUS, DEVICE, AND MEDIUM
20230046979 · 2023-02-16 ·

This application provides a microservice call method. The method includes: A network interface card receives service call requests separately generated by a plurality of first services deployed on a first device, where each of the plurality of first services is corresponding to one second service, and the second service is used to process first data of a service call request generated by the first service corresponding to the second service; and the network interface card sends the service call request to the second service based on service governance logic related to the first data. In this way, a problem that contention of a plurality of proxies for a system resource causes process context switching and further causes a sharp increase in a service delay is resolved, and application performance is improved.

COORDINATING EXECUTION OF COMPUTING OPERATIONS FOR SOFTWARE APPLICATIONS
20230049332 · 2023-02-16 ·

A client-side system can include a service proxy that can receive a request to perform a computing operation from a web application that is executable in a web browser of the client-side system. The service proxy can determine if the computing operation is executable by a local execution module that is external to the web browser and local to the client-side system. The local execution module may be different from the web application and may be configured to execute one or more computing operations using computing resources local to the client-side system. If the computing operation is executable by a local execution module, the service proxy can transmit a communication to the local execution module for causing the local execution module to execute the computing operation.

Hidden desktop session for remote access
11582287 · 2023-02-14 · ·

Systems and methods of the present disclosure are directed to providing remote access capabilities in information technology infrastructure. In particular, systems and methods of the present disclosure can provide remotely access capabilities to facilitate the management, configuration, or maintenance of information technology infrastructure.

Hidden desktop session for remote access
11582287 · 2023-02-14 · ·

Systems and methods of the present disclosure are directed to providing remote access capabilities in information technology infrastructure. In particular, systems and methods of the present disclosure can provide remotely access capabilities to facilitate the management, configuration, or maintenance of information technology infrastructure.

Scalable proxy clusters

The invention enables high-availability, high-scale, high security and disaster recovery for API computing, including in terms of capture of data traffic passing through proxies, routing communications between clients and servers, and load balancing and/or forwarding functions. The invention inter alia provides (i) a scalable cluster of proxies configured to route communications between clients and servers, without any single point of failure, (ii) proxy nodes configured for implementing the scalable cluster (iii) efficient methods of configuring the proxy cluster, (iv) natural resiliency of clusters and/or proxy nodes within a cluster, (v) methods for scaling of clusters, (vi) configurability of clusters to span multiple servers, multiple racks and multiple datacenters, thereby ensuring high availability and disaster recovery (vii) switching between proxies or between servers without loss of session.

Scalable proxy clusters

The invention enables high-availability, high-scale, high security and disaster recovery for API computing, including in terms of capture of data traffic passing through proxies, routing communications between clients and servers, and load balancing and/or forwarding functions. The invention inter alia provides (i) a scalable cluster of proxies configured to route communications between clients and servers, without any single point of failure, (ii) proxy nodes configured for implementing the scalable cluster (iii) efficient methods of configuring the proxy cluster, (iv) natural resiliency of clusters and/or proxy nodes within a cluster, (v) methods for scaling of clusters, (vi) configurability of clusters to span multiple servers, multiple racks and multiple datacenters, thereby ensuring high availability and disaster recovery (vii) switching between proxies or between servers without loss of session.

Real-time scalable virtual session and network analytics

Provided herein are systems and methods for providing insights or metrics in connection with provisioning applications and/or desktop sessions to end-users. Network devices (e.g., appliances, intermediary devices, gateways, proxy devices or middle-boxes) can gather insights such as network-level statistics. Additional insights (e.g., metadata and metrics) associated with virtual applications and virtual desktops can be gathered to provide administrators with comprehensive end-to-end real-time and/or historical reports of performance and end-user experience (UX) insights. Insights relating to an application or desktop session can be used to determine and/or improve the overall health of the infrastructure of the session, Citrix Virtual Apps and Desktops, the applications (e.g., remote desktop application) being delivered using the infrastructure, and/or the corresponding user experience.

Real-time scalable virtual session and network analytics

Provided herein are systems and methods for providing insights or metrics in connection with provisioning applications and/or desktop sessions to end-users. Network devices (e.g., appliances, intermediary devices, gateways, proxy devices or middle-boxes) can gather insights such as network-level statistics. Additional insights (e.g., metadata and metrics) associated with virtual applications and virtual desktops can be gathered to provide administrators with comprehensive end-to-end real-time and/or historical reports of performance and end-user experience (UX) insights. Insights relating to an application or desktop session can be used to determine and/or improve the overall health of the infrastructure of the session, Citrix Virtual Apps and Desktops, the applications (e.g., remote desktop application) being delivered using the infrastructure, and/or the corresponding user experience.

Wireless network policy manager for a service mesh

A computer device may include a memory storing instructions and processor configured to execute the instructions to host a network function container that implements a microservice for a network function in a wireless communications network, wherein the network function container is deployed by a container orchestration platform; host a service proxy container associated with the network function container, wherein the service proxy container is deployed by the container orchestration platform; and configure the hosted service proxy container to apply a wireless network policy to the microservice for the network function. The processor may be further configured to intercept messages associated with the microservice for the network function using the configured service proxy container; and apply the wireless network policy to the intercepted messages using the configured service proxy container.

Wireless network policy manager for a service mesh

A computer device may include a memory storing instructions and processor configured to execute the instructions to host a network function container that implements a microservice for a network function in a wireless communications network, wherein the network function container is deployed by a container orchestration platform; host a service proxy container associated with the network function container, wherein the service proxy container is deployed by the container orchestration platform; and configure the hosted service proxy container to apply a wireless network policy to the microservice for the network function. The processor may be further configured to intercept messages associated with the microservice for the network function using the configured service proxy container; and apply the wireless network policy to the intercepted messages using the configured service proxy container.