Abstract:
A solution for reducing transmission pathway lengths within a distributed network, as embodied in various systems, methods, and non-transitory computer-readable storage media, may include migrating a TCP socket from a request server to a data server. The solution may further include reprogramming one or more routers to recognize a new packet route based on the migrated socket. The solution may include the one or more routers subsequently communicating directly with the data server while bypassing the request server.
Abstract:
A dynamic, milestone-based solution for managing computer operations, as may be embodied by various systems, methods, and non-transitory computer-readable storage media, may involve analyzing a computer operation invoked by an invoking module. The solution may involve identifying and classifying discrete steps or phases within the invoked operation and applying context-specific watchdog timers and operational milestones based on the detected phases. The solution may involve monitoring the progress of the operation and terminating the operation when an operational milestone is not achieved before an applied watchdog timer expires during a given phase.
Abstract:
A solution for reducing transmission pathway lengths within a distributed network, as embodied in various systems, methods, and non-transitory computer-readable storage media, may include migrating a TCP socket from a request server to a data server. The solution may further include reprogramming one or more routers to recognize a new packet route based on the migrated socket. The solution may include the one or more routers subsequently communicating directly with the data server while bypassing the request server.
Abstract:
A solution for reducing transmission pathway lengths within a distributed network, as embodied in various systems, methods, and non-transitory computer-readable storage media, may include migrating a TCP socket from a request server to a data server. The solution may further include reprogramming one or more routers to recognize a new packet route based on the migrated socket. The solution may include the one or more routers subsequently communicating directly with the data server while bypassing the request server.
Abstract:
A solution for reducing transmission pathway lengths within a distributed network, as embodied in various systems, methods, and non-transitory computer-readable storage media, may include migrating a TCP socket from a request server to a data server. The solution may further include reprogramming one or more routers to recognize a new packet route based on the migrated socket. The solution may include the one or more routers subsequently communicating directly with the data server while bypassing the request server.
Abstract:
Innovative technologies for reducing network request response times over a server-signed connection are disclosed. The technologies may involve dynamically computing synchronized compression dictionaries using server responses to speculative or “read-ahead” client requests. The technologies operate even when the client is unable to accept the server responses due to server-signing constraints. A server proxy may receive a read-ahead request originating from a client proxy. After receiving a response to the read-ahead request from a server, the server proxy may populate a compression dictionary and forward the read-ahead request to the client proxy. The client proxy may populate its own synchronized compression dictionary using the forwarded read-ahead response. The server proxy and client proxy may use the compression dictionaries to respectively compress and decompress a response to an actual client request that matches or is highly similar to the earlier response to the read-ahead request.
Abstract:
A transparent batch file transfer is provided from a client to a server via a batch pool system. The batch pool system may be implemented by a proxy file server which is used to receive the file transfer from the client device and free the client device as soon as possible. The file transfer to an intended remote server is carried out by a batch transfer system at the proxy file server. The user of the client machine may then use their device to perform other tasks while the file transfer is completed by the proxy file server batch transfer system. The file transfer is coordinated by a background transfer module that is integrated with file system protocols. Hence, there is no new system or software for a user of the client to learn or operate.
Abstract:
Innovative technologies for reducing network request response times over a server-signed connection are disclosed. The technologies may involve dynamically computing synchronized compression dictionaries using server responses to speculative or “read-ahead” client requests. The technologies operate even when the client is unable to accept the server responses due to server-signing constraints. A server proxy may receive a read-ahead request originating from a client proxy. After receiving a response to the read-ahead request from a server, the server proxy may populate a compression dictionary and forward the read-ahead request to the client proxy. The client proxy may populate its own synchronized compression dictionary using the forwarded read-ahead response. The server proxy and client proxy may use the compression dictionaries to respectively compress and decompress a response to an actual client request that matches or is highly similar to the earlier response to the read-ahead request.
Abstract:
A dynamic, milestone-based solution for managing computer operations, as may be embodied by various systems, methods, and non-transitory computer-readable storage media, may involve analyzing a computer operation invoked by an invoking module. The solution may involve identifying and classifying discrete steps or phases within the invoked operation and applying context-specific watchdog timers and operational milestones based on the detected phases. The solution may involve monitoring the progress of the operation and terminating the operation when an operational milestone is not achieved before an applied watchdog timer expires during a given phase.