US20190146899A1 - Assistive debugging of web applications with port forwarding - Google Patents
Assistive debugging of web applications with port forwarding Download PDFInfo
- Publication number
- US20190146899A1 US20190146899A1 US15/879,296 US201815879296A US2019146899A1 US 20190146899 A1 US20190146899 A1 US 20190146899A1 US 201815879296 A US201815879296 A US 201815879296A US 2019146899 A1 US2019146899 A1 US 2019146899A1
- Authority
- US
- United States
- Prior art keywords
- computer system
- port
- owner
- participant
- build
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G06F11/3664—
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Prevention of errors by analysis, debugging or testing of software
- G06F11/3698—Environments for analysis, debugging or testing of software
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Prevention of errors by analysis, debugging or testing of software
- G06F11/362—Debugging of software
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Prevention of errors by analysis, debugging or testing of software
- G06F11/362—Debugging of software
- G06F11/3632—Debugging of software of specific synchronisation aspects
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Prevention of errors by analysis, debugging or testing of software
- G06F11/362—Debugging of software
- G06F11/3636—Debugging of software by tracing the execution of the program
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Prevention of errors by analysis, debugging or testing of software
- G06F11/3668—Testing of software
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/13—File access structures, e.g. distributed indices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/1734—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/176—Support for shared access to files; File sharing support
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/1873—Versioning file systems, temporal file systems, e.g. file system supporting different historic versions of files
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/166—Editing, e.g. inserting or deleting
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/197—Version control
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/33—Intelligent editors
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/41—Compilation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/52—Program synchronisation; Mutual exclusion, e.g. by means of semaphores
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/542—Event management; Broadcasting; Multicasting; Notifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/543—User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/101—Collaborative creation, e.g. joint development of products or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1069—Session establishment or de-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
- H04L65/403—Arrangements for multi-party communication, e.g. for conferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/72—Code refactoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Definitions
- Computers and computing systems have impacted nearly every aspect of modern-day living. For instance, computers are generally involved in work, recreation, healthcare, transportation, and so forth.
- a computer operates by executing a set of executable instructions (i.e. code). These instructions were created in a development environment by a developer in order to create an application. In many instances, the developer will generate many different versions of the code in an effort to improve the computer's operations and to remove any bugs that are present in the code. Once the instructions are compiled, interpreted, and/or built, an underlying computer system executes the instructions to provide the application's functionalities.
- executable instructions i.e. code
- At least some of the embodiments described herein relate to making a port available to other computer systems during a collaboration session.
- an application may be built on an owner computer system such that the build is saved on the owner computer system.
- an instance of the build may be run on the owner computer system.
- a collaboration session in which the owner computer system and a participant computer system are both members may also be established.
- the participant computer system is provided access to a port that may be used to access the build instance.
- this build instance is made accessible to the participant computer system via the port.
- the participant computer system is then provided access to a new instance of the build via the port.
- the embodiments are able to use a secure collaboration session to forward a port from one computer system to another. Because of this secure collaboration session, the embodiments directly improve how a computer system operates because the computer system's resources will be utilized in a more efficient manner. The embodiments also provide substantial advantages because each collaborator is provided the full context of the workspace in a shared collaboration session. Furthermore, the embodiments directly improve how a web application can be debugged. These and other benefits will be described in more detail later.
- FIG. 1 illustrates an overall view of a computer system.
- FIG. 2 provides an example depiction of how a collaboration session may be initiated.
- FIG. 3 illustrates the various forms and characteristics that a collaborator may have.
- FIG. 4 illustrates an example architecture that may be used to facilitate a collaboration session.
- FIG. 5 shows how an integration component is able to configure a client application's user interface so that it includes collaboration options.
- FIG. 6A illustrates how a client application is able to access the local files on a participant computer system.
- FIG. 6B illustrates how a client application's communications can be intercepted and re-routed.
- FIG. 7 demonstrates how an owner computer system is able to process requests submitted by a participant computer system.
- FIG. 8 demonstrates how a multi-file workspace can become accessible to a participant computer system.
- FIG. 9 demonstrates how the tools of an owner computer system can become accessible to a participant computer system.
- FIG. 10 illustrates an example scenario in which a participant computer system is listening to a port in order to gain access to a web application.
- FIG. 11 demonstrates how a web application can be emulated from one computer system to another.
- FIG. 12 presents an example architecture for forwarding a port within a collaboration session.
- FIG. 13 illustrates an example method for forwarding a port within a collaboration session.
- At least some of the embodiments described herein relate to making a port available to other computer systems during a collaboration session.
- an application may be built on an owner computer system such that the build is saved on the owner computer system.
- an instance of the build may be run on the owner computer system.
- a collaboration session in which the owner computer system and a participant computer system are both members may also be established.
- the participant computer system is provided access to a port that may be used to access the build instance.
- this build instance is made accessible to the participant computer system via the port.
- the participant computer system is then provided access to a new instance of the build via the port.
- An advantage of the disclosed embodiments is that they allow an “owner collaborator” (or simply “owner”) to remain in control of his/her multi-file workspace even when outside collaborators (also called hereinafter “participant collaborators” or simply “participant(s)”) are joined with the owner in a “collaborative session.”
- owner can refer to either a “human owner” or an “owner computer system.”
- participant can refer to either a “human participant” or a “participant computer system.”
- an “owner computer system” and a “participant computer system” refer only to a computer system and do not include a human operator.
- collaboration session refers to any entity (e.g., an owner or a participant) that has joined a collaboration session while “collaborators” refers to some or all of the entities in the collaboration session (e.g., the owner and all of the participants).
- a “multi-file workspace” is an assembly of multiple files that operate collectively by interacting with each other.
- a code development project may include multiple files of source code that, when executed, operate together to perform complex functions.
- a code development project may be considered a multi-file workspace.
- Other examples of a multi-file workspace include, but are not limited to, text files and/or word processing files (e.g., where the files are linked via a table of contents or some other linking unit), or any other content in which multiple sources of data are joined together.
- Yet another non-limiting example of a multi-file workspace is a wiki-based workspace that is configured to receive edits and/or markdowns from multiple entities.
- a “collaboration session,” as used herein, is an occurrence in which an owner computer system is joined with one or more participant computer systems in order to jointly collaborate on a multi-file workspace.
- the participant computer systems are provided access to a multi-file workspace that is stored locally on the owner computer system. In this manner, the participants need not download the multi-file workspace. Instead, the participant computer systems act as headless units because editing and other operations may be performed on the owner computer system as opposed to occurring on each of the participant computer systems.
- collaboration sessions may be initiated for a broad variety of reasons.
- a collaboration session may be established so that the participants can assist the owner in performing a certain function.
- the owner might be the primary person tasked with generating the code, whereas the participants may be other developers who are helping the owner debug that code.
- the owner may be a student, and the participant may be a teacher.
- a professor may be the owner and his/her students may be the participants. In such a scenario, the professor is able to guide his/her students in demonstrating how the workspace operates. In this context, the owner is able to retain administrative control over his/her multi-file workspace.
- Yet another example scenario includes a coding interview process in which the interviewer sets up a workspace environment (e.g., a coding environment).
- the interviewer is the owner and the interviewee is the participant.
- an owner need not be a human on one end of the system.
- an owner computer system may be a build server that has no human owner.
- a human participant who is using a participant computer system, is able to join a remote codebase (i.e. an “owner” build instance) for the purpose of collaborating in a debugging scenario.
- a remote codebase i.e. an “owner” build instance
- the disclosed embodiments enable one (or perhaps more) of the participants to assume control of the multi-file workspace.
- a participant is also able to assume ownership for specific changes to the multi-file workspace.
- the disclosure will now introduce some of the technical benefits that are provided herein.
- the disclosed embodiments may be implemented to overcome many of the technical difficulties and computational expenses associated with jointly controlling and collaborating on a multi-file workspace.
- conventional methods for debugging an application often involve each collaborator installing a workspace's global environment/context and then applying the same data (or steps) in order to reproduce the exact issues that led to finding a bug. Such a process consumes a significant amount of time, computing resources, and manpower.
- the term “context” refers to the state of a workspace.
- the disclosed embodiments provide significant advantages because they enable multiple computers to connect to a single computer, which is running a workspace's environmental logic (e.g., services) and which is maintaining a global context of the workspace, to thereby allow the collaborators to jointly collaborate on the multi-file workspace (as opposed to having multiple different workspaces operating on multiple different computers). These operations result in a significant increase in the overall efficiency of the collaborating computer systems.
- a workspace's environmental logic e.g., services
- Another advantage of the disclosed embodiments is that because only a single workspace is being operated on, the collaborators' operations are synchronized with each other. For example, when multiple collaborators (e.g., code developers) are joined together in a collaborative session, each collaborator is made aware (in real-time) of at least some, and potentially all, of the actions of all of the other collaborators because each collaborator is working on the same workspace. In other words, each collaborator's individual action is “synced” with the actions of the other collaborators.
- multiple collaborators e.g., code developers
- FIG. 1 presents an introductory discussion of an example computer system.
- FIGS. 2 through 9 illustrate various architectures and supporting illustrations for providing a collaboration session according to the disclosed principles.
- FIGS. 10 through 13 which present various architectures and methods for forwarding a port within a collaboration session.
- a computer system 100 in its most basic configuration, includes various different components.
- computer system 100 includes at least one hardware processing unit 105 (aka “processor”), storage 110 , input/output (I/O) interfaces 115 , graphics rendering engines 120 , and various communication channels 125 .
- processor hardware processing unit
- storage 110 storage 110
- I/O input/output
- graphics rendering engines 120 graphics rendering engines
- various communication channels 125 various communication channels
- the storage 110 may be physical system memory, which may be volatile, non-volatile, or some combination of the two. Accordingly, the storage 115 may be referred to as a “hardware storage device” on which computer-executable instructions are stored.
- the term “memory” may also be used herein to refer to non-volatile mass storage such as physical storage media. If the computer system 100 is distributed, the processing, memory, and/or storage capability may be distributed as well.
- the term “executable module,” “executable component,” or even “component” can refer to software objects, routines, or methods that may be executed on the computer system 100 .
- the different components, modules, engines, and services described herein may be implemented as objects or processors that execute on the computer system 100 (e.g., as separate threads).
- the disclosed embodiments may comprise or utilize a special-purpose or general-purpose computer including computer hardware, such as, for example, one or more processors (such as hardware processing unit 105 ) and system memory (such as storage 110 ), as discussed in greater detail below.
- Embodiments also include physical and other computer-readable media for carrying or storing computer-executable instructions and/or data structures.
- Such computer-readable media can be any available media that can be accessed by a general-purpose or special-purpose computer system.
- Computer-readable media that store computer-executable instructions in the form of data are physical computer storage media.
- Computer-readable media that carry computer-executable instructions are transmission media.
- the current embodiments can comprise at least two distinctly different kinds of computer-readable media: computer storage media and transmission media.
- Computer storage media are hardware/physical storage devices, such as RAM, ROM, EEPROM, CD-ROM, solid state drives (SSDs) that are based on RAM, Flash memory, phase-change memory (PCM), or other types of memory, or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code means in the form of computer-executable instructions, data, or data structures and that can be accessed by a general-purpose or special-purpose computer.
- RAM random access memory
- ROM read-only memory
- EEPROM electrically erasable programmable read-only memory
- CD-ROM Compact Disk Read Only Memory
- SSDs solid state drives
- PCM phase-change memory
- the computer system 100 may also be connected (via a wired or wireless connection) to external sensors (e.g., data acquisition devices). Further, the computer system 100 may also be connected through one or more wired or wireless network(s) 130 to remote systems(s) that are configured to perform any of the processing described with regard to computer system 100 .
- the graphics rendering engine 120 is configured, with the processor(s) 105 , to render one or more objects on a display of the computer system 100 . As a result, a user is able to view the results of the various functionalities of the computer system 100 .
- a “network,” like the network(s) 130 shown in FIG. 1 , is defined as one or more data links and/or data switches that enable the transport of electronic data between computer systems, modules, and/or other electronic devices.
- a network either hardwired, wireless, or a combination of hardwired and wireless
- the computer properly views the connection as a transmission medium.
- the computer system 100 includes one or more communication channels 125 that are used to communicate with the network(s) 130 .
- Transmissions media include a network that can be used to carry data or desired program code means in the form of computer-executable instructions or in the form of data structures. Further, these computer-executable instructions can be accessed by a general-purpose or special-purpose computer. Combinations of the above should also be included within the scope of computer-readable media.
- program code means in the form of computer-executable instructions or data structures can be transferred automatically from transmission media to computer storage media (or vice versa).
- program code means in the form of computer-executable instructions or data structures received over a network or data link can be buffered in RAM within a network interface module (e.g., a network interface card or “NIC”) and then eventually transferred to computer system RAM and/or to less volatile computer storage media at a computer system.
- NIC network interface card
- Computer-executable (or computer-interpretable) instructions comprise, for example, instructions that cause a general-purpose computer, special-purpose computer, or special-purpose processing device to perform a certain function or group of functions.
- the computer-executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, or even source code.
- embodiments may be practiced in network computing environments with many types of computer system configurations, including personal computers, desktop computers, laptop computers, message processors, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, tablets, pagers, routers, switches, cloud-based machines and infrastructures, and the like.
- the embodiments may also be practiced in distributed system environments where local and remote computer systems that are linked (either by hardwired data links, wireless data links, or by a combination of hardwired and wireless data links) through a network each perform tasks (e.g. cloud computing, cloud services and the like).
- program modules may be located in both local and remote memory storage devices.
- illustrative types of hardware logic components include Field-Programmable Gate Arrays (FPGAs), Program-Specific or Application-Specific Integrated Circuits (ASICs), Program-Specific Standard Products (ASSPs), System-On-A-Chip Systems (SOCs), Complex Programmable Logic Devices (CPLDs), Central Processing Units (CPUs), and other types of programmable hardware.
- FPGAs Field-Programmable Gate Arrays
- ASICs Program-Specific or Application-Specific Integrated Circuits
- ASSPs Program-Specific Standard Products
- SOCs System-On-A-Chip Systems
- CPLDs Complex Programmable Logic Devices
- CPUs Central Processing Units
- FIGS. 2 through 9 figures present various architectures and supporting illustrations for establishing a collaboration session.
- FIG. 2 illustrates a collaboration session 200 in which an owner computer system 205 and a participant computer system 210 are both members.
- both the owner computer system 205 and the participant computer system 210 may include all of the features and functionalities that were discussed in relation to the computer system 100 of FIG. 1 . Accordingly, when reference is made to a “computer system,” it will be appreciated that such a system may include the features of computer system 100 .
- FIG. 2 shows that Participant “A,” Participant “B,” and/or Participant “C” may be included in the collaboration session 200 .
- the owner computer system 205 may be a first member in the collaboration session 200
- Participant “A” may be a second member in the collaboration session 200
- Participant “B” may be a third member in the collaboration session (i.e. three or more members are joined), and so on with potentially no limit.
- FIG. 2 is for example purposes only and should not be considered limiting.
- the remaining portion of this disclosure focuses on collaboration sessions that depict only a single participant; however, it should be understood that the principles may be practiced with any number of participants.
- the disclosed embodiments establish the collaboration session 200 so that the participant computer system 210 is able to gain access to a multi-file workspace stored on the owner computer system 205 .
- the participant computer system 210 can operate on the remote workspace as if the remote workspace were local.
- a human participant can independently view, edit, and otherwise operate on the remote workspace.
- all of the collaborators e.g., the owner and participant(s)
- the disclosed embodiments provide many efficiencies over traditional collaboration processes.
- the collaboration session 200 may be initiated in a variety of ways.
- the collaborators e.g., the owner computer system 205 and the participant computer system 210
- the collaboration session 200 may be initiated by sending a request 220 over the LAN connection 215 .
- the collaborators are able to communicate directly in a peer-to-peer manner.
- the collaboration session may be initiated using a peer-to-peer connection between the collaborator computer systems, where the peer-to-peer connection is established via a local area network connection.
- the owner computer system 205 may desire that the participant computer system 210 be authenticated prior to entering the collaboration session 200 .
- the embodiments are able to use the cloud 225 to provide authentication services.
- some embodiments provide an authentication service 230 in the cloud 225 .
- the participant computer system 210 can use this authentication service 230 to authenticate itself to the owner computer system 205 .
- the collaboration session 200 can be initiated and the owner computer system 205 and the authenticated participant computer system 210 can jointly work on a multi-file workspace.
- the collaboration session 200 is initiated by sending the request 220 through a relay service 235 operating in the cloud 225 .
- this relay service 235 is able to connect computers that are on different native networks. Accordingly, the embodiments are able to use various services residing in the cloud 225 in order to initiate the collaboration session 200 .
- Other embodiments use a hybrid approach to initiating the collaboration session 200 . For instance, if some participant computer systems are located on the same LAN as the owner computer system 205 , then the request 220 can be sent to those participant computer systems using the LAN. Additionally, if some participant computer systems are not using the same LAN as the owner computer system 205 , then the request 220 can be transmitted using the relay service 235 in the cloud 225 . Accordingly, the disclosed embodiments are able to use a variety of methods for initiating the collaboration session 200 . Here, it is worthwhile to note that the disclosed embodiments are able to intelligently select whichever process is most efficient to initiate the collaboration session 200 . On a related note, the collaboration session 200 is able to continue to use the respective network connections to maintain the communications between the collaborators.
- Ending the collaboration session 200 may be performed in a variety of ways.
- the collaboration session 200 ends through an action of one of the collaborators. For example, one of the collaborators may select an “End Collaboration” option.
- the collaboration session may end upon expiration of a time-out period.
- the owner may have configured a policy controlling how long the collaboration session will remain active. Upon expiration of that period, the participants' connection to the collaboration session will be terminated.
- the owner may set a policy indicating a time-out period associated with the shutting down of a client (e.g., an IDE). For example, the owner may set a time-out period to cause the collaboration session to terminate after a predetermined period of time has elapsed after the client was shut down.
- a client e.g., an IDE
- embodiments are configured to end the collaboration session when the owner computer system shuts down and/or the owner logs off of the owner computer system.
- the collaboration session may continue to run even after the owner computer system has shut down, gone to sleep, or been logged off.
- the human owner decided to perform a quick reboot or had to quickly attend a meeting.
- the collaboration session is still active (even though the owner computer system may not be active)
- the human owner will be able to quickly resume her work when she returns from her activities.
- An advantage realized by this embodiment is that if any configuration options are adjusted, then those adjustments can be persisted and will be in place for the remaining duration of the collaboration session. In this manner, the collaborators will be able to quickly resume working at the locations where they left off, and they can continue to operate using the same configuration options.
- embodiments include audit tracking features that record each collaborators' actions (e.g., their edits). In this manner, these embodiments provide an audit trail that can be reviewed and analyzed at a later time, if the need or desire arises. Once the collaboration session ends based on the principles discussed above, then the audit tracking may also end.
- FIG. 3 illustrates another collaboration session 300 .
- collaboration session 300 is analogous to the collaboration session 200 of FIG. 3 .
- the collaboration session 300 includes an owner 305 and a participant computer system 310 .
- FIG. 3 shows some of the various characteristics that the owner 305 and the participant computer system 310 may have.
- the owner 305 may not be a computer system with a human operator. Instead, it may be a build instance of an application, as shown in FIG. 3 .
- the owner 305 may be a headless build instance that is residing in the cloud. In such a scenario, then the various participants are able to operate on the codebase on which the build instance is based.
- the owner 305 may be a computer system (as shown in FIG. 3 ) that is using a first type of operating system (e.g., Operating System “A”).
- a human owner will operate the owner 305 .
- the human owner is able to perform work on the multi-file workspace through the use of a client application that is residing on the owner 305 .
- a “client application” may be any type of application that enables the owner 305 to operate on the multi-file workspace.
- a client application may be a text editor, a word processing program, or any other program suitable to operate on the text files.
- a client application may be a source code editor, an integrated development environment (IDE), or any other program suitable to operate on source code.
- IDE integrated development environment
- these client applications are provided permissions to access the multi-file workspace residing on the owner 305 .
- FIG. 3 shows that the owner 305 is able to operate a client application that is in the form of an IDE (e.g., IDE “A”), it will be appreciated that any type of client application may be used, not just an IDE.
- the participant computer system 310 may also be a computer system that is using an operating system (e.g., Operating System “B”).
- Operating System “B” may be different than Operating System “A.”
- the owner 305 and the participant computer system 310 need not use the same type of operating system in order to be joined together in the collaboration session 300 to work on the multi-file workspace.
- the participant computer system 310 need not use the same type of client application (e.g., IDE “B”) as the owner 305 .
- a participant is able to use his/her preferred operating system and client application regardless of the type of operating system and/or client application that the owner (e.g., owner 305 ) is using. Accordingly, the embodiments are operating system agnostic and client application agnostic.
- FIG. 4 presents some architectural components that may be used to realize the benefits of the disclosed principles.
- FIG. 4 illustrates a collaboration session 400 in which an owner computer system 405 and a participant computer system 410 are members.
- the owner computer system 405 is a computer system that includes a collaboration agent 415 .
- this collaboration agent 415 includes a set of base tools 420 (e.g., Tool A, Tool B, and Tool C).
- FIG. 4 shows the collaboration agent 415 as including only three base tools, it will be appreciated that the collaboration agent 415 may include any number of base tools. Additional details on the base tools 420 will be presented momentarily.
- the owner computer system 405 also includes a client application 425 .
- a client application e.g., client application 425
- client application 425 may be a text editor, word processing editor, source code editor, IDE, or any other type of application that enables a user to operate on a multi-file workspace.
- client application 425 may include a client tool 430 . Similar to the above disclosure, although the client application 425 is shown as including only a single tool, it will be appreciated that the client application 425 may have any number of tools.
- the owner computer system 405 may have any number of client applications installed thereon.
- the client application 425 may be an integrated development environment (IDE) that has permissions to access the multi-file workspace. Further, this IDE may manage/host a set of client development tools. In this manner, the IDE can be used to work on the multi-file workspace.
- IDE integrated development environment
- a base tool may be a service or other type of function/tool that is generally common across many or all of the different types of client applications.
- the base tools 420 may include a code completion service, a code debugging service (e.g., a source code error checking tool), a code highlighting service, a code navigation service, a code colorization service (e.g., syntax highlighting in which different colors are applied to the syntax depending on what category a syntax term belongs to), a code refactoring service (e.g., restructuring code without altering its behavior), a code hinting service (e.g., code completion), a source code search tool, a source code control tool, and/or a lightbulb service (e.g., an icon service that provides an expanded display of options).
- a code completion service e.g., a code debugging service (e.g., a source code error checking tool), a code highlighting service, a code navigation service, a code colorization service (e.g., syntax
- Additional services and tools include, but are not limited to, providing member lists, parameter information, symbol services, source code transpilation (e.g., changing the source code so it reads in a different coding language), hover features, smart typing abilities, and quick code information.
- the client tool 430 may be a tool that is specific to a particular client application and that is not generally common among different client applications.
- the client tool 420 may be a tool or service specific to a particular type of IDE.
- the owner computer system 405 is able to make these set of development tools (i.e. both the set of base tools 420 and the client tool 430 ) accessible to the participant computer system 410 . Because these tools reside on the owner computer system 405 , the tools have access to the entire context of the multi-file workspace. By making the tools accessible to the participant computer system 410 , a human participant is able to use the tools in light of the entire context of the multi-file workspace. In this manner, the collaborators are able to operate on the multi-file workspace using a set of tools that understand the workspace's entire context.
- the owner computer system 405 also includes an integration component 435 and a set of local files 440 .
- the multi-file workspace is included within the set of local files 440 on the owner computer system 405 .
- the collaboration session 400 may be initiated so as to enable one or more participants (e.g., participant computer system 410 ) to join the owner computer system 405 in collaborating on a multi-file workspace that is stored locally on the owner computer system 405 (e.g., perhaps in the local files 440 ).
- participants e.g., participant computer system 410
- the disclosed embodiments cause the integration component 435 to attach, or rather “hook,” to the client application 425 in a lightweight manner.
- the integration component 435 may be a plugin or other type of client extension that hooks into the client application 425 to perform “redirection,” “rerouting,” and customization operations.
- the integration component 435 (which is on the owner computer system 405 ) is configured to add additional functionalities to the client application 425 . Of note, these additional functionalities are at least directed to establishing and maintaining the collaboration session 400 .
- FIG. 5 shows an owner computer system 500 , which is analogous to the owner computer system 405 of FIG. 4 .
- the owner computer system 500 includes a client application 505 and an integration component 510 .
- the client application 505 is also shown as including a user interface 515 . After the integration component 510 hooks itself onto the client application 505 , then the integration component 510 is able to expand upon the abilities of the client application 505 .
- the integration component 510 will alter the user interface 515 so that it includes additional features related to a collaboration session.
- a set of new collaboration options 525 have been added to the user interface 515 as a result of the integration component 510 attaching itself to the client application 505 .
- the set of new collaboration options 525 include Option 1 , Option 2 , and Option 3 .
- the ellipses 520 demonstrates that any number of options may be added to the user interface 515 .
- Some of the set of collaboration options 525 may include, but are not limited to, (1) an option to initiate a collaboration session, (2) an option to terminate a collaboration session, and/or (3) an option to acquire information about a particular participant (e.g., the participant's avatar may be displayed and, when the avatar is selected, identifying information about the participant may be displayed).
- the embodiments enable a participant to work on a multi-file workspace that is stored locally on an owner computer system. Included with this functionality is the ability of the participant to independently navigate to areas within the multi-file workspace where the owner computer system is not currently operating (or even in locations where the owner computer system is operating). Furthermore, the embodiments also enable the participant to independently edit files. In light of these abilities, an owner may desire to learn where a participant is currently navigating/operating within his/her multi-file workspace.
- the embodiments automatically navigate the owner to the same location as a participant within the workspace. If there are multiple participants, then the owner may initially be prompted to select a particular participant. As an example, suppose an owner is editing File 1 shown in the user interface 515 in FIG. 5 . At the same time, a participant may be independently editing File 2 . By clicking the pin to participant's position option, the owner can be automatically navigated to File 2 , and in particular to the exact location where the participant is editing File 2 . Therefore, although the embodiments enable participants to independently navigate and edit the files within the workspace, the embodiments also enable the owner to be automatically directed to the locations within the workspace where the participants are working. In some embodiments, this feature is also provided to each of the participants. Therefore, in these embodiments, each collaborator is able to follow the actions of the other collaborators.
- the pin to participant's position option e.g., the options can be selectable buttons
- Another option that may be provided among the set of new collaboration options 525 is the option to adjust the access controls of the participants.
- the owner may be provided with an option to adjust a policy so that participants are allowed to navigate to or edit only certain files.
- Yet another option is related to an audit feature in which the actions of the participants are recorded and are made available for viewing by the owner. Accordingly, the integration component 510 is able to interact with the client application 505 to enhance the owner's control over the participants in a collaboration session.
- the participant computer system 410 is shown as including a collaboration agent 445 , a client application 450 , an integration component 455 , and local files 460 .
- the collaboration agent 445 communicates with the collaboration agent 415 to provide the participant computer system 410 access to the multi-file workspace residing on the owner computer system 405 . Additional details on this interaction will be presented later.
- the client application 450 also provides a user interface to the participant so that the participant is able to view (and therefore work on) the multi-file workspace.
- the integration component 455 Similar to the integration component 435 , the integration component 455 also attaches itself to the client application 455 . The functionalities of this integration component 455 will now be discussed in relation to FIGS. 6A and 6B .
- FIG. 6A shows a participant computer system 600 A that includes a set of local files 605 A, which are analogous to the local files 460 , and a client application 610 A.
- the participant computer system 600 A does not have an integration component. Accordingly, when the participant computer system 600 A is thusly configured, the client application 610 A is able to submit requests 615 A to the set of local files 605 A. In this manner, the client application 610 A operates on files that are stored locally on the participant computer system 600 A.
- the participant computer system uses a collaboration agent and an integration component.
- FIG. 6B the participant computer system 600 B of FIG. 6B includes a collaboration agent 605 , a set of local files 610 B, a client application 615 B, and an integration component 620 .
- the integration component 620 is able to intercept requests 625 B that are issued by the client application 615 B. Normally, these requests 625 B would be fulfilled using the set of local files 610 B.
- the integration component 620 intercepts those requests 625 B and routes the intercepted requests 625 B to the collaboration agent 605 . Once the requests 625 B are received, the collaboration agent 605 then routes the intercepted requests 625 B to a collaboration agent residing on the owner computer system (e.g., collaboration agent 415 in FIG. 4 ).
- FIG. 7 shows how an owner-side collaboration agent handles requests that are received from a participant-side collaboration agent.
- the collaboration session 700 includes an owner computer system 705 and a participant computer system 710 .
- the owner computer system 705 includes a collaboration agent 720 , a set of base tools 725 , a set of client tools 730 , and a set of local files 735 .
- the ellipses 740 demonstrates that the owner computer system 705 may have additional features.
- a participant-side collaboration agent is able to receive an intercepted request as described in connection with FIG. 6B .
- This request is shown as request 715 in FIG. 7 .
- the participant-side collaboration agent transmits the request 715 to the collaboration agent 720 .
- the collaboration agent 720 processes the request 715 .
- processing the request 715 includes making the set of base tools 725 accessible to the participant computer system 710 .
- processing the request 715 may include making the set of client tools 730 accessible to the participant computer system 710 .
- processing the request 715 may include making the set of local files 735 accessible to the participant computer system 710 .
- processing the request 715 includes making edits to the files in the multi-file workspace. Edits include, but are not limited to, changing text within the file, adding a new file, deleting an existing file, or any other file editing operations.
- the participant computer system 710 is not downloading the multi-file workspace. Instead, it is being given access to the workspace through the use of its collaboration agent, its integration component, and the owner-side collaboration agent. In this manner, the participant computer system 710 is able to reach across and perform work on the owner computer system 705 's multi-file workspace.
- the collaboration agent 720 transmits a response back to the participant computer system 710 .
- the collaboration agent 720 transmits the response back to the participant-side collaboration agent.
- the collaboration agent 605 will then receive any responses generated by an owner computer system. Once a response is received, then some embodiments will cause the response to be transmitted back to the client application 615 B via the integration component 620 . In other embodiments, however, the collaboration agent 605 is able to directly transmit the response (e.g., response 630 ) to the client application 615 B. In this manner, the participant is able to see the results of his/her processed requests.
- an owner establishes a collaboration session in which a participant is a member.
- the owner has asked the participant to assist him/her in debugging source code.
- the owner begins by debugging a first file while the participant begins by debugging a second file.
- both of these files are included in the multi-file workspace and both are stored on the owner's computer system.
- the second file is displayed on the participant's computer system even though the file's contents are actually stored only on the owner's computer system.
- the participant is able to independently view and edit the contents of the second file even though the owner is currently working on the first file.
- multiple collaborators are able to jointly work on a single multi-file workspace.
- the owner and the participant will be working on the same file.
- the owner will be able to see (in real-time) the changes made by the participant, and the participant will be able to see (in-real time) the changes made by the owner.
- the changes made by the collaborators are made in real-time and are synchronized with each other.
- the participant is given the illusion that he/she is working on a local workspace whereas, in actuality, the workspace is not local.
- the disclosed embodiments are able to provide a participant computer system access to a multi-file workspace that is stored on the owner computer system. Furthermore, a human participant is able to view that workspace and to edit that workspace. This viewing and editing can be performed independently of any viewing and editing that an owner may be performing on the multi-file workspace. In this manner, a participant no longer needs to replicate a workspace's context in order to work on that workspace. Additionally, the participant is able to use his/her preferred client application, even if that client application is different from the owner's client application. Even further, the participant is able to use the owner's set of tools, which tools understand the entire context of the multi-file workspace.
- the collaboration session 800 includes an owner computer system 805 and a participant computer system 810 .
- the owner computer system 805 includes a collaboration agent 815 , a client application 820 , an integration component 825 , and a set of local files 830 .
- the set of local files 830 includes a multi-file workspace 835 .
- this multi-file workspace 835 includes a set of files 840 , a context 845 of the multi-file workspace 835 , and a file directory 850 .
- this response 855 may include file data 860 (i.e. data concerning the set of files 840 ), context data 865 (i.e. data concerning the context 845 ), or directory data 870 (i.e. data concerning the file directory 850 ).
- this data is metadata while in other instances this data enables the participant computer system 810 to display the multi-file workspace and receive edits directed to the multi-file workspace.
- providing the participant computer system 810 access to the multi-file workspace includes providing access to the workspace's file directory, context, and files. From this information, the multi-file workspace 835 can be displayed on the participant computer system 810 , and the participant will be able to operate on that multi-file workspace.
- the owner computer system 805 is transmitting sufficient information (e.g., metadata and other information) so that the participant computer system 810 is able to understand what is included within the multi-file workspace 835 . Furthermore, the participant computer system 810 is able to receive enough information so that a visualization of the multi-file workspace 835 may be rendered on a user interface of the participant computer system 810 . In this manner, the participant computer system 810 is acting as a headless entity because a majority of the operations are actually being performed on the owner computer system 805 .
- sufficient information e.g., metadata and other information
- the participant computer system 810 submits viewing and editing requests to the owner computer system 805 .
- the owner computer system 805 then processes those requests and returns results back to the participant computer system 810 .
- the participant computer system 810 is provided the illusion that it is working on a local workspace, but in actuality the workspace is not local and the operations on the workspace are being performed by the owner computer system 805 .
- FIG. 9 shows some additional operations that may be performed.
- the collaboration session 900 includes an owner computer system 905 and a participant computer system 910 .
- the owner computer system 905 includes a collaboration agent 915 .
- this collaboration agent 915 is able to maintain a set of base tools 920 .
- the owner computer system 905 also includes a client application 925 , which client application 925 is able to maintain a set of client tools 930 .
- the embodiments are also able to make the set of base tools 920 and the set of client tools 930 accessible to the participant computer system 910 .
- the participant computer system 910 is able to use the tools that are residing on the owner computer system 905 in order to perform operations on the owner computer system 905 's multi-file workspace. Therefore, not only is the participant computer system 910 able to view and edit the multi-file workspace on the owner computer system 905 , but it is also able to make use of the tools that are on the owner computer system 905 .
- the participant computer system 910 is able to receive information 935 that includes base tool data 940 and/or client tool data 945 . In this manner, the participant computer system 910 is able make use of the owner computer system 905 's development tools.
- FIGS. 10 through 12 demonstrate how a collaboration session may be used to forward a port so that multiple collaborators can see the immediate results of their edits.
- forwarding a port refers to the process of providing the collaborators access to the port.
- the embodiments enable collaborators to view how their source code edits impact an application's build instance through the use of a shared/forwarded port.
- each computer system typically includes an internet protocol (IP) address.
- IP internet protocol
- This IP address is useful for differentiating the computer from other networked computers.
- IP address is typically associated with a large number of ports; furthermore, the IP address can be associated with various different types of ports.
- an IP address may be associated with a transmission control protocol (TCP) port and/or a user datagram protocol (UDP) port, just to name a couple.
- TCP transmission control protocol
- UDP user datagram protocol
- a computer may include at least 65,535 TCP ports (i.e. 2 16 minus one which is a 16-bit port protocol convention) and an equal number of UDP ports.
- an application When an application streams data, that application can attach itself to a particular port. Once attached, the application is then able to transmit and/or receive information from other networked computer systems via that port. Therefore, while the IP address functions to identify the computer system to other computer systems, a port allows the computer system (and specific applications running on the computer system) to provide a specific location on the computer system to receive streamed data.
- TCP transmission control protocol
- the user datagram protocol transfers data by passing data packages through a series of “intermediate” network nodes.
- a transmitting computer system may generate a package of data and then send this package to a first intermediate node in the network (e.g., another computer system, a modem, a hub, a bridge, a switch, etc.). From there, the package can be delivered to any number of other intermediate nodes prior to reaching an endpoint (i.e. a receiving computer system). Accordingly, with this protocol, the two computer systems are not connected directly to each other.
- a UDP port is used when the user datagram protocol (UDP) is being used.
- the embodiments are able to provide common access to a port.
- This port may be a TCP port, a UDP port, or any other type of port. Providing access to this port allows the owner of the collaboration session to extend, or rather enhance, the collaborative efforts.
- this port sharing process is performed, at least in part, by sharing (i.e. forwarding) a TCP port, a UDP port, or any other type of port with the participant computer systems.
- computer applications are able to attach themselves to specific ports.
- the multi-file workspace is able be attached/associated to this port.
- the multi-file workspace (which may be an application) is a web application that the collaborators are attempting to debug. By gaining access to the port, the collaborators are able to see how the web application changes in response to their debugging efforts. In this manner, the web application is accessible via the port.
- the embodiments provide significant benefits over traditional port forwarding technologies in various ways. For example, because the collaborators (e.g., the owner computer system and the participant computer systems) are already joined together via the collaboration session, a secure communication channel is already in place. As a result, the embodiments are able to use this secure channel to forward a connection to the port and/or to forward the traffic that is passing through the port. In this manner, participant computer systems are able to listen to the port so as to gain access to the underlying workspace. Therefore, significant improvements in efficiency are achieved because an additional channel is not necessary to forward the port.
- the collaborators e.g., the owner computer system and the participant computer systems
- the embodiments provide other benefits. Some benefits include, but are not limited to, providing access to the port and the port's traffic in both a secure manner and via a convenient environment (i.e. the collaboration session). Regarding the convenience aspect, multiple collaborators are able to communicate with each other as a result of the securely shared port. This is accomplished, at least in part, because the embodiments have already established a secure communication environment (i.e. the collaboration session). As a result, the embodiments provide significant benefits because they do not require an additional setup or environment in order to provide access to the port.
- the collaborators may undergo an authentication process to ensure that only authorized collaborators are present. Because the collaborators are already authenticated, the port may be forwarded without performing an additional authentication process.
- the port forwarding is done through the collaboration agents residing on the collaborator computer systems, the owner is able to securely set up port forwarding to the application he/she is debugging and is able to limit access only to the authenticated participants who are running the collaboration agents on the participant side.
- the collaboration agents that run on each collaborator computer system are run locally.
- the process of forwarding the port within the collaboration session can achieve total equivalence in the end point addresses (e.g., the IP addresses of the collaborator computer systems). Therefore, providing the port within the collaboration session results in significant improvements to a computer system's efficiency, to a computer system's security, and to various conveniences associated with using a collaboration session to forward access to a port.
- the localhost: 8080 on the owner computer system can be shared as the same localhost: 8080 on each of the participant computer systems.
- the port may be located on the localhost.
- Such a process also removes some (or all) firewall interferences that occur between the participant computer systems and the owner computer systems. This is achieved because the traffic associated with forwarding the port is funneled through the collaboration session. Therefore, so long as the firewall is properly configured to allow the collaborator agents (on each collaborator computer system) to interact with each other during the collaboration session, the embodiments are able to pass messages with each other without experiencing interference from the firewalls.
- the embodiments do not require any additional firewall configuration changes in order to perform “sub-actions” while the collaboration session is active.
- forwarding access to the port, making edits to a file, and performing debugging operations are all “sub-actions” that may be performed within the collaboration session. Because the firewall was configured to allow the collaboration session to occur, no additional firewall changes will be required for these sub-actions. In this manner, significant efficiency, security, and convenience benefits are realized.
- Another benefit of providing access to a port through the use of a collaboration session is related to the use of development tools. For instance, by gaining access to a port associated with the workspace, the development tools are provided with additional context of the workspace. In this manner, the development tools will be able to operate even more efficiently because they have access to the workspace's full context. Additionally, because of these features, the collaborators will be able to perform more informed/educated actions against the workspace because each collaborator is provided with the workspace's entire context. Accordingly, the disclosed embodiments provide port forwarding within the context of a collaboration session. This port forwarding process is seamless, hassle-free, and requires little to no need for additional configuration, setup, or use of a third party external website.
- FIG. 10 illustrates an example architecture in which the embodiments may be realized.
- FIG. 11 shows a collaboration session 1000 in which an owner computer system 1005 and a participant computer system 1010 are both members.
- the owner computer system 1005 includes a workspace 1015 and a port 1020 .
- this workspace 1015 may be a web application.
- the port 1020 is associated with the workspace 1015 .
- the association may be formed by the workspace 1015 binding itself (e.g., via binding action 1025 ) to the port 1020 .
- the workspace 1015 should be interpreted broadly.
- the workspace 1015 may include a web application, the web application's build, and any instances of the web application's build. Therefore, it will be appreciated that the build and the build instances are also associated with the port 1020 .
- the embodiments are able to make the port 1020 accessible to the participant computer system 1010 .
- making the port 1020 accessible to the participant computer system 1010 includes enabling the participant computer system 1010 to listen 1030 (e.g., on the localhost) to the port 1020 .
- listen 1030 e.g., on the localhost
- both the owner computer system 1005 and the participant computer system 1010 are able to use the port 1020 to view some (or all) of the build, the build instance(s), and/or any information/output that is associated with the build.
- both the owner computer system 1005 and the participant computer system 1010 are able to use the port 1020 to see how the web application performs. Therefore, using the port 1020 , the participant computer system 1010 is able to open a web browser, navigate to the localhost, and view how the web application operates on the browser. In this manner, the web browser is usable to access the web application using the port.
- Such a function is beneficial because it enables human collaborators, regardless of whether it is a human participant or a human owner, to see how the web application operates during the debugging process.
- FIG. 11 this figure provides additional details on how a port is forwarded within a collaboration session.
- a collaboration session 1100 is established in which an owner computer system 1105 and a participant computer system 1110 are both members.
- the owner computer system 1105 is hosting a web application 1115 A.
- hosting it is meant that the web application 1115 A's source code is stored on the owner computer system 1105 ; additionally, a build and any build instances of the web application 1115 A are also stored locally on the owner computer system 1105 .
- the web application 1115 A is associated with a port (e.g. the port 1020 shown in FIG. 10 ).
- the participant computer system 1110 is provided access to that port so that the participant computer system 1110 is able to also view the web application (e.g., web application 1115 B).
- the disclosed embodiments emulate 1120 the web application 1115 A so that the web application (e.g., web application 1115 B) is viewable on the participant computer system 1110 .
- [A 1 ]emulate/emulating it is meant that separate instances (e.g., web application 1115 A and web application 1115 B) of the front end of the web application are being displayed on each collaborator's computer system (e.g., the owner computer system 1105 and the participant computer system 1110 ). Additionally, each collaborator is able to independently view the web application's underlying workspace (i.e. the source code). Included with the ability to view the workspace is the ability to see the values of the execution lines (e.g., variable values) and the ability to submit debug commands (e.g., step forward, step backward, step through, execute to breakpoint, etc.) against the execution lines (i.e. program statements) of the source code.
- debug commands e.g., step forward, step backward, step through, execute to breakpoint, etc.
- FIG. 12 this figure shows some of the underlying architecture that may be used to realize some of the embodiments.
- a collaboration session 1200 has been established in which an owner computer system 1205 and a participant computer system 1210 are both members.
- the owner computer system 1205 includes a collaboration agent 1215 , a port 1220 , and a workspace 1225 .
- this workspace 1225 includes a web application 1230 A.
- the participant computer system 1210 includes a collaboration agent 1240 and a web application 1230 B.
- the web application 1230 A is emulated 1235 to the participant computer system 1210 so that the participant computer system 1210 is able to view the web application (e.g., web application 1230 B).
- the process of emulating the web application 1230 A is described above in relation to forwarding access 1245 to the port 1220 .
- FIG. 12 demonstrates that the process of forwarding access 1245 to the port 1220 may be accomplished in a variety of ways. Initially, it is noted that “forwarding access to the port” and “forwarding the port” mean the same and are interchangeable phrases.
- forwarding access 1245 to the port 1220 is performed via the cloud 1250 , and, in particular, by a relay service 1255 that is residing in the cloud. Such an embodiment is useful in situations where the participant computer system 1210 and the owner computer system 1205 are not on the same local area network.
- another method of forwarding access 1245 to the port 1220 may be performed via a local area network (LAN) 1260 connection. Accordingly, the embodiments are able to use whichever connection is available and/or fastest.
- LAN local area network
- a computer system includes one or more computer-readable hardware storage media that store computer-executable code. This computer-executable code is executable by the one or more processors to cause the computer system to perform these methods.
- FIG. 13 illustrates an example method 1300 for providing multiple collaborators access to a common port within a collaboration session.
- method 1300 includes an act of creating a build of an application and storing the build locally on an owner computer system (act 1305 ).
- Method 1300 also includes an act of running an instance of that build on the owner computer system (act 1310 ).
- both of these acts may be performed by a client application (e.g., client application 820 shown in FIG. 8 ).
- method 1300 includes an act of establishing a collaboration session in which the owner computer system and a participant computer system are both members (act 1315 ).
- the participant computer system is provided access to that port so that the participant computer system is able to access the build instance (act 1320 ).
- these acts may be performed by the collaboration agent 1215 and the port 1220 shown in FIG. 12 .
- an authentication associated with the collaboration session is used to authenticate the providing of the port to the participant computer system. As a result, a separate port authentication may not be performed when the port is provided.
- Method 1300 also includes an act of causing the build instance to be accessible to the participant computer system via the port (act 1325 ). This act may be performed by the collaboration agent 1215 .
- method 1300 is shown as including an act of providing access to a new instance of the build to the participant computer system via the port (act 1330 ).
- this act may be performed in response to a change to the build. Further, this act may be performed individually or by a combination of the client application 820 and the collaboration agent 1215 .
- the disclosed embodiments enable collaborators in a collaboration session to use a common port to see how a build changes in response to various actions. As a result, significant advantages are realized because the collaborators are able to see the direct results of their activities.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Entrepreneurship & Innovation (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Business, Economics & Management (AREA)
- Bioethics (AREA)
- Marketing (AREA)
- Economics (AREA)
- Tourism & Hospitality (AREA)
- Operations Research (AREA)
- Computing Systems (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
- This application claims priority to U.S. Provisional Application Ser. No. 62/585,988, filed on Nov. 14, 2017 and entitled “MULTI-FILE REAL-TIME COLLABORATION ENVIRONMENT,” the entirety of which is incorporated herein by reference.
- Computers and computing systems have impacted nearly every aspect of modern-day living. For instance, computers are generally involved in work, recreation, healthcare, transportation, and so forth.
- A computer operates by executing a set of executable instructions (i.e. code). These instructions were created in a development environment by a developer in order to create an application. In many instances, the developer will generate many different versions of the code in an effort to improve the computer's operations and to remove any bugs that are present in the code. Once the instructions are compiled, interpreted, and/or built, an underlying computer system executes the instructions to provide the application's functionalities.
- Different tools have been created to assist a developer in writing, editing, testing, and debugging an application's executable instructions. Some of these tools include program code text editors, source code editors, debuggers, and integrated development environments (IDEs), just to name a few. The process of generating and debugging code can be improved through the participation of additional developers. For example, by working together in a team, team members are able to jointly collaborate to review and improve a project.
- The subject matter claimed herein is not limited to embodiments that solve any disadvantages or that operate only in environments such as those described above. Rather, this background is provided to illustrate only one example technology area where some embodiments described herein may be practiced.
- At least some of the embodiments described herein relate to making a port available to other computer systems during a collaboration session. Initially, an application may be built on an owner computer system such that the build is saved on the owner computer system. Then, an instance of the build may be run on the owner computer system. A collaboration session in which the owner computer system and a participant computer system are both members may also be established. Within this collaboration session, the participant computer system is provided access to a port that may be used to access the build instance. Next, this build instance is made accessible to the participant computer system via the port. In response to a change to the build, the participant computer system is then provided access to a new instance of the build via the port.
- In this manner, the embodiments are able to use a secure collaboration session to forward a port from one computer system to another. Because of this secure collaboration session, the embodiments directly improve how a computer system operates because the computer system's resources will be utilized in a more efficient manner. The embodiments also provide substantial advantages because each collaborator is provided the full context of the workspace in a shared collaboration session. Furthermore, the embodiments directly improve how a web application can be debugged. These and other benefits will be described in more detail later.
- This Summary is not intended to identify key or essential features of the claimed subject matter nor is it intended to be used as an aid in determining the scope of the claimed subject matter. Instead, this Summary is provided to introduce a selection of concepts in a simplified form. These concepts are more fully described below in the Detailed Description.
- In order to describe the manner in which the above-recited and other advantages and features can be obtained, a more particular description of various embodiments will be rendered by reference to the appended drawings. Understanding that these drawings depict only sample embodiments and are not therefore to be considered limiting, the embodiments will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
-
FIG. 1 illustrates an overall view of a computer system. -
FIG. 2 provides an example depiction of how a collaboration session may be initiated. -
FIG. 3 illustrates the various forms and characteristics that a collaborator may have. -
FIG. 4 illustrates an example architecture that may be used to facilitate a collaboration session. -
FIG. 5 shows how an integration component is able to configure a client application's user interface so that it includes collaboration options. -
FIG. 6A illustrates how a client application is able to access the local files on a participant computer system. -
FIG. 6B illustrates how a client application's communications can be intercepted and re-routed. -
FIG. 7 demonstrates how an owner computer system is able to process requests submitted by a participant computer system. -
FIG. 8 demonstrates how a multi-file workspace can become accessible to a participant computer system. -
FIG. 9 demonstrates how the tools of an owner computer system can become accessible to a participant computer system. -
FIG. 10 illustrates an example scenario in which a participant computer system is listening to a port in order to gain access to a web application. -
FIG. 11 demonstrates how a web application can be emulated from one computer system to another. -
FIG. 12 presents an example architecture for forwarding a port within a collaboration session. -
FIG. 13 illustrates an example method for forwarding a port within a collaboration session. - At least some of the embodiments described herein relate to making a port available to other computer systems during a collaboration session. Initially, an application may be built on an owner computer system such that the build is saved on the owner computer system. Then, an instance of the build may be run on the owner computer system. A collaboration session in which the owner computer system and a participant computer system are both members may also be established. Within this collaboration session, the participant computer system is provided access to a port that may be used to access the build instance. Next, this build instance is made accessible to the participant computer system via the port. In response to a change to the build, the participant computer system is then provided access to a new instance of the build via the port.
- An advantage of the disclosed embodiments is that they allow an “owner collaborator” (or simply “owner”) to remain in control of his/her multi-file workspace even when outside collaborators (also called hereinafter “participant collaborators” or simply “participant(s)”) are joined with the owner in a “collaborative session.” Here, the term “owner” can refer to either a “human owner” or an “owner computer system.” Similarly, the term “participant” can refer to either a “human participant” or a “participant computer system.” In contrast, an “owner computer system” and a “participant computer system” refer only to a computer system and do not include a human operator. Additionally, “collaborator” refers to any entity (e.g., an owner or a participant) that has joined a collaboration session while “collaborators” refers to some or all of the entities in the collaboration session (e.g., the owner and all of the participants).
- As also used herein, a “multi-file workspace” is an assembly of multiple files that operate collectively by interacting with each other. As an example, a code development project may include multiple files of source code that, when executed, operate together to perform complex functions. Thus, a code development project may be considered a multi-file workspace. Other examples of a multi-file workspace include, but are not limited to, text files and/or word processing files (e.g., where the files are linked via a table of contents or some other linking unit), or any other content in which multiple sources of data are joined together. Yet another non-limiting example of a multi-file workspace is a wiki-based workspace that is configured to receive edits and/or markdowns from multiple entities. Accordingly, from this disclosure, it will be appreciated that the embodiments are able to operate with regard to any kind of multi-file workspace. For the sake of brevity, and by way of example only, the remaining portion of this disclosure will focus on a multi-file workspace that includes multiple files of source code.
- Here, it is also worthwhile to note that a “collaboration session,” as used herein, is an occurrence in which an owner computer system is joined with one or more participant computer systems in order to jointly collaborate on a multi-file workspace. During this collaboration session, the participant computer systems are provided access to a multi-file workspace that is stored locally on the owner computer system. In this manner, the participants need not download the multi-file workspace. Instead, the participant computer systems act as headless units because editing and other operations may be performed on the owner computer system as opposed to occurring on each of the participant computer systems.
- Of note, collaboration sessions may be initiated for a broad variety of reasons. For example, in some instances, a collaboration session may be established so that the participants can assist the owner in performing a certain function. For instance, if the collaboration involves debugging, the owner might be the primary person tasked with generating the code, whereas the participants may be other developers who are helping the owner debug that code. In a learning environment, the owner may be a student, and the participant may be a teacher. In an alternative learning environment, a professor may be the owner and his/her students may be the participants. In such a scenario, the professor is able to guide his/her students in demonstrating how the workspace operates. In this context, the owner is able to retain administrative control over his/her multi-file workspace.
- Yet another example scenario includes a coding interview process in which the interviewer sets up a workspace environment (e.g., a coding environment). Here, the interviewer is the owner and the interviewee is the participant. In another example scenario, an owner need not be a human on one end of the system. Instead, an owner computer system may be a build server that has no human owner. In this scenario, as will be discussed in more detail later, a human participant, who is using a participant computer system, is able to join a remote codebase (i.e. an “owner” build instance) for the purpose of collaborating in a debugging scenario. Of note, in situations where the owner is a build instance, the disclosed embodiments enable one (or perhaps more) of the participants to assume control of the multi-file workspace. Relatedly, a participant is also able to assume ownership for specific changes to the multi-file workspace.
- Having just described some of the situations in which the embodiments may be practiced, the disclosure will now introduce some of the technical benefits that are provided herein. For example, the disclosed embodiments may be implemented to overcome many of the technical difficulties and computational expenses associated with jointly controlling and collaborating on a multi-file workspace. To illustrate, conventional methods for debugging an application often involve each collaborator installing a workspace's global environment/context and then applying the same data (or steps) in order to reproduce the exact issues that led to finding a bug. Such a process consumes a significant amount of time, computing resources, and manpower. As used herein, the term “context” refers to the state of a workspace.
- In contrast, the disclosed embodiments provide significant advantages because they enable multiple computers to connect to a single computer, which is running a workspace's environmental logic (e.g., services) and which is maintaining a global context of the workspace, to thereby allow the collaborators to jointly collaborate on the multi-file workspace (as opposed to having multiple different workspaces operating on multiple different computers). These operations result in a significant increase in the overall efficiency of the collaborating computer systems.
- Another advantage of the disclosed embodiments is that because only a single workspace is being operated on, the collaborators' operations are synchronized with each other. For example, when multiple collaborators (e.g., code developers) are joined together in a collaborative session, each collaborator is made aware (in real-time) of at least some, and potentially all, of the actions of all of the other collaborators because each collaborator is working on the same workspace. In other words, each collaborator's individual action is “synced” with the actions of the other collaborators.
- Having just described various advantages and high-level attributes of some of the disclosed embodiments, the disclosure will now focus on
FIG. 1 which presents an introductory discussion of an example computer system. Following that discussion, the disclosure will focus onFIGS. 2 through 9 . In particular, these Figures illustrate various architectures and supporting illustrations for providing a collaboration session according to the disclosed principles. Finally, the disclosure will focus onFIGS. 10 through 13 which present various architectures and methods for forwarding a port within a collaboration session. - As illustrated in
FIG. 1 , in its most basic configuration, acomputer system 100 includes various different components. For example,FIG. 1 shows thatcomputer system 100 includes at least one hardware processing unit 105 (aka “processor”),storage 110, input/output (I/O) interfaces 115,graphics rendering engines 120, andvarious communication channels 125. - The
storage 110 may be physical system memory, which may be volatile, non-volatile, or some combination of the two. Accordingly, thestorage 115 may be referred to as a “hardware storage device” on which computer-executable instructions are stored. The term “memory” may also be used herein to refer to non-volatile mass storage such as physical storage media. If thecomputer system 100 is distributed, the processing, memory, and/or storage capability may be distributed as well. As used herein, the term “executable module,” “executable component,” or even “component” can refer to software objects, routines, or methods that may be executed on thecomputer system 100. The different components, modules, engines, and services described herein may be implemented as objects or processors that execute on the computer system 100 (e.g., as separate threads). - The disclosed embodiments may comprise or utilize a special-purpose or general-purpose computer including computer hardware, such as, for example, one or more processors (such as hardware processing unit 105) and system memory (such as storage 110), as discussed in greater detail below. Embodiments also include physical and other computer-readable media for carrying or storing computer-executable instructions and/or data structures. Such computer-readable media can be any available media that can be accessed by a general-purpose or special-purpose computer system. Computer-readable media that store computer-executable instructions in the form of data are physical computer storage media. Computer-readable media that carry computer-executable instructions are transmission media. Thus, by way of example and not limitation, the current embodiments can comprise at least two distinctly different kinds of computer-readable media: computer storage media and transmission media.
- Computer storage media are hardware/physical storage devices, such as RAM, ROM, EEPROM, CD-ROM, solid state drives (SSDs) that are based on RAM, Flash memory, phase-change memory (PCM), or other types of memory, or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to store desired program code means in the form of computer-executable instructions, data, or data structures and that can be accessed by a general-purpose or special-purpose computer.
- The
computer system 100 may also be connected (via a wired or wireless connection) to external sensors (e.g., data acquisition devices). Further, thecomputer system 100 may also be connected through one or more wired or wireless network(s) 130 to remote systems(s) that are configured to perform any of the processing described with regard tocomputer system 100. - The
graphics rendering engine 120 is configured, with the processor(s) 105, to render one or more objects on a display of thecomputer system 100. As a result, a user is able to view the results of the various functionalities of thecomputer system 100. - A “network,” like the network(s) 130 shown in
FIG. 1 , is defined as one or more data links and/or data switches that enable the transport of electronic data between computer systems, modules, and/or other electronic devices. When information is transferred, or provided, over a network (either hardwired, wireless, or a combination of hardwired and wireless) to a computer, the computer properly views the connection as a transmission medium. As illustrated thecomputer system 100 includes one ormore communication channels 125 that are used to communicate with the network(s) 130. Transmissions media include a network that can be used to carry data or desired program code means in the form of computer-executable instructions or in the form of data structures. Further, these computer-executable instructions can be accessed by a general-purpose or special-purpose computer. Combinations of the above should also be included within the scope of computer-readable media. - Upon reaching various computer system components, program code means in the form of computer-executable instructions or data structures can be transferred automatically from transmission media to computer storage media (or vice versa). For example, computer-executable instructions or data structures received over a network or data link can be buffered in RAM within a network interface module (e.g., a network interface card or “NIC”) and then eventually transferred to computer system RAM and/or to less volatile computer storage media at a computer system. Thus, it should be understood that computer storage media can be included in computer system components that also (or even primarily) utilize transmission media.
- Computer-executable (or computer-interpretable) instructions comprise, for example, instructions that cause a general-purpose computer, special-purpose computer, or special-purpose processing device to perform a certain function or group of functions. The computer-executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, or even source code. Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the described features or acts described above. Rather, the described features and acts are disclosed as example forms of implementing the claims.
- Those skilled in the art will appreciate that the embodiments may be practiced in network computing environments with many types of computer system configurations, including personal computers, desktop computers, laptop computers, message processors, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, tablets, pagers, routers, switches, cloud-based machines and infrastructures, and the like. The embodiments may also be practiced in distributed system environments where local and remote computer systems that are linked (either by hardwired data links, wireless data links, or by a combination of hardwired and wireless data links) through a network each perform tasks (e.g. cloud computing, cloud services and the like). In a distributed system environment, program modules may be located in both local and remote memory storage devices.
- Additionally or alternatively, the functionality described herein can be performed, at least in part, by one or more hardware logic components. For example, and without limitation, illustrative types of hardware logic components that can be used include Field-Programmable Gate Arrays (FPGAs), Program-Specific or Application-Specific Integrated Circuits (ASICs), Program-Specific Standard Products (ASSPs), System-On-A-Chip Systems (SOCs), Complex Programmable Logic Devices (CPLDs), Central Processing Units (CPUs), and other types of programmable hardware.
- As discussed above, computer systems are able to provide a broad variety of different functions. According to the principles disclosed herein, the embodiments are able to provide a multi-file real-time collaboration environment. Accordingly, attention will now be directed to
FIGS. 2 through 9 , which figures present various architectures and supporting illustrations for establishing a collaboration session. -
FIG. 2 illustrates acollaboration session 200 in which anowner computer system 205 and aparticipant computer system 210 are both members. Notably, both theowner computer system 205 and theparticipant computer system 210 may include all of the features and functionalities that were discussed in relation to thecomputer system 100 ofFIG. 1 . Accordingly, when reference is made to a “computer system,” it will be appreciated that such a system may include the features ofcomputer system 100. - Here, it will be appreciated that there may be any number of participant computer systems in the
collaboration session 200. For instance,FIG. 2 shows that Participant “A,” Participant “B,” and/or Participant “C” may be included in thecollaboration session 200. As a result, theowner computer system 205 may be a first member in thecollaboration session 200, Participant “A” may be a second member in thecollaboration session 200, Participant “B” may be a third member in the collaboration session (i.e. three or more members are joined), and so on with potentially no limit. Accordingly,FIG. 2 is for example purposes only and should not be considered limiting. Furthermore, the remaining portion of this disclosure focuses on collaboration sessions that depict only a single participant; however, it should be understood that the principles may be practiced with any number of participants. - Returning to
FIG. 2 , the disclosed embodiments establish thecollaboration session 200 so that theparticipant computer system 210 is able to gain access to a multi-file workspace stored on theowner computer system 205. In this manner, theparticipant computer system 210 can operate on the remote workspace as if the remote workspace were local. For instance, a human participant can independently view, edit, and otherwise operate on the remote workspace. By creating this type of collaboration session, all of the collaborators (e.g., the owner and participant(s)) are all able to collaborate on a single multi-file workspace. Accordingly, the disclosed embodiments provide many efficiencies over traditional collaboration processes. - Here, the
collaboration session 200 may be initiated in a variety of ways. In some embodiments, the collaborators (e.g., theowner computer system 205 and the participant computer system 210) are able to communicate with each other over a local area network (LAN)connection 215. When this type of connection is available, then thecollaboration session 200 may be initiated by sending arequest 220 over theLAN connection 215. In this manner, the collaborators are able to communicate directly in a peer-to-peer manner. To summarize, the collaboration session may be initiated using a peer-to-peer connection between the collaborator computer systems, where the peer-to-peer connection is established via a local area network connection. - Of note, in some instances, the
owner computer system 205 may desire that theparticipant computer system 210 be authenticated prior to entering thecollaboration session 200. As such, the embodiments are able to use the cloud 225 to provide authentication services. For example, some embodiments provide anauthentication service 230 in the cloud 225. Theparticipant computer system 210 can use thisauthentication service 230 to authenticate itself to theowner computer system 205. After the authentication is complete, then thecollaboration session 200 can be initiated and theowner computer system 205 and the authenticatedparticipant computer system 210 can jointly work on a multi-file workspace. - In other embodiments, the
collaboration session 200 is initiated by sending therequest 220 through arelay service 235 operating in the cloud 225. Here, thisrelay service 235 is able to connect computers that are on different native networks. Accordingly, the embodiments are able to use various services residing in the cloud 225 in order to initiate thecollaboration session 200. - Other embodiments use a hybrid approach to initiating the
collaboration session 200. For instance, if some participant computer systems are located on the same LAN as theowner computer system 205, then therequest 220 can be sent to those participant computer systems using the LAN. Additionally, if some participant computer systems are not using the same LAN as theowner computer system 205, then therequest 220 can be transmitted using therelay service 235 in the cloud 225. Accordingly, the disclosed embodiments are able to use a variety of methods for initiating thecollaboration session 200. Here, it is worthwhile to note that the disclosed embodiments are able to intelligently select whichever process is most efficient to initiate thecollaboration session 200. On a related note, thecollaboration session 200 is able to continue to use the respective network connections to maintain the communications between the collaborators. - Ending the
collaboration session 200 may be performed in a variety of ways. In some embodiments, thecollaboration session 200 ends through an action of one of the collaborators. For example, one of the collaborators may select an “End Collaboration” option. - In another embodiment, the collaboration session may end upon expiration of a time-out period. For example, the owner may have configured a policy controlling how long the collaboration session will remain active. Upon expiration of that period, the participants' connection to the collaboration session will be terminated. Additionally, the owner may set a policy indicating a time-out period associated with the shutting down of a client (e.g., an IDE). For example, the owner may set a time-out period to cause the collaboration session to terminate after a predetermined period of time has elapsed after the client was shut down. Such a feature is beneficial because it provides the collaborators adequate time to save any changes or to provide documentation within the code.
- Alternatively, other embodiments are configured to end the collaboration session when the owner computer system shuts down and/or the owner logs off of the owner computer system. In yet another alternative embodiment, the collaboration session may continue to run even after the owner computer system has shut down, gone to sleep, or been logged off. As an example, suppose the human owner decided to perform a quick reboot or had to quickly attend a meeting. Here, because the collaboration session is still active (even though the owner computer system may not be active), the human owner will be able to quickly resume her work when she returns from her activities. An advantage realized by this embodiment is that if any configuration options are adjusted, then those adjustments can be persisted and will be in place for the remaining duration of the collaboration session. In this manner, the collaborators will be able to quickly resume working at the locations where they left off, and they can continue to operate using the same configuration options.
- Other embodiments include audit tracking features that record each collaborators' actions (e.g., their edits). In this manner, these embodiments provide an audit trail that can be reviewed and analyzed at a later time, if the need or desire arises. Once the collaboration session ends based on the principles discussed above, then the audit tracking may also end.
- Similar to
FIG. 2 ,FIG. 3 illustrates anothercollaboration session 300. Here, it will be appreciated thatcollaboration session 300 is analogous to thecollaboration session 200 ofFIG. 3 . In the scenario presented inFIG. 3 , thecollaboration session 300 includes anowner 305 and aparticipant computer system 310. - In particular,
FIG. 3 shows some of the various characteristics that theowner 305 and theparticipant computer system 310 may have. As an example, theowner 305 may not be a computer system with a human operator. Instead, it may be a build instance of an application, as shown inFIG. 3 . On a related note, theowner 305 may be a headless build instance that is residing in the cloud. In such a scenario, then the various participants are able to operate on the codebase on which the build instance is based. - Alternatively, the
owner 305 may be a computer system (as shown inFIG. 3 ) that is using a first type of operating system (e.g., Operating System “A”). In some situations, a human owner will operate theowner 305. Furthermore, the human owner is able to perform work on the multi-file workspace through the use of a client application that is residing on theowner 305. As used herein, a “client application” may be any type of application that enables theowner 305 to operate on the multi-file workspace. In situations where the multi-file workspace is a collection of text files, a client application may be a text editor, a word processing program, or any other program suitable to operate on the text files. In situations where the multi-file workspace is a collection of source code files, a client application may be a source code editor, an integrated development environment (IDE), or any other program suitable to operate on source code. Here, it will be appreciated that these client applications are provided permissions to access the multi-file workspace residing on theowner 305. AlthoughFIG. 3 shows that theowner 305 is able to operate a client application that is in the form of an IDE (e.g., IDE “A”), it will be appreciated that any type of client application may be used, not just an IDE. - Turning now to the
participant computer system 310, theparticipant computer system 310 may also be a computer system that is using an operating system (e.g., Operating System “B”). Here it is worthwhile to note that Operating System “B” may be different than Operating System “A.” As a result, theowner 305 and theparticipant computer system 310 need not use the same type of operating system in order to be joined together in thecollaboration session 300 to work on the multi-file workspace. Relatedly, theparticipant computer system 310 need not use the same type of client application (e.g., IDE “B”) as theowner 305. Therefore, according to the principles disclosed herein, a participant is able to use his/her preferred operating system and client application regardless of the type of operating system and/or client application that the owner (e.g., owner 305) is using. Accordingly, the embodiments are operating system agnostic and client application agnostic. - Up to this point, the disclosure has presented some of the ways in which a collaboration session may be initiated and some of the characteristics of the collaborators. In light of that background, attention will now be directed to
FIG. 4 , which presents some architectural components that may be used to realize the benefits of the disclosed principles. -
FIG. 4 illustrates acollaboration session 400 in which anowner computer system 405 and aparticipant computer system 410 are members. Here, theowner computer system 405 is a computer system that includes acollaboration agent 415. As illustrated, thiscollaboration agent 415 includes a set of base tools 420 (e.g., Tool A, Tool B, and Tool C). AlthoughFIG. 4 shows thecollaboration agent 415 as including only three base tools, it will be appreciated that thecollaboration agent 415 may include any number of base tools. Additional details on thebase tools 420 will be presented momentarily. - The
owner computer system 405 also includes aclient application 425. As discussed earlier, a client application (e.g., client application 425) may be a text editor, word processing editor, source code editor, IDE, or any other type of application that enables a user to operate on a multi-file workspace. In light of that understanding,client application 425 may include aclient tool 430. Similar to the above disclosure, although theclient application 425 is shown as including only a single tool, it will be appreciated that theclient application 425 may have any number of tools. Relatedly, theowner computer system 405 may have any number of client applications installed thereon. As an example, theclient application 425 may be an integrated development environment (IDE) that has permissions to access the multi-file workspace. Further, this IDE may manage/host a set of client development tools. In this manner, the IDE can be used to work on the multi-file workspace. - Here, it will be appreciated that a base tool (e.g., Tool A, Tool B, or Tool C) may be a service or other type of function/tool that is generally common across many or all of the different types of client applications. For example, in the context of code editing, the
base tools 420 may include a code completion service, a code debugging service (e.g., a source code error checking tool), a code highlighting service, a code navigation service, a code colorization service (e.g., syntax highlighting in which different colors are applied to the syntax depending on what category a syntax term belongs to), a code refactoring service (e.g., restructuring code without altering its behavior), a code hinting service (e.g., code completion), a source code search tool, a source code control tool, and/or a lightbulb service (e.g., an icon service that provides an expanded display of options). - Additional services and tools include, but are not limited to, providing member lists, parameter information, symbol services, source code transpilation (e.g., changing the source code so it reads in a different coding language), hover features, smart typing abilities, and quick code information. Relatedly, the
client tool 430 may be a tool that is specific to a particular client application and that is not generally common among different client applications. As an example, theclient tool 420 may be a tool or service specific to a particular type of IDE. - According to the principles disclosed herein, the
owner computer system 405 is able to make these set of development tools (i.e. both the set ofbase tools 420 and the client tool 430) accessible to theparticipant computer system 410. Because these tools reside on theowner computer system 405, the tools have access to the entire context of the multi-file workspace. By making the tools accessible to theparticipant computer system 410, a human participant is able to use the tools in light of the entire context of the multi-file workspace. In this manner, the collaborators are able to operate on the multi-file workspace using a set of tools that understand the workspace's entire context. - Returning to
FIG. 4 , theowner computer system 405 also includes anintegration component 435 and a set oflocal files 440. In some embodiments, the multi-file workspace is included within the set oflocal files 440 on theowner computer system 405. - As discussed earlier, it is often desirable to enable a team of developers to jointly work on a project. According to the principles discussed here, the
collaboration session 400 may be initiated so as to enable one or more participants (e.g., participant computer system 410) to join theowner computer system 405 in collaborating on a multi-file workspace that is stored locally on the owner computer system 405 (e.g., perhaps in the local files 440). - To achieve these benefits, the disclosed embodiments cause the
integration component 435 to attach, or rather “hook,” to theclient application 425 in a lightweight manner. For example, theintegration component 435 may be a plugin or other type of client extension that hooks into theclient application 425 to perform “redirection,” “rerouting,” and customization operations. For example, the integration component 435 (which is on the owner computer system 405) is configured to add additional functionalities to theclient application 425. Of note, these additional functionalities are at least directed to establishing and maintaining thecollaboration session 400. - To illustrate,
FIG. 5 shows anowner computer system 500, which is analogous to theowner computer system 405 ofFIG. 4 . InFIG. 5 , theowner computer system 500 includes aclient application 505 and anintegration component 510. Theclient application 505 is also shown as including a user interface 515. After theintegration component 510 hooks itself onto theclient application 505, then theintegration component 510 is able to expand upon the abilities of theclient application 505. - For example, in some embodiments, the
integration component 510 will alter the user interface 515 so that it includes additional features related to a collaboration session. To illustrate, a set ofnew collaboration options 525 have been added to the user interface 515 as a result of theintegration component 510 attaching itself to theclient application 505. The set ofnew collaboration options 525 includeOption 1,Option 2, andOption 3. Theellipses 520 demonstrates that any number of options may be added to the user interface 515. Some of the set ofcollaboration options 525 may include, but are not limited to, (1) an option to initiate a collaboration session, (2) an option to terminate a collaboration session, and/or (3) an option to acquire information about a particular participant (e.g., the participant's avatar may be displayed and, when the avatar is selected, identifying information about the participant may be displayed). - Another option is a “pin” to participant's position option. As discussed, the embodiments enable a participant to work on a multi-file workspace that is stored locally on an owner computer system. Included with this functionality is the ability of the participant to independently navigate to areas within the multi-file workspace where the owner computer system is not currently operating (or even in locations where the owner computer system is operating). Furthermore, the embodiments also enable the participant to independently edit files. In light of these abilities, an owner may desire to learn where a participant is currently navigating/operating within his/her multi-file workspace.
- By selecting the pin to participant's position option (e.g., the options can be selectable buttons), the embodiments automatically navigate the owner to the same location as a participant within the workspace. If there are multiple participants, then the owner may initially be prompted to select a particular participant. As an example, suppose an owner is editing
File 1 shown in the user interface 515 inFIG. 5 . At the same time, a participant may be independently editingFile 2. By clicking the pin to participant's position option, the owner can be automatically navigated toFile 2, and in particular to the exact location where the participant is editingFile 2. Therefore, although the embodiments enable participants to independently navigate and edit the files within the workspace, the embodiments also enable the owner to be automatically directed to the locations within the workspace where the participants are working. In some embodiments, this feature is also provided to each of the participants. Therefore, in these embodiments, each collaborator is able to follow the actions of the other collaborators. - Another option that may be provided among the set of
new collaboration options 525 is the option to adjust the access controls of the participants. For example, the owner may be provided with an option to adjust a policy so that participants are allowed to navigate to or edit only certain files. Yet another option is related to an audit feature in which the actions of the participants are recorded and are made available for viewing by the owner. Accordingly, theintegration component 510 is able to interact with theclient application 505 to enhance the owner's control over the participants in a collaboration session. - Returning to
FIG. 4 , attention will now be directed to theparticipant computer system 410. Here, theparticipant computer system 410 is shown as including acollaboration agent 445, aclient application 450, anintegration component 455, andlocal files 460. Here, thecollaboration agent 445 communicates with thecollaboration agent 415 to provide theparticipant computer system 410 access to the multi-file workspace residing on theowner computer system 405. Additional details on this interaction will be presented later. At this point, it is worthwhile to note that theclient application 450 also provides a user interface to the participant so that the participant is able to view (and therefore work on) the multi-file workspace. - Similar to the
integration component 435, theintegration component 455 also attaches itself to theclient application 455. The functionalities of thisintegration component 455 will now be discussed in relation toFIGS. 6A and 6B . -
FIG. 6A shows aparticipant computer system 600A that includes a set oflocal files 605A, which are analogous to thelocal files 460, and a client application 610A. In this scenario, theparticipant computer system 600A does not have an integration component. Accordingly, when theparticipant computer system 600A is thusly configured, the client application 610A is able to submitrequests 615A to the set oflocal files 605A. In this manner, the client application 610A operates on files that are stored locally on theparticipant computer system 600A. - To enable a participant computer system to operate on a remote multi-file workspace in an operating system agnostic and client application agnostic manner, the participant computer system uses a collaboration agent and an integration component. These features are shown in
FIG. 6B . For example, theparticipant computer system 600B ofFIG. 6B includes acollaboration agent 605, a set oflocal files 610B, aclient application 615B, and anintegration component 620. After attaching itself to theclient application 615B, theintegration component 620 is able to interceptrequests 625B that are issued by theclient application 615B. Normally, theserequests 625B would be fulfilled using the set oflocal files 610B. Now, instead of therequests 625B being fulfilled using the information from the set oflocal files 610B, theintegration component 620 intercepts thoserequests 625B and routes the interceptedrequests 625B to thecollaboration agent 605. Once therequests 625B are received, thecollaboration agent 605 then routes the interceptedrequests 625B to a collaboration agent residing on the owner computer system (e.g.,collaboration agent 415 inFIG. 4 ). - Turning briefly to
FIG. 7 ,FIG. 7 shows how an owner-side collaboration agent handles requests that are received from a participant-side collaboration agent. Here, thecollaboration session 700 includes anowner computer system 705 and aparticipant computer system 710. Theowner computer system 705 includes acollaboration agent 720, a set ofbase tools 725, a set of client tools 730, and a set oflocal files 735. Theellipses 740 demonstrates that theowner computer system 705 may have additional features. - In this scenario, a participant-side collaboration agent is able to receive an intercepted request as described in connection with
FIG. 6B . This request is shown asrequest 715 inFIG. 7 . Here, the participant-side collaboration agent transmits therequest 715 to thecollaboration agent 720. After receiving therequest 715, thecollaboration agent 720 then processes therequest 715. In some instances, processing therequest 715 includes making the set ofbase tools 725 accessible to theparticipant computer system 710. Relatedly, processing therequest 715 may include making the set of client tools 730 accessible to theparticipant computer system 710. In other instances, processing therequest 715 may include making the set oflocal files 735 accessible to theparticipant computer system 710. In this manner, a multi-file workspace residing on theowner computer system 705 may be made accessible to theparticipant computer system 710. In some instances, processing therequest 715 includes making edits to the files in the multi-file workspace. Edits include, but are not limited to, changing text within the file, adding a new file, deleting an existing file, or any other file editing operations. - Here, it is worthwhile to note that the
participant computer system 710 is not downloading the multi-file workspace. Instead, it is being given access to the workspace through the use of its collaboration agent, its integration component, and the owner-side collaboration agent. In this manner, theparticipant computer system 710 is able to reach across and perform work on theowner computer system 705's multi-file workspace. After therequest 715 is processed by theowner computer system 705, thecollaboration agent 720 then transmits a response back to theparticipant computer system 710. In particular, thecollaboration agent 720 transmits the response back to the participant-side collaboration agent. - Returning to
FIG. 6B , thecollaboration agent 605 will then receive any responses generated by an owner computer system. Once a response is received, then some embodiments will cause the response to be transmitted back to theclient application 615B via theintegration component 620. In other embodiments, however, thecollaboration agent 605 is able to directly transmit the response (e.g., response 630) to theclient application 615B. In this manner, the participant is able to see the results of his/her processed requests. - Here, an example will be helpful. Suppose an owner establishes a collaboration session in which a participant is a member. The owner has asked the participant to assist him/her in debugging source code. The owner begins by debugging a first file while the participant begins by debugging a second file. Of note, both of these files are included in the multi-file workspace and both are stored on the owner's computer system. In this example, the second file is displayed on the participant's computer system even though the file's contents are actually stored only on the owner's computer system.
- Additionally, the participant is able to independently view and edit the contents of the second file even though the owner is currently working on the first file. In this manner, multiple collaborators are able to jointly work on a single multi-file workspace. In some instances, the owner and the participant will be working on the same file. When such a scenario is present, then the owner will be able to see (in real-time) the changes made by the participant, and the participant will be able to see (in-real time) the changes made by the owner. Accordingly, the changes made by the collaborators are made in real-time and are synchronized with each other. In light of this discussion, it will be appreciated that the participant is given the illusion that he/she is working on a local workspace whereas, in actuality, the workspace is not local.
- By following these principles, the disclosed embodiments are able to provide a participant computer system access to a multi-file workspace that is stored on the owner computer system. Furthermore, a human participant is able to view that workspace and to edit that workspace. This viewing and editing can be performed independently of any viewing and editing that an owner may be performing on the multi-file workspace. In this manner, a participant no longer needs to replicate a workspace's context in order to work on that workspace. Additionally, the participant is able to use his/her preferred client application, even if that client application is different from the owner's client application. Even further, the participant is able to use the owner's set of tools, which tools understand the entire context of the multi-file workspace.
- Attention will now be directed to
FIG. 8 , which provides additional details for enabling a participant to collaborate on a multi-file workspace. Here, thecollaboration session 800 includes anowner computer system 805 and aparticipant computer system 810. Theowner computer system 805 includes acollaboration agent 815, aclient application 820, anintegration component 825, and a set oflocal files 830. The set oflocal files 830 includes amulti-file workspace 835. Here, thismulti-file workspace 835 includes a set offiles 840, acontext 845 of themulti-file workspace 835, and a file directory 850. - When the
collaboration agent 815 receives a request from theparticipant computer system 810 according to the manner just described, thecollaboration agent 815 is able to process the request and return aresponse 855 to theparticipant computer system 810. As shown, thisresponse 855 may include file data 860 (i.e. data concerning the set of files 840), context data 865 (i.e. data concerning the context 845), or directory data 870 (i.e. data concerning the file directory 850). In some instances, this data is metadata while in other instances this data enables theparticipant computer system 810 to display the multi-file workspace and receive edits directed to the multi-file workspace. In this manner, providing theparticipant computer system 810 access to the multi-file workspace includes providing access to the workspace's file directory, context, and files. From this information, themulti-file workspace 835 can be displayed on theparticipant computer system 810, and the participant will be able to operate on that multi-file workspace. - From the above disclosure, it will be appreciated that the
owner computer system 805 is transmitting sufficient information (e.g., metadata and other information) so that theparticipant computer system 810 is able to understand what is included within themulti-file workspace 835. Furthermore, theparticipant computer system 810 is able to receive enough information so that a visualization of themulti-file workspace 835 may be rendered on a user interface of theparticipant computer system 810. In this manner, theparticipant computer system 810 is acting as a headless entity because a majority of the operations are actually being performed on theowner computer system 805. - For example, the
participant computer system 810 submits viewing and editing requests to theowner computer system 805. Theowner computer system 805 then processes those requests and returns results back to theparticipant computer system 810. As such, theparticipant computer system 810 is provided the illusion that it is working on a local workspace, but in actuality the workspace is not local and the operations on the workspace are being performed by theowner computer system 805. -
FIG. 9 shows some additional operations that may be performed. Here, thecollaboration session 900 includes anowner computer system 905 and aparticipant computer system 910. Theowner computer system 905 includes acollaboration agent 915. As discussed, thiscollaboration agent 915 is able to maintain a set ofbase tools 920. Theowner computer system 905 also includes a client application 925, which client application 925 is able to maintain a set ofclient tools 930. - According to the principles discussed herein, the embodiments are also able to make the set of
base tools 920 and the set ofclient tools 930 accessible to theparticipant computer system 910. For example, theparticipant computer system 910 is able to use the tools that are residing on theowner computer system 905 in order to perform operations on theowner computer system 905's multi-file workspace. Therefore, not only is theparticipant computer system 910 able to view and edit the multi-file workspace on theowner computer system 905, but it is also able to make use of the tools that are on theowner computer system 905. Theparticipant computer system 910 is able to receiveinformation 935 that includesbase tool data 940 and/orclient tool data 945. In this manner, theparticipant computer system 910 is able make use of theowner computer system 905's development tools. - Having just described how a collaboration session may be established, attention will now be directed to
FIGS. 10 through 12 . In particular, these figures demonstrate how a collaboration session may be used to forward a port so that multiple collaborators can see the immediate results of their edits. As used herein, “forwarding” a port refers to the process of providing the collaborators access to the port. As a result, the embodiments enable collaborators to view how their source code edits impact an application's build instance through the use of a shared/forwarded port. - At this point, it is worthwhile to reflect on what a port is. Initially, it is noted that each computer system typically includes an internet protocol (IP) address. This IP address is useful for differentiating the computer from other networked computers. When information is sent over a network (i.e. “streamed”) to a computer that has an IP address, that information may be received at one of the computer's ports. Notably, each IP address is typically associated with a large number of ports; furthermore, the IP address can be associated with various different types of ports. To illustrate, an IP address may be associated with a transmission control protocol (TCP) port and/or a user datagram protocol (UDP) port, just to name a couple. In some situations, a computer may include at least 65,535 TCP ports (i.e. 216 minus one which is a 16-bit port protocol convention) and an equal number of UDP ports.
- When an application streams data, that application can attach itself to a particular port. Once attached, the application is then able to transmit and/or receive information from other networked computer systems via that port. Therefore, while the IP address functions to identify the computer system to other computer systems, a port allows the computer system (and specific applications running on the computer system) to provide a specific location on the computer system to receive streamed data.
- Additional details on some of the various different types of ports will now be presented. First, it is noted that when networked computer systems communicate through the use of the transmission control protocol (TCP), those computer systems actually establish a direct linkage with each other. For instance, when using this protocol, a transmitting computer system will establish a direct link with a receiving computer system. This link will be present throughout the entire course of a data transfer. In this manner, the data may be transferred securely and reliably. Once the data transfer is complete, the link will often be broken. Here, it will be appreciated that a TCP port is used when the transmission control protocol (TCP) is being used.
- In contrast to the transmission control protocol (TCP), the user datagram protocol (UDP) transfers data by passing data packages through a series of “intermediate” network nodes. To illustrate, a transmitting computer system may generate a package of data and then send this package to a first intermediate node in the network (e.g., another computer system, a modem, a hub, a bridge, a switch, etc.). From there, the package can be delivered to any number of other intermediate nodes prior to reaching an endpoint (i.e. a receiving computer system). Accordingly, with this protocol, the two computer systems are not connected directly to each other. Here, it will be appreciated that a UDP port is used when the user datagram protocol (UDP) is being used.
- Accordingly, the embodiments are able to provide common access to a port. This port may be a TCP port, a UDP port, or any other type of port. Providing access to this port allows the owner of the collaboration session to extend, or rather enhance, the collaborative efforts.
- In some embodiments, this port sharing process is performed, at least in part, by sharing (i.e. forwarding) a TCP port, a UDP port, or any other type of port with the participant computer systems. As discussed earlier, computer applications are able to attach themselves to specific ports. With this understanding, it will be appreciated that the multi-file workspace is able be attached/associated to this port. In some circumstances, the multi-file workspace (which may be an application) is a web application that the collaborators are attempting to debug. By gaining access to the port, the collaborators are able to see how the web application changes in response to their debugging efforts. In this manner, the web application is accessible via the port.
- The embodiments provide significant benefits over traditional port forwarding technologies in various ways. For example, because the collaborators (e.g., the owner computer system and the participant computer systems) are already joined together via the collaboration session, a secure communication channel is already in place. As a result, the embodiments are able to use this secure channel to forward a connection to the port and/or to forward the traffic that is passing through the port. In this manner, participant computer systems are able to listen to the port so as to gain access to the underlying workspace. Therefore, significant improvements in efficiency are achieved because an additional channel is not necessary to forward the port.
- Furthermore, the embodiments provide other benefits. Some benefits include, but are not limited to, providing access to the port and the port's traffic in both a secure manner and via a convenient environment (i.e. the collaboration session). Regarding the convenience aspect, multiple collaborators are able to communicate with each other as a result of the securely shared port. This is accomplished, at least in part, because the embodiments have already established a secure communication environment (i.e. the collaboration session). As a result, the embodiments provide significant benefits because they do not require an additional setup or environment in order to provide access to the port.
- As another example, during the initialization of the collaboration session, the collaborators may undergo an authentication process to ensure that only authorized collaborators are present. Because the collaborators are already authenticated, the port may be forwarded without performing an additional authentication process. To clarify, since the port forwarding is done through the collaboration agents residing on the collaborator computer systems, the owner is able to securely set up port forwarding to the application he/she is debugging and is able to limit access only to the authenticated participants who are running the collaboration agents on the participant side.
- As yet another example, the collaboration agents that run on each collaborator computer system (e.g., the owner computer system and the participant computer systems) are run locally. As a result, the process of forwarding the port within the collaboration session can achieve total equivalence in the end point addresses (e.g., the IP addresses of the collaborator computer systems). Therefore, providing the port within the collaboration session results in significant improvements to a computer system's efficiency, to a computer system's security, and to various conveniences associated with using a collaboration session to forward access to a port.
- By way of example, the localhost:8080 on the owner computer system can be shared as the same localhost:8080 on each of the participant computer systems. As such, the port may be located on the localhost. Such a process also removes some (or all) firewall interferences that occur between the participant computer systems and the owner computer systems. This is achieved because the traffic associated with forwarding the port is funneled through the collaboration session. Therefore, so long as the firewall is properly configured to allow the collaborator agents (on each collaborator computer system) to interact with each other during the collaboration session, the embodiments are able to pass messages with each other without experiencing interference from the firewalls. In other words, other than a potential initial configuration to allow the collaboration agents to operate, the embodiments do not require any additional firewall configuration changes in order to perform “sub-actions” while the collaboration session is active. To illustrate, forwarding access to the port, making edits to a file, and performing debugging operations are all “sub-actions” that may be performed within the collaboration session. Because the firewall was configured to allow the collaboration session to occur, no additional firewall changes will be required for these sub-actions. In this manner, significant efficiency, security, and convenience benefits are realized.
- Another benefit of providing access to a port through the use of a collaboration session is related to the use of development tools. For instance, by gaining access to a port associated with the workspace, the development tools are provided with additional context of the workspace. In this manner, the development tools will be able to operate even more efficiently because they have access to the workspace's full context. Additionally, because of these features, the collaborators will be able to perform more informed/educated actions against the workspace because each collaborator is provided with the workspace's entire context. Accordingly, the disclosed embodiments provide port forwarding within the context of a collaboration session. This port forwarding process is seamless, hassle-free, and requires little to no need for additional configuration, setup, or use of a third party external website.
- Having just described some of the benefits of the disclosed embodiments, attention will now be directed to
FIG. 10 . Here, this figure illustrates an example architecture in which the embodiments may be realized. - As illustrated,
FIG. 11 shows acollaboration session 1000 in which anowner computer system 1005 and aparticipant computer system 1010 are both members. Here, theowner computer system 1005 includes aworkspace 1015 and aport 1020. As discussed earlier, thisworkspace 1015 may be a web application. In the situation presented inFIG. 10 , theport 1020 is associated with theworkspace 1015. As an example, the association may be formed by theworkspace 1015 binding itself (e.g., via binding action 1025) to theport 1020. Here, it is worthwhile to note that theworkspace 1015 should be interpreted broadly. For example, theworkspace 1015 may include a web application, the web application's build, and any instances of the web application's build. Therefore, it will be appreciated that the build and the build instances are also associated with theport 1020. - According to the principles disclosed herein, the embodiments are able to make the
port 1020 accessible to theparticipant computer system 1010. In some instances, making theport 1020 accessible to theparticipant computer system 1010 includes enabling theparticipant computer system 1010 to listen 1030 (e.g., on the localhost) to theport 1020. Accordingly, it will be appreciated that both theowner computer system 1005 and theparticipant computer system 1010 are able to use theport 1020 to view some (or all) of the build, the build instance(s), and/or any information/output that is associated with the build. - In situations where the
workspace 1015 includes a web application, both theowner computer system 1005 and theparticipant computer system 1010 are able to use theport 1020 to see how the web application performs. Therefore, using theport 1020, theparticipant computer system 1010 is able to open a web browser, navigate to the localhost, and view how the web application operates on the browser. In this manner, the web browser is usable to access the web application using the port. Such a function is beneficial because it enables human collaborators, regardless of whether it is a human participant or a human owner, to see how the web application operates during the debugging process. - Turning now to
FIG. 11 , this figure provides additional details on how a port is forwarded within a collaboration session. Here, acollaboration session 1100 is established in which anowner computer system 1105 and aparticipant computer system 1110 are both members. As illustrated, theowner computer system 1105 is hosting aweb application 1115A. By “hosting” it is meant that theweb application 1115A's source code is stored on theowner computer system 1105; additionally, a build and any build instances of theweb application 1115A are also stored locally on theowner computer system 1105. - Although not displayed in
FIG. 11 , theweb application 1115A is associated with a port (e.g. theport 1020 shown inFIG. 10 ). Here, theparticipant computer system 1110 is provided access to that port so that theparticipant computer system 1110 is able to also view the web application (e.g.,web application 1115B). In this manner, the disclosed embodiments emulate 1120 theweb application 1115A so that the web application (e.g.,web application 1115B) is viewable on theparticipant computer system 1110. - By “[A1]emulate/emulating,” it is meant that separate instances (e.g.,
web application 1115A andweb application 1115B) of the front end of the web application are being displayed on each collaborator's computer system (e.g., theowner computer system 1105 and the participant computer system 1110). Additionally, each collaborator is able to independently view the web application's underlying workspace (i.e. the source code). Included with the ability to view the workspace is the ability to see the values of the execution lines (e.g., variable values) and the ability to submit debug commands (e.g., step forward, step backward, step through, execute to breakpoint, etc.) against the execution lines (i.e. program statements) of the source code. - Turning now to
FIG. 12 , this figure shows some of the underlying architecture that may be used to realize some of the embodiments. Here, acollaboration session 1200 has been established in which an owner computer system 1205 and aparticipant computer system 1210 are both members. The owner computer system 1205 includes acollaboration agent 1215, aport 1220, and aworkspace 1225. Of note, thisworkspace 1225 includes a web application 1230A. Theparticipant computer system 1210 includes acollaboration agent 1240 and aweb application 1230B. As shown in this figure, the web application 1230A is emulated 1235 to theparticipant computer system 1210 so that theparticipant computer system 1210 is able to view the web application (e.g.,web application 1230B). The process of emulating the web application 1230A is described above in relation to forwardingaccess 1245 to theport 1220. -
FIG. 12 demonstrates that the process of forwardingaccess 1245 to theport 1220 may be accomplished in a variety of ways. Initially, it is noted that “forwarding access to the port” and “forwarding the port” mean the same and are interchangeable phrases. In a first embodiment, forwardingaccess 1245 to theport 1220 is performed via thecloud 1250, and, in particular, by arelay service 1255 that is residing in the cloud. Such an embodiment is useful in situations where theparticipant computer system 1210 and the owner computer system 1205 are not on the same local area network. It follows then, that another method of forwardingaccess 1245 to theport 1220 may be performed via a local area network (LAN) 1260 connection. Accordingly, the embodiments are able to use whichever connection is available and/or fastest. - The following discussion now refers to a number of methods and method acts that may be performed. Although the method acts may be discussed in a certain order or illustrated in a flow chart as occurring in a particular order, no particular ordering is required unless specifically stated, or required because an act is dependent on another act being completed prior to the act being performed. These methods may be implemented by one or more processors of a computer system (e.g., the
computer system 100 ofFIG. 1 ). By way of example, a computer system includes one or more computer-readable hardware storage media that store computer-executable code. This computer-executable code is executable by the one or more processors to cause the computer system to perform these methods. -
FIG. 13 illustrates anexample method 1300 for providing multiple collaborators access to a common port within a collaboration session. Initially,method 1300 includes an act of creating a build of an application and storing the build locally on an owner computer system (act 1305).Method 1300 also includes an act of running an instance of that build on the owner computer system (act 1310). Here, both of these acts may be performed by a client application (e.g.,client application 820 shown inFIG. 8 ). - Next,
method 1300 includes an act of establishing a collaboration session in which the owner computer system and a participant computer system are both members (act 1315). Within this collaboration session, the participant computer system is provided access to that port so that the participant computer system is able to access the build instance (act 1320). Here, these acts may be performed by thecollaboration agent 1215 and theport 1220 shown inFIG. 12 . In some instances, an authentication associated with the collaboration session is used to authenticate the providing of the port to the participant computer system. As a result, a separate port authentication may not be performed when the port is provided. -
Method 1300 also includes an act of causing the build instance to be accessible to the participant computer system via the port (act 1325). This act may be performed by thecollaboration agent 1215. - Finally,
method 1300 is shown as including an act of providing access to a new instance of the build to the participant computer system via the port (act 1330). Here, this act may be performed in response to a change to the build. Further, this act may be performed individually or by a combination of theclient application 820 and thecollaboration agent 1215. - Accordingly, the disclosed embodiments enable collaborators in a collaboration session to use a common port to see how a build changes in response to various actions. As a result, significant advantages are realized because the collaborators are able to see the direct results of their activities.
- The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Claims (20)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/879,296 US20190146899A1 (en) | 2017-11-14 | 2018-01-24 | Assistive debugging of web applications with port forwarding |
| PCT/US2018/059714 WO2019099260A1 (en) | 2017-11-14 | 2018-11-08 | Assistive debugging of web applications with port forwarding |
| EP18811995.2A EP3710940A1 (en) | 2017-11-14 | 2018-11-08 | Assistive debugging of web applications with port forwarding |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201762585988P | 2017-11-14 | 2017-11-14 | |
| US15/879,296 US20190146899A1 (en) | 2017-11-14 | 2018-01-24 | Assistive debugging of web applications with port forwarding |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20190146899A1 true US20190146899A1 (en) | 2019-05-16 |
Family
ID=66431326
Family Applications (6)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/879,296 Abandoned US20190146899A1 (en) | 2017-11-14 | 2018-01-24 | Assistive debugging of web applications with port forwarding |
| US15/879,289 Active 2038-09-14 US10810109B2 (en) | 2017-11-14 | 2018-01-24 | Architecture for remoting language services |
| US15/879,266 Active US10678675B2 (en) | 2017-11-14 | 2018-01-24 | Assistive, language-agnostic debugging with multi-collaborator control |
| US15/879,256 Abandoned US20190146783A1 (en) | 2017-11-14 | 2018-01-24 | Collaborative software development with heterogeneous development tools |
| US15/879,261 Abandoned US20190146758A1 (en) | 2017-11-14 | 2018-01-24 | Collaborative editing of source code with intelligent operations |
| US15/948,714 Active 2039-01-13 US10846203B2 (en) | 2017-11-14 | 2018-04-09 | Responding to requests by tracking file edits |
Family Applications After (5)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/879,289 Active 2038-09-14 US10810109B2 (en) | 2017-11-14 | 2018-01-24 | Architecture for remoting language services |
| US15/879,266 Active US10678675B2 (en) | 2017-11-14 | 2018-01-24 | Assistive, language-agnostic debugging with multi-collaborator control |
| US15/879,256 Abandoned US20190146783A1 (en) | 2017-11-14 | 2018-01-24 | Collaborative software development with heterogeneous development tools |
| US15/879,261 Abandoned US20190146758A1 (en) | 2017-11-14 | 2018-01-24 | Collaborative editing of source code with intelligent operations |
| US15/948,714 Active 2039-01-13 US10846203B2 (en) | 2017-11-14 | 2018-04-09 | Responding to requests by tracking file edits |
Country Status (4)
| Country | Link |
|---|---|
| US (6) | US20190146899A1 (en) |
| EP (6) | EP3710934A1 (en) |
| CN (2) | CN111344678A (en) |
| WO (6) | WO2019099265A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10678675B2 (en) | 2017-11-14 | 2020-06-09 | Microsoft Technology Licensing, Llc | Assistive, language-agnostic debugging with multi-collaborator control |
Families Citing this family (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11397663B2 (en) | 2017-11-02 | 2022-07-26 | Silicon Mobility Sas | Software environment for control engine debug, test, calibration and tuning |
| US10938641B1 (en) * | 2018-11-09 | 2021-03-02 | Amazon Technologies, Inc. | On-demand development environment |
| US10846197B1 (en) * | 2018-12-13 | 2020-11-24 | Facebook, Inc. | Systems and methods for debugging mixed-language applications |
| CN110405759B (en) * | 2019-07-16 | 2020-11-13 | 大唐微电子技术有限公司 | Chip control system |
| CN111078269A (en) * | 2019-07-19 | 2020-04-28 | 华控清交信息科技(北京)有限公司 | Version management method, version recovery method, editor, system and storage medium |
| US11765152B2 (en) | 2019-07-25 | 2023-09-19 | Microsoft Technology Licensing, Llc | Related asset access based on proven primary asset access |
| CN112632016B (en) * | 2019-09-24 | 2024-12-20 | 腾讯科技(深圳)有限公司 | A file editing method and device |
| USD965028S1 (en) * | 2020-02-07 | 2022-09-27 | Bottomline Technologies, Inc | Display screen with a machine learning score graphical user interface |
| USD942507S1 (en) * | 2020-02-07 | 2022-02-01 | Bottomline Technologies Inc | Display screen with graphical user interface |
| US11941064B1 (en) | 2020-02-14 | 2024-03-26 | Bottomline Technologies, Inc. | Machine learning comparison of receipts and invoices |
| CN112306595A (en) | 2020-04-30 | 2021-02-02 | 北京字节跳动网络技术有限公司 | Interaction method, apparatus and electronic device |
| US11677574B1 (en) * | 2020-07-02 | 2023-06-13 | Intrado Corporation | Automated conference sessions generated to manage application development |
| US11711493B1 (en) | 2021-03-04 | 2023-07-25 | Meta Platforms, Inc. | Systems and methods for ephemeral streaming spaces |
| US11763078B2 (en) | 2021-04-22 | 2023-09-19 | Microsoft Technology Licensing, Llc | Provisional selection drives edit suggestion generation |
| CN113094033B (en) * | 2021-06-07 | 2021-08-27 | 南京沁恒微电子股份有限公司 | An engineering structure adaptation method of MCU integrated development environment |
| US20230342285A1 (en) * | 2022-04-22 | 2023-10-26 | Replit, Inc. | Multiplayer Debugger |
| US20240119156A1 (en) * | 2022-10-11 | 2024-04-11 | Change Healthcare Holdings, Llc | System and method for automated software development compliance verification and auditing |
| WO2024147201A1 (en) * | 2023-01-06 | 2024-07-11 | 株式会社プログミー | Programming education method, programming education program, programming education server, and programming education terminal |
| US12197400B1 (en) * | 2023-09-25 | 2025-01-14 | Databricks, Inc. | Clean room generation for data collaboration |
| US20250278495A1 (en) * | 2024-03-04 | 2025-09-04 | Robert Bosch Gmbh | Systems and methods for setting up and maintaining multi-party computation environments |
| US12536004B1 (en) * | 2025-05-13 | 2026-01-27 | Morgan Stanley Services Group Inc. | System and method for round-robinediting of a generated user interface |
Family Cites Families (118)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH05165610A (en) * | 1991-12-13 | 1993-07-02 | Hitachi Ltd | Method for generating and maintaining software developing environment |
| JPH0619771A (en) * | 1992-04-20 | 1994-01-28 | Internatl Business Mach Corp <Ibm> | File management system of shared file by different kinds of clients |
| US6405364B1 (en) * | 1999-08-31 | 2002-06-11 | Accenture Llp | Building techniques in a development architecture framework |
| WO2001077816A2 (en) | 2000-04-11 | 2001-10-18 | Gausa L.L.C. | System and method for real-time multi-directional file-based data streaming editor |
| US8196029B1 (en) | 2000-06-21 | 2012-06-05 | Microsoft Corporation | System and method for enabling simultaneous multi-user electronic document editing |
| US6842770B1 (en) * | 2000-08-18 | 2005-01-11 | Apple Computer, Inc. | Method and system for seamlessly accessing remotely stored files |
| CA2424713C (en) | 2000-08-21 | 2007-12-04 | Thoughtslinger Corporation | Simultaneous multi-user document editing system |
| US20020129106A1 (en) * | 2001-03-12 | 2002-09-12 | Surgency, Inc. | User-extensible system for manipulating information in a collaborative environment |
| CA2391719A1 (en) | 2002-06-26 | 2003-12-26 | Ibm Canada Limited-Ibm Canada Limitee | Editing files of remote systems using an integrated development environment |
| US8032470B1 (en) | 2003-11-10 | 2011-10-04 | James Ralph Heidenreich | System and method to facilitate user thinking about an arbitrary problem with collaboration or social networking system |
| US20040234315A1 (en) * | 2003-05-20 | 2004-11-25 | Colwell Steven Lee | Method and computer-readable medium for faster data entry |
| US7877738B2 (en) | 2003-06-20 | 2011-01-25 | Apple Inc. | Speculative compilation |
| US7805702B2 (en) * | 2003-10-29 | 2010-09-28 | International Business Machines Corporation | Collaborative development environments for software |
| US7216257B2 (en) * | 2004-01-21 | 2007-05-08 | Sap Ag | Remote debugging |
| US7734685B2 (en) | 2004-07-27 | 2010-06-08 | International Business Machines Corporation | Method, system and program product for annotating a development artifact |
| US7748033B2 (en) * | 2005-02-25 | 2010-06-29 | Microsoft Corporation | Windows remote debugger service |
| US7774703B2 (en) | 2006-02-09 | 2010-08-10 | Microsoft Corporation | Virtual shadow awareness for multi-user editors |
| US20070220479A1 (en) * | 2006-03-14 | 2007-09-20 | Hughes John M | Systems and methods for software development |
| US8079019B2 (en) * | 2007-11-21 | 2011-12-13 | Replay Solutions, Inc. | Advancing and rewinding a replayed program execution |
| US20080005235A1 (en) * | 2006-06-30 | 2008-01-03 | Microsoft Corporation | Collaborative integrated development environment using presence information |
| US20080028323A1 (en) | 2006-07-27 | 2008-01-31 | Joshua Rosen | Method for Initiating and Launching Collaboration Sessions |
| US20080059941A1 (en) * | 2006-08-30 | 2008-03-06 | Timothy Payne | Method and system for supporting a collaborative development environment |
| US20160112262A1 (en) | 2014-10-18 | 2016-04-21 | Weaved, Inc. | Installation and configuration of connected devices |
| US7904418B2 (en) | 2006-11-14 | 2011-03-08 | Microsoft Corporation | On-demand incremental update of data structures using edit list |
| US8555257B2 (en) | 2006-11-20 | 2013-10-08 | Wind River Systems, Inc. | System and method for networked software development |
| US8234620B1 (en) | 2007-04-30 | 2012-07-31 | Oracle America, Inc. | Method and system for software development using distributed computing resources |
| US7697230B2 (en) | 2007-07-17 | 2010-04-13 | Hewlett-Packard Development Company, L.P. | Tape drive position control |
| US8788589B2 (en) | 2007-10-12 | 2014-07-22 | Watchitoo, Inc. | System and method for coordinating simultaneous edits of shared digital data |
| US7941399B2 (en) | 2007-11-09 | 2011-05-10 | Microsoft Corporation | Collaborative authoring |
| JP2009237190A (en) | 2008-03-27 | 2009-10-15 | Seiko Epson Corp | Method of controlling belt fixing device, belt fixing device, and image forming apparatus |
| US20090249224A1 (en) | 2008-03-31 | 2009-10-01 | Microsoft Corporation | Simultaneous collaborative review of a document |
| KR101527993B1 (en) | 2008-04-05 | 2015-06-10 | 소우셜 커뮤니케이션즈 컴퍼니 | Shared virtual area communication environment based apparatus and methods |
| US8230348B2 (en) | 2008-04-28 | 2012-07-24 | Roger Peters | Collaboration software with real-time synchronization |
| US20100057865A1 (en) * | 2008-09-04 | 2010-03-04 | International Business Machines Corporation | Transferable Debug Session in a Team Environment |
| US20100257457A1 (en) | 2009-04-07 | 2010-10-07 | De Goes John A | Real-time content collaboration |
| US8555161B2 (en) | 2010-05-27 | 2013-10-08 | Microsoft Corporation | Concurrent editing of a document by multiple clients |
| US8843832B2 (en) | 2010-07-23 | 2014-09-23 | Reh Hat, Inc. | Architecture, system and method for a real-time collaboration interface |
| US9799004B2 (en) | 2010-07-30 | 2017-10-24 | Avaya Inc. | System and method for multi-model, context-aware visualization, notification, aggregation and formation |
| US8151017B2 (en) | 2010-08-23 | 2012-04-03 | Smartech World Wide Limited | Multiplexing application and debug channels on a single USB connection |
| US20120084758A1 (en) * | 2010-10-05 | 2012-04-05 | International Business Machines Corporation | Collaborative Software Debugging In A Distributed System With Client-Specific Variable Evaluation |
| US8904356B2 (en) | 2010-10-20 | 2014-12-02 | International Business Machines Corporation | Collaborative software debugging in a distributed system with multi-member variable expansion |
| US20120102459A1 (en) | 2010-10-20 | 2012-04-26 | International Business Machines Corporation | Collaborative Software Debugging In A Distributed System With Stacked Event Group Management |
| US8972945B2 (en) * | 2010-10-21 | 2015-03-03 | International Business Machines Corporation | Collaborative software debugging in a distributed system with client-specific access control |
| US20120102467A1 (en) | 2010-10-21 | 2012-04-26 | International Business Machines Corporation | Collaborative Software Debugging In A Distributed System With Client-Specific Display Location Upon Event Notification |
| US9009673B2 (en) | 2010-10-21 | 2015-04-14 | International Business Machines Corporation | Collaborative software debugging in a distributed system with collaborative step over operation |
| US8671393B2 (en) | 2010-10-21 | 2014-03-11 | International Business Machines Corporation | Collaborative software debugging in a distributed system with client-specific dynamic breakpoints |
| US20120102466A1 (en) | 2010-10-21 | 2012-04-26 | International Business Machines Corporation | Collaborative Software Debugging In A Distributed System With Graphic Representation Of Source Code Ownership Assignments |
| US8739021B2 (en) | 2010-11-04 | 2014-05-27 | Microsoft Corporation | Version history inside document |
| US8850397B2 (en) | 2010-11-10 | 2014-09-30 | International Business Machines Corporation | Collaborative software debugging in a distributed system with client-specific display of local variables |
| US9411709B2 (en) * | 2010-11-10 | 2016-08-09 | International Business Machines Corporation | Collaborative software debugging in a distributed system with client-specific event alerts |
| US8990775B2 (en) * | 2010-11-10 | 2015-03-24 | International Business Machines Corporation | Collaborative software debugging in a distributed system with dynamically displayed chat sessions |
| US8869052B2 (en) | 2010-11-30 | 2014-10-21 | Sap Se | Context-dependent object types in an integrated development environment |
| US9021436B2 (en) | 2010-12-08 | 2015-04-28 | Microsoft Technology Licensing Llc | Automatic reconnection of debugger to a reactivated application |
| US9514424B2 (en) * | 2010-12-30 | 2016-12-06 | Kyle Kleinbart | System and method for online communications management |
| US20120254773A1 (en) * | 2011-01-07 | 2012-10-04 | Subramanian V | Touch screen based interactive media sharing |
| US8869097B2 (en) * | 2011-03-23 | 2014-10-21 | Infosys Limited | Online integrated development environment with code assist |
| US8656360B2 (en) * | 2011-04-20 | 2014-02-18 | International Business Machines Corporation | Collaborative software debugging in a distributed system with execution resumption on consensus |
| US8739127B2 (en) | 2011-04-20 | 2014-05-27 | International Business Machines Corporation | Collaborative software debugging in a distributed system with symbol locking |
| US8806438B2 (en) | 2011-04-20 | 2014-08-12 | International Business Machines Corporation | Collaborative software debugging in a distributed system with variable-specific messages |
| US20120272218A1 (en) | 2011-04-20 | 2012-10-25 | International Business Machines Corporation | Collaborative Software Debugging In A Distributed System With Stacked Run-To-Cursor Commands |
| US20120278790A1 (en) | 2011-04-26 | 2012-11-01 | International Business Machines Corporation | Collaborative Software Debugging In A Distributed System With Real-Time Variable Modification Indicators |
| US8789014B2 (en) * | 2011-05-13 | 2014-07-22 | Microsoft Corporation | Managing a working set in an integrated development environment |
| US20120297363A1 (en) * | 2011-05-19 | 2012-11-22 | Microsoft Corporation | Inferred and shared source control integration across mulitiple program development tools |
| US8495590B2 (en) * | 2011-06-10 | 2013-07-23 | International Business Machines Corporation | User-specific software debugging |
| US8572438B2 (en) | 2011-06-24 | 2013-10-29 | Microsoft Corporation | N-way runtime interoperative debugging |
| US8756577B2 (en) | 2011-06-28 | 2014-06-17 | International Business Machines Corporation | Collaborative software debugging in a distributed system with private debug sessions |
| US9595009B2 (en) * | 2011-06-29 | 2017-03-14 | International Business Machines Corporation | Code reviewer selection in a distributed software development environment |
| US20150193406A1 (en) | 2011-09-02 | 2015-07-09 | Micah Lemonik | System and Method to Provide Collaborative Document Processing Services Via Interframe Communication |
| US8682973B2 (en) * | 2011-10-05 | 2014-03-25 | Microsoft Corporation | Multi-user and multi-device collaboration |
| US8434002B1 (en) | 2011-10-17 | 2013-04-30 | Google Inc. | Systems and methods for collaborative editing of elements in a presentation document |
| US20130185252A1 (en) | 2012-01-17 | 2013-07-18 | Jeffrey J. Palmucci | Document Revision Manager |
| US9344486B2 (en) * | 2012-01-18 | 2016-05-17 | Rafael Julio de Ameller | Remote geobrowser control for collaborative decision making |
| US9342493B2 (en) | 2012-02-07 | 2016-05-17 | International Business Machines Corporation | Transient, real-time position tracking interface for user activity in a document editing application |
| US9720809B2 (en) | 2012-02-17 | 2017-08-01 | Microsoft Technology Licensing, Llc | Dynamically enabling debugging over the internet |
| US20130247004A1 (en) | 2012-03-19 | 2013-09-19 | International Business Machines Corporation | Visually indicating file allocation in an integrated development environment |
| US9286597B2 (en) | 2012-03-30 | 2016-03-15 | Microsoft Technology Licensing, Llc | Tracking co-authoring conflicts using document comments |
| US9864973B2 (en) | 2012-04-12 | 2018-01-09 | Avid Technology, Inc. | Methods and systems for collaborative media creation |
| US8881115B2 (en) | 2012-04-17 | 2014-11-04 | International Business Machines Corporation | Compiling source code for debugging with expanded snapshots |
| US9483259B1 (en) | 2012-05-07 | 2016-11-01 | Google Inc. | System and method for providing real-time execution of source code in a collaborative online software development environment |
| CN103973741B (en) | 2013-01-31 | 2018-02-09 | 国际商业机器公司 | Method and device for remote debugging in cloud system |
| US9256341B2 (en) | 2013-03-20 | 2016-02-09 | Microsoft Technology Licensing, Llc | Tracking changes in collaborative authoring environment |
| US9465784B1 (en) | 2013-06-20 | 2016-10-11 | Bulletin Intelligence LLC | Method and system for enabling real-time, collaborative generation of documents having overlapping subject matter |
| US9201759B2 (en) | 2013-07-26 | 2015-12-01 | Sap Se | Debugging applications in the cloud |
| US20150040101A1 (en) | 2013-08-05 | 2015-02-05 | Sap Ag | Collaborative Awareness in Software Development |
| US9268670B1 (en) * | 2013-08-08 | 2016-02-23 | Google Inc. | System for module selection in software application testing including generating a test executable based on an availability of root access |
| US8819617B1 (en) | 2013-09-19 | 2014-08-26 | Fmr Llc | System and method for providing access to data in a plurality of software development systems |
| US9158658B2 (en) * | 2013-10-15 | 2015-10-13 | International Business Machines Corporation | Detecting merge conflicts and compilation errors in a collaborative integrated development environment |
| US9727445B2 (en) * | 2013-11-09 | 2017-08-08 | Microsoft Technology Licensing, Llc. | Debugging a web application locally during development |
| US9729615B2 (en) * | 2013-11-18 | 2017-08-08 | Nuwafin Holdings Ltd | System and method for collaborative designing, development, deployment, execution, monitoring and maintenance of enterprise applications |
| US9832237B2 (en) | 2013-11-27 | 2017-11-28 | Getgo, Inc. | Collaborative online document editing |
| US9348579B2 (en) | 2014-07-03 | 2016-05-24 | Sap Se | Integration of social networks with integrated development environment (IDE) |
| US9026652B1 (en) * | 2014-07-09 | 2015-05-05 | Fmr Llc | Web service asset management and web service information storage |
| US10353701B2 (en) | 2014-09-29 | 2019-07-16 | Sap Se | Code analysis for cloud-based integrated development environments |
| GB201417913D0 (en) * | 2014-10-10 | 2014-11-26 | Ibm | Collaborative development of software programs based on service invocations |
| US10095509B2 (en) | 2015-02-04 | 2018-10-09 | Sap Se | Supporting developer-user collaborative software review in IDE |
| US9645910B1 (en) * | 2015-03-12 | 2017-05-09 | Amazon Technologies, Inc. | Cross platform mobile HTML debugging |
| US20160323351A1 (en) | 2015-04-29 | 2016-11-03 | Box, Inc. | Low latency and low defect media file transcoding using optimized storage, retrieval, partitioning, and delivery techniques |
| US20170003835A1 (en) | 2015-06-30 | 2017-01-05 | Microsoft Technology Licensing, Llc | State-specific ordering in collaboration services |
| US10169552B2 (en) | 2015-07-17 | 2019-01-01 | Box, Inc. | Event-driven generation of watermarked previews of an object in a collaboration environment |
| US10409901B2 (en) | 2015-09-18 | 2019-09-10 | Microsoft Technology Licensing, Llc | Providing collaboration communication tools within document editor |
| US9858070B2 (en) | 2015-10-05 | 2018-01-02 | International Business Machines Corporation | Development team file collaboration |
| US10521215B2 (en) | 2015-12-10 | 2019-12-31 | Intel Corporation | Technologies for customized crowd-sourced features, automated safety and quality assurance with a technical computing environment |
| WO2017136236A1 (en) | 2016-02-02 | 2017-08-10 | ActiveWrite, Inc. | Document collaboration and consolidation tools and methods of use |
| WO2017156496A1 (en) | 2016-03-11 | 2017-09-14 | Post Oak Today LLC | Methods and apparatus for establishing shared memory spaces for data access and distribution |
| US10671376B2 (en) | 2016-03-15 | 2020-06-02 | Shenzhen Skyworth-Rgb Electronic Co., Ltd. | Server program hot upgrading method and device |
| US10547601B2 (en) * | 2016-06-06 | 2020-01-28 | Salesforce.Com, Inc. | System and method to allow third-party developer to debug code in customer environment |
| US20170357486A1 (en) * | 2016-06-10 | 2017-12-14 | International Business Machines Corporation | Enhancing a crowdsourced integrated development environment application |
| US10216616B2 (en) | 2016-07-02 | 2019-02-26 | Intel Corporation | Cooperative triggering |
| US10942839B2 (en) | 2016-10-28 | 2021-03-09 | Ingram Micro Inc. | System and method for debugging applications on a developer workstation |
| US20180124155A1 (en) | 2016-11-01 | 2018-05-03 | Microsoft Technology Licensing, Llc | Network-based group communication and file sharing system |
| US10261885B2 (en) | 2016-11-02 | 2019-04-16 | Servicenow, Inc. | Debug event handling |
| US10049028B2 (en) | 2016-11-02 | 2018-08-14 | Servicenow, Inc. | Debug session management |
| US10152404B2 (en) | 2016-11-07 | 2018-12-11 | Vmware, Inc. | Collaborative debugging |
| US20180157676A1 (en) | 2016-12-01 | 2018-06-07 | Microsoft Technology Licensing, Llc | Managing activity data related to collaboratively edited electronic documents |
| US10133716B2 (en) | 2016-12-23 | 2018-11-20 | Documill Oy | Generation of notifications in a collaborative document editing environment |
| US10867128B2 (en) | 2017-09-12 | 2020-12-15 | Microsoft Technology Licensing, Llc | Intelligently updating a collaboration site or template |
| US10872062B2 (en) | 2017-10-27 | 2020-12-22 | Dropbox, Inc. | Moderated collaborative editing in collaborative content items |
| US20190146899A1 (en) | 2017-11-14 | 2019-05-16 | Microsoft Technology Licensing, Llc | Assistive debugging of web applications with port forwarding |
-
2018
- 2018-01-24 US US15/879,296 patent/US20190146899A1/en not_active Abandoned
- 2018-01-24 US US15/879,289 patent/US10810109B2/en active Active
- 2018-01-24 US US15/879,266 patent/US10678675B2/en active Active
- 2018-01-24 US US15/879,256 patent/US20190146783A1/en not_active Abandoned
- 2018-01-24 US US15/879,261 patent/US20190146758A1/en not_active Abandoned
- 2018-04-09 US US15/948,714 patent/US10846203B2/en active Active
- 2018-11-08 EP EP18808585.6A patent/EP3710934A1/en not_active Withdrawn
- 2018-11-08 EP EP18811995.2A patent/EP3710940A1/en not_active Withdrawn
- 2018-11-08 WO PCT/US2018/059719 patent/WO2019099265A1/en not_active Ceased
- 2018-11-08 EP EP18807825.7A patent/EP3710933A1/en not_active Ceased
- 2018-11-08 WO PCT/US2018/059718 patent/WO2019099264A1/en not_active Ceased
- 2018-11-08 EP EP18811996.0A patent/EP3710935A1/en not_active Ceased
- 2018-11-08 CN CN201880073634.6A patent/CN111344678A/en not_active Withdrawn
- 2018-11-08 WO PCT/US2018/059715 patent/WO2019099261A1/en not_active Ceased
- 2018-11-08 WO PCT/US2018/059717 patent/WO2019099263A1/en not_active Ceased
- 2018-11-08 WO PCT/US2018/059714 patent/WO2019099260A1/en not_active Ceased
- 2018-11-08 EP EP18811420.1A patent/EP3710939B1/en active Active
- 2018-11-08 EP EP18811419.3A patent/EP3710932A1/en not_active Withdrawn
- 2018-11-08 WO PCT/US2018/059716 patent/WO2019099262A1/en not_active Ceased
- 2018-11-08 CN CN201880073640.1A patent/CN111344666A/en active Pending
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10678675B2 (en) | 2017-11-14 | 2020-06-09 | Microsoft Technology Licensing, Llc | Assistive, language-agnostic debugging with multi-collaborator control |
| US10810109B2 (en) | 2017-11-14 | 2020-10-20 | Microsoft Technology Licensing, Llc | Architecture for remoting language services |
| US10846203B2 (en) | 2017-11-14 | 2020-11-24 | Microsoft Technology Licensing, Llc | Responding to requests by tracking file edits |
Also Published As
| Publication number | Publication date |
|---|---|
| US20190146758A1 (en) | 2019-05-16 |
| EP3710939A1 (en) | 2020-09-23 |
| EP3710934A1 (en) | 2020-09-23 |
| CN111344678A (en) | 2020-06-26 |
| EP3710940A1 (en) | 2020-09-23 |
| EP3710935A1 (en) | 2020-09-23 |
| US10810109B2 (en) | 2020-10-20 |
| EP3710933A1 (en) | 2020-09-23 |
| WO2019099263A1 (en) | 2019-05-23 |
| CN111344666A (en) | 2020-06-26 |
| WO2019099260A1 (en) | 2019-05-23 |
| EP3710939B1 (en) | 2024-01-17 |
| US10846203B2 (en) | 2020-11-24 |
| EP3710932A1 (en) | 2020-09-23 |
| WO2019099264A1 (en) | 2019-05-23 |
| US20190146783A1 (en) | 2019-05-16 |
| WO2019099261A1 (en) | 2019-05-23 |
| US20190147048A1 (en) | 2019-05-16 |
| US20190146898A1 (en) | 2019-05-16 |
| WO2019099265A1 (en) | 2019-05-23 |
| WO2019099262A1 (en) | 2019-05-23 |
| US20190149346A1 (en) | 2019-05-16 |
| US10678675B2 (en) | 2020-06-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20190146899A1 (en) | Assistive debugging of web applications with port forwarding | |
| US20170185421A1 (en) | User interfaces in a computer system | |
| Leonidis et al. | The AmI-Solertis system: creating user experiences in smart environments | |
| KR100988597B1 (en) | User-friendly Robot Contents Authoring System in Web Environment | |
| Nüst et al. | The Rockerverse: packages and applications for containerization with R | |
| Chelliah et al. | Architectural Patterns: Uncover essential patterns in the most indispensable realm of enterprise architecture | |
| Sazanavets | Microservices Communication in. NET Using GRPC | |
| Wienholt | Customizing and Extending Copilot | |
| Landgraf | Full Stack Web Development with Remix: Enhance the user experience and build better React apps by utilizing the web platform | |
| REFIK | Implementation of a private messaging service Peer-to-Peer using WebRTC technology | |
| Krendzel | Diary Thesis at Huawei Technologies Oy (Finland) Co. Ltd | |
| Selvaraj | Networking and API Integration | |
| Shvets | Networking and Advanced I/O | |
| Nemes et al. | Cooperative design on the Internet | |
| Guelfi et al. | A Study of Mobile Internet Technologies for Secure e-commerce Applications Development | |
| Nemes¹ et al. | Cooperative Design on the Internet | |
| de Jesús Hoyos-Rivera et al. | CoLab: A new paradigm and tool for collaboratively browsing the Web | |
| Peng et al. | SRCS: Multi-user Web Browser Sharing and Collaboration System | |
| Kalaoja et al. | WISA knowledge base and reference architecture | |
| Williams | DOE SciDAC's Earth System Grid Center for Enabling Technologies Final Report | |
| Eggertsson et al. | Hotsarch | |
| Curtis | Machine View | |
| Kalaoja et al. | WISA knowledge base and reference | |
| Pajunen | Reserved Call Queue With Service Oriented Architecture | |
| CHEN | A NOVEL PEER-TO-PEER CLUSTER FOR GENERIC APPLICATION SHARING |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LANTZ, CHARLES ERIC;CARTER, JONATHAN PRESTON;CALVERT, SIMON;AND OTHERS;SIGNING DATES FROM 20180112 TO 20180120;REEL/FRAME:044749/0650 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |