Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

Ca Inc
Ca Inc_20131212

Ca Inc patents


Recent patent applications related to Ca Inc. Ca Inc is listed as an Agent/Assignee. Note: Ca Inc may have other listings under different names/spellings. We're not affiliated with Ca Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Ca Inc-related inventors


 new patent  Display window contextual visualization for application performance monitoring

A method and system for displaying application performance data. In an embodiment, performance data is collected from an application during display by the application of a first display window. Performance data is also collected from the application during display by the application of a second display window. On a display... Ca Inc

 new patent  Mobile terminals providing secure user interfaces

A mobile terminal performs operations that include receiving an authentic account identifier through a user interface from a user. Responsive to a request to enroll an account in a mobile wallet application executed by the processor of the mobile terminal, an enrollment request message is communicated via a network interface... Ca Inc

 new patent  Test proxy between client applications and web services

A client request originating from a client device and destined for a server via a network is intercepted. The server is configured to perform a service in response to the client request. A determination is made of whether the request action and the request resource of the client request matches... Ca Inc

System and controlling state tokens

The system and method for controlling state tokens described herein may secure sensitive application state tokens, link one application state token to other state tokens that represent certain identities or communication sessions, and maintain application state tokens to integrate various different systems or applications. In particular, the system and method... Ca Inc

Identifying computer devices based on machine effective speed calibration

A historical repository of device identifiers associated with sets of prior mean values and prior standard deviation values, is maintained. A device identification message is received from a suspect computer device and contains a device identifier and a measured device signature value. A mean value and a standard deviation value... Ca Inc

Electronic transaction risk assessment based on digital identifier trust evaluation

For a comprehensive view of the parties involved in a transaction, a transaction risk assessment system can collect and persist digital credentials of entities' involved in a requested electronic transaction. With the entity credentials, the transaction risk assessment system performs an on-demand risk analysis of the requested electronic transaction based,... Ca Inc

Serving channelized interactive data collection requests from cache

Expressions to calculate values from data collection can often involve additional data collection queries causing duplicate requests for SNMP data collection. The duplicate requests can lead to increased latency or even data loss as SNMP data collection requests are throttled in a network. To eliminate duplicate requests, data collection channels... Ca Inc

Variable snmp data collection with embedded queries

Although MIB extensions allow for access to a rich dataset about a variety of SNMP-enabled devices, utilizing the rich dataset for various management tasks can involve collection of a vast amount of data from an SNMP-enabled device. For instance, a network management system may collect several tables of utilization data... Ca Inc

Executing privileged code in a process

A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a... Ca Inc

Model based root cause analysis

A root cause analysis system utilizes ACs corresponding to component types in a network to construct a diagnosis model. The system generates the ACs based on component models for each component type in the network and may perform offline evaluation of the ACs using determined conditional probabilities and potential state... Ca Inc

Minimized installation of point of presence software agents by use of pre-installed browser

A multi-device data processing machine system includes a plurality of network-connected cliental servers and an SaaS server that is configured to download by way of the network to the cliental servers of web pages having browser-executable code, the browser-executable code being configured to automatically repeatedly monitor performance attributes of respective... Ca Inc

Restricting access to content based on a posterior probability that a terminal signature was received from a previously unseen computer terminal

A method by a content server includes maintaining a historical repository of terminal signature tuples received from computer terminals. Each of the terminal signature tuples contains a terminal identifier for a computer terminal and a terminal signature characterizing a measured operation by the computer terminal. An access request message is... Ca Inc

Geographically based access management for internet of things device data

The proliferation of TOT devices has led to an increase in sensitive, cloud-stored data. To provide further protection, TOT device data may be secured by geographically based access controls as a supplement to or in place of traditional password protection. A geographically based access control restricts data accessibility to designated... Ca Inc

System and automatic root cause detection

A system, method, and computer-readable storage medium are provided to automatically detect a root cause for an error that occurred during execution of functionality in a system. When a request is executed, a log associated with the execution of the request may be stored at the storage. The log may... Ca Inc

Password setup management

A technique is disclosed to manage password setup such as may be integrated within a login authentication setup process. In response to an initiated password setup process associated with an active client account, a password manager determines whether at least two functional keyboard layouts are associated with the active client... Ca Inc

Ordered correction of application based on dependency topology

For each event detected during execution of a monitored application comprising a plurality of application components, a determination is made of which of the plurality of application components corresponds to the detected event. Also, a dependency subgroup that includes the application component that corresponds to the detected event is identified,... Ca Inc

Composite virtual services

Composite virtual service models can be defined to model various business transactions. A request of a particular component in a first transaction is identified and a composite virtual service model can be identified that corresponds to the particular component. The composite virtual service model models a plurality of transactions comprising... Ca Inc

Two-way authentication in single password with agent

Systems and methods for enabling user authentication using a first computing device (e.g., a tablet computer) for providing user credentials including an obfuscated password to an application server for authenticating the user credentials and a second computing device different from the first computing device (e.g., a mobile phone) for generating... Ca Inc

Computer security based on mouse device speed setting authentication

A method of performing operations by a processor of a computer terminal, includes determining an operation system (OS) speed scaling gain used by the OS to transform mouse movement data, which is received from a mouse device via a device interface circuit, into mouse speed data that controls positioning of... Ca Inc

Monitoring containerized applications

Methods and systems for monitoring containerized applications are disclosed herein. In one aspect, a containerized application that includes application program instructions and application runtime environment components is installed within an application server. An application manager determines an operational configuration of the containerized application within the application server. The application manager... Ca Inc

Using traffic data to determine network topology

A network topology may be determined based on flow data exported from a network. A topology generator analyzes flow data and determines a topology based on devices and connections between the devices indicated in the flow data. The topology generator may also infer types of the devices based on communication... Ca Inc

Computer security based on hierarchical cache latency signature authentication

A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by the processor from a main memory. The processor is integrated within a computer terminal. The processor performs operations that include generating a hierarchical cache... Ca Inc

Transferring data using a data bridge structure

A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first... Ca Inc

Establishing convergence points and determining time to convergence of related objects in motion

A method includes determining a convergence point for a first object and a second object from position data, capability data, and environment data that are all associated with the first and second object, wherein the convergence point is determined in accordance with a policy. The method also includes determining a... Ca Inc

Policy-based convergence point recommendations for convoys

A method includes applying a correlation rule defining a correlation relationship between a first and second object and determining, using a processor, whether a first motion vector of the first object is correlated at a threshold level of correlation with a second motion vector of the second object, the correlation... Ca Inc

Creating, updating, sharing, managing, and monitoring a plurality of independent interactive system productivity facility (ispf) windows

A user terminal executes a control application that generates and outputs a plurality of windows to a user terminal within a single emulator session and under a single user login. Each window corresponds to a particular application executing at the mainframe, and is sizable and immovable relative to the other... Ca Inc

Visual modification and training of an anomaly detection image

A method includes formatting for display, on a visual screen, an image comprising: (1) a coordinate system, (2) a plurality of distinguishable areas within the coordinate system, each distinguishable area graphically representing a respective formula, and (3) a plurality of data points. The method also includes receiving user input comprising... Ca Inc

Multi-perspective application components dependencies

A dependency graph is created that indicates dependencies among a plurality of components of an application based, at least in part, on interactions among the plurality of components determined from at least one execution of the application. In response to selection of a first attribute of a plurality of attributes,... Ca Inc

Interface definition language compiler with version reconciliation

An interface definition language compiler can be designed to generate different versions of stubs or library files from a same IDL source code. A developer can maintain a single IDL file with code for various versions by using version directives. As part of front end compiling, the IDL compiler will... Ca Inc

Identifying and correlating semantic bias for code evaluation

System and techniques are disclosed for associating annotation semantic bias with program code. A pre-processor partitions an annotation from program statements contained within one or more source files. A lexical parser generates program statement tokens corresponding to the program statements, wherein each of the program statement tokens associates program statement... Ca Inc

Java-based offload service in a mainframe environment

A JVM can be used as a conduit for transferring work items and results for work items between different processes/processors for a mainframe environment. The JVM provides infrastructure that allows a Java program running within the JVM to invoke native methods (e.g., assembly code methods) with a Java Native Interface... Ca Inc

Graph-enhanced event management

A first event notification is received. The first event notification is associated with a first event. Criteria is determined based, at least in part, on the first event notification. A first component is identified based, at least in part, on the criteria a component graph. An operational status associated with... Ca Inc

Unified interface for development and testing of deployment resource architecture

Embodiments of the disclosure pertain to providing, via a graphical user interface, a set of user-selectable resources available for defining a resource architecture for an application in development; receiving, via the graphical user interface, a selection of a first resource for the application; receiving, via the graphical user interface, a... Ca Inc

Virtual service localization

A virtual service is instantiated from a service model that is operable to receive requests intended for a particular software component in a system and generate simulated responses of the particular software component based on a service model modeling responses of the particular software component. A particular request intended for... Ca Inc

Virtual service data set generation

A virtual service is instantiated from a service model that is operable to receive requests intended for a particular one of a plurality of software components in a system and generate simulated responses of the particular software component based on a service model modeling responses of the particular software component.... Ca Inc

10/05/17 / #20170286274

Transaction stitching definitions

Transaction data is accessed that describes a plurality of transactions and includes a plurality of frames, with each frame describing a respective portion of a corresponding one of the plurality of transactions. A user-defined stitching definition is accessed that is related to a particular one of the plurality of transactions.... Ca Inc

10/05/17 / #20170286277

Automated model generation for a software system

Transaction data is accessed that has been generated from monitoring of a plurality of transactions in a system that includes a plurality of software components. The transaction data is assessed to identify that a particular one of the plurality of transactions meets a particular one of a set of conditions... Ca Inc

10/05/17 / #20170286281

Transactional boundaries for virtualization within a software system

Transaction data is received identifying characteristics of a particular transaction involving the first software component and a second software component as observed by an agent during operation of the system. The particular transaction is contemporaneous with another transaction involving software components in the system. It is determined, from the transaction... Ca Inc

10/05/17 / #20170286463

Mainframe index database to supplement a system catalog

A request for a particular file stored in memory of a mainframe computing system is received and the particular file is determined not to be registered in a catalog of the mainframe computing system. An index database separate from the catalog is searched for a record associated with the particular... Ca Inc

10/05/17 / #20170286715

Prevention of shoulder surfing

In accordance with the teachings of the present disclosure, a method is provided for reducing the chances of shoulder surfing. The method may include determining an approximate angle of orientation of a mobile device and selecting one of first or second input key layouts, based upon the approximate angle of... Ca Inc

10/05/17 / #20170287178

Visual generation of an anomaly detection image

A method includes formatting for display, on a visual screen, an image comprising a coordinate system and a plurality of data points within the coordinate system, wherein the plurality of data points define historical performance data for a computer system. The method further includes receiving a user input defining a... Ca Inc

10/05/17 / #20170288967

Environment manager for continuous deployment

Aspects of the embodiments are directed to designing a deployment environment for a continuous delivery tenant. Embodiments include receiving, via a natural language input, a set of parameters for building a deployment environment for an application; determining, by a natural language processing engine, a resource to satisfy a parameter of... Ca Inc

10/05/17 / #20170289008

Scenario coverage in test generation

Transaction data is generated during monitoring of a plurality of transactions in a system and a respective flow is determined, from the transaction data, for each of the plurality of transactions. Each of the determined flows involves participation of a respective subset of software components of the system. A plurality... Ca Inc

10/05/17 / #20170289269

Delegating a reverse proxy session to its instantiating portlet session

A method for allowing a web application server to encapsulate the features and functionality of an external application while gating access to it through authenticated portlet sessions includes receiving, at a web-based application server, a content request from an external application, and in response to receiving the content request, instantiating... Ca Inc

10/05/17 / #20170289806

Geographically based access management for internet of things device data

The proliferation of IOT devices has led to an increase in sensitive, cloud-stored data. To provide further protection, IOT device data may be secured by geographically based access controls as a supplement to or in place of traditional password protection. A geographically based access control restricts data accessibility to designated... Ca Inc

09/28/17 / #20170277534

Effective defect management across multiple code branches

A computer-implemented method is disclosed which detects that new source code linked to a defect identifier has been checked in to a source code repository for a given code branch of a software application. The new source code is automatically checked in to additional code branches of the software application... Ca Inc

09/28/17 / #20170277582

Identification of distinguishable anomalies extracted from real time data streams

A big data processing system includes a workload trimming function that separates out from among a set of identified anomalies, those that are clearly outliers, rather than ones residing within clusters of anomalies as mapped within an anomalies distribution space. The outlier anomalies are not subjected to a computationally-intensive anomalies... Ca Inc

09/28/17 / #20170277599

Data boundary identification for identifying variable size data chunks

A system and method obtain a set of data and identify successive subsets of data within the set of data. A boundary identifying hash is calculated on a subset of data and compared with a boundary indicating value. If the calculated boundary identifying hash matches the boundary indicating value, a... Ca Inc

09/28/17 / #20170277727

Identification of distinguishing compound features extracted from real time data streams

A big data processing system includes a features permutations testing function that separates out from among a set of identified compound features, those compound feature permutations that have better capabilities for distinguishing between anomalies observed in respective multi-dimensional feature spaces having as their axes the features of the identified compound... Ca Inc

09/28/17 / #20170277908

Providing data privacy in computer networks using personally identifiable information by inference control

Data privacy is provided in a computer network using a security inference control processor of a network device in the computer network which receives a query from a user device through a network interface circuit. In response to the query, a query result data set is generated based on information... Ca Inc

09/28/17 / #20170279607

Queueing construct for x.509 digital certificates

A method includes, for respective queues of a plurality of queues stored in a storage: generating, using a processor, a private key—public key pair; and storing the private key—public key pair to a back of the queue. The private key—public key pair may include a private key and a public... Ca Inc

09/28/17 / #20170279618

Short term or one-time-use x.509 digital certificates

A method includes receiving a request from a certificate user to utilize a short-term private key-public key pair. The short-term private key-public key pair includes a short-term private key and a public key. The short-term private key may expire after a period less than a year in length. The method... Ca Inc

09/28/17 / #20170279660

Context graph augmentation

As a network increases in size and complexity, it becomes increasingly difficult to monitor and record relationships between components in the network. The lack of knowledge regarding component relationships can make it difficult to adequately and timely perform analysis of network issues or conditions. As a result, automated generation of... Ca Inc

09/28/17 / #20170279668

Fault detection of service chains in a sdn/nfv network environment

An electronic device includes a processor and a memory coupled to the processor and storing computer readable program code that when executed by the processor causes the processor to perform operations including generating, at given time intervals, a plurality of topology graphs that correspond to a service chain that comprises... Ca Inc

09/28/17 / #20170279687

Context graph generation

As a network increases in size and complexity, it becomes increasingly difficult to monitor and record relationships between components in the network. The lack of knowledge regarding component relationships can make it difficult to adequately and timely perform analysis of network issues or conditions. As a result, automated generation of... Ca Inc

09/28/17 / #20170279692

Deploying a service from a selected cloud service provider based on an evaluation of migration ability using graph analytics

A method includes performing by a processor of a server: receiving a requirement description of a service for a software application, generating a migration graph that comprises vertices representing candidate service providers for the service, respectively, identifying migration capability information between the vertices of the migration graph by connecting a... Ca Inc

09/28/17 / #20170279784

Synchronized issuance of public x.509 digital certificates

A method includes receiving, from a certificate requestor: a request for a public key certificate and a list of a plurality of distribution addresses. The request may include a public key for the certificate requestor. The plurality of distribution addresses may belong to a plurality of third parties. The method... Ca Inc

09/28/17 / #20170279785

Synchronized issuance of public x.509 digital certificates

A method includes generating, using a processor, a private key-public key pair. The private key-public key pair may include a private key and a public key. The method also includes generating a request for a public key certificate. The request may include the public key. The method further includes sending... Ca Inc

09/28/17 / #20170279923

Provisioning of network services based on virtual network function performance characteristics

A method includes performing, by a processor: receiving a selection of a network service, determining a plurality of Virtual Network Functions (VNFs) and a plurality of Virtual Machines (VMs) based on the selection of the network service, the plurality of VNFs being configured to run on the plurality of VMs,... Ca Inc

09/21/17 / #20170269976

Efficient application feedback collection

To reduce the risk of exposing personally identifiable information (PII) and reduce resource consumption while still collecting helpful screen-based experience data, an application feedback system can build an application screen library from initial screen captures. When sufficient screens of an application have been captured for the library, the application feedback... Ca Inc

09/21/17 / #20170270026

Generating a directed graph representing application program execution flow from an execution trace

An execution trace of an application program comprises a sequence of ordered programming instructions generated during execution of the application program indicating an execution flow of the application program. The sequence of ordered programming instructions is partitioned into a plurality of linked code segments comprising first and second code segments.... Ca Inc

09/21/17 / #20170270419

Escalation prediction based on timed state machines

In a computer server, a ticket element generated by an issue tracking system responsive to a client request is received, where the ticket element includes a data field including data indicative of an attribute. A database including state data stored therein is accessed responsive to receipt of the ticket element.... Ca Inc

09/21/17 / #20170270430

Document analysis system that uses machine learning to predict subject matter evolution of document content

A method includes performing, by a processor: receiving a document containing subject matter related to a course of action, the document comprising a plurality of sub-documents that are related to one another in a time sequence, converting the document to a vector format to generate a vectorized document that encodes... Ca Inc

09/21/17 / #20170270438

Method and repairing policies

A control computer implements a multi-stage process to automatically repair errors in a policy using selectable, pluggable repair modules. In the first stage, the control computer identifies the errors that caused the policies to fail the validation process, and associates the errors with corresponding repair modules. The repair modules comprise... Ca Inc

09/21/17 / #20170272306

Proactive fault detection and diagnostics for networked node transaction events

Techniques for managing networked node transactions are disclosed. In an embodiment, a fingerprint generator determines multiple classifier digital fingerprints that each comprise a bit sequence associated with a respective result classifier. The fingerprint generator receives transaction event entries that contain message text associated with a transaction between two or more... Ca Inc

Patent Packs
09/21/17 / #20170272343

Systems and methods for monitoring servers for overloading conditions

A method is disclosed that includes monitoring, at a network traffic analyzer, service requests transmitted to a network server, and service responses to the service requests transmitted by the network server, measuring an average latency associated with the service requests, a throughput rate associated with service responses, and a concurrency... Ca Inc

09/21/17 / #20170272419

Identity authentication migration between different authentication systems

An intermediary can securely migrate a security credential between systems despite different underlying encoding technologies used for authentication by the system. This intermediary can also securely migrate an identity between different authentication technologies. A secure login interface program code that is digitally signed by the intermediary is provided in advance... Ca Inc

09/21/17 / #20170272533

Generation of application control blocks for an ims database using a cache memory

A method includes performing, by a processor of a database server: intercepting an operating system supervisor call involving a request for information associated with an information Management System (IMS) database from a secondary storage device, the IMS database being embodied in the secondary storage device; determining whether the information that... Ca Inc

09/14/17 / #20170262391

Discriminating dynamic connection of disconnectable peripherals

An enterprise wide data processing system includes at least one watchdog unit and/or software service that is configured to automatically detect an attempt to connect a dynamically connectable and disconnectable peripheral (DCP) such as a USB stick to a watchdog-watched Dynamic Connection-Making Mechanism (DCMM) of the system. The watchdog unit... Ca Inc

09/14/17 / #20170262508

Infrastructure management system having scalable storage architecture

Techniques for processing infrastructure management data within a service domain are disclosed. The service domain includes service nodes that monitor respective target entities and that generate measurement data for target entities within the service domain. A database engine reads a serial measurement data stream that is generated by at least... Ca Inc

09/14/17 / #20170262622

Providing multi-factor security for electronic devices through body area network and radiofrequency network communications

A method performed by a processor of a first electronic device includes transmitting first authentication information through a Body Area Network (BAN) interface circuit that communicates with a second electronic device using electrical signals conducted through electrodes contacting a body of a user extending between the first and second electronic... Ca Inc

09/14/17 / #20170264710

Coordinated thing-sourcing in an internet of things

Requirements for a thing-sourcing project that comprises a thing-sourcing task are posted to thing-sourcing participant devices. Electronic requests are received from a first group of the thing-sourcing participant devices, to participate in the task. The electronic request identifies a portion of the task that can be accomplished by the thing-sourcing... Ca Inc

09/14/17 / #20170265053

Method and discovering network devices

A monitoring computer automatically identifies and communicates with one or more network-based devices to determine metric information collected and stored by those devices. The monitoring computer performs these functions even in cases where it does not know how to retrieve the information it needs to monitor a given network device,... Ca Inc

09/07/17 / #20170255972

Enhancement to customer feedback systems

A method and non-transitory computer-readable storage medium for executing a method for providing customized feedback forms. The method includes displaying, at a graphical user interface (GUI) of an application, a plurality of icons. Each icon of the plurality of icons includes a unique context ID. The method also includes receiving... Ca Inc

08/31/17 / #20170249287

Hierarchical identifiers for html elements

Elements within HTML based applications may be logically related; however, HTML does not have built-in support for indicating these relationships, such as parent-child relationships. Instead, relationships among HTML elements are not utilized or are incorrectly inferred based on nesting of HTML elements within an HTML document. As a result, when... Ca Inc

08/31/17 / #20170249633

One-time use password systems and methods

According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method may also include authenticating the user by the authentication server in response to a request from the user... Ca Inc

08/24/17 / #20170242876

Maintaining database referential integrity using different primary and foreign key values

A computing device managing a database receives a database command comprising first and second identifiers identifying first and second datasets, respectively, in the database. The database command further comprises a key translation indicator identifying a key value translation function. Responsive to receiving the database command, the computing device generates a... Ca Inc

08/24/17 / #20170244595

Dynamic data collection profile configuration

Data generated by a first application analytics module in accordance with a first data collection profile is received. A triggering criterion is detected based, at least in part, on the data. In response to detection of the triggering criterion, a second data collection profile is generated. Availability of the second... Ca Inc

08/17/17 / #20170235387

Touch-input display devices with force measurement using piezoelectric pillars

A touch-input display device includes a substrate, piezoelectric pillars that are on and extend away from a surface of the substrate, and light emitter devices each coupled to a different one of the piezoelectric pillars. The substrate has power lines and signal lines. The piezoelectric pillars are electrically isolated from... Ca Inc

08/17/17 / #20170235662

Software application quality assessment

First data is accessed describing a plurality of different functional aspects of a particular software application. The first data is received from multiple different sources. Second data is accessed describing a plurality of different non-functional aspects of the particular software application, the second data received from multiple different sources. A... Ca Inc

Patent Packs
08/17/17 / #20170238161

Automatic data exchange between peer devices

A peer device has a proximity sensor that detects proximity to another object. Responsive to that detection, the peer device obtains a set of results that comprises results of different types of measurements. The set of results is sensitive to a location of the peer device and a time at... Ca Inc

08/10/17 / #20170228439

Automatic natural language processing based data extraction

A data-driven big data mining and reporting system automatically identifies which data attributes to report from a first data set using natural language processing. The identified data attributes to report from the first data set is used to automatically extract additional data attributes to report from additional data sets so... Ca Inc

08/10/17 / #20170230313

Anonymous messaging in an instant message group conversation

A message is created, by a first device associated with a first attendee, for an instant message group conversation among a plurality of attendees that includes the first attendee. At least one non-anonymous attendee and at least one anonymous attendee of the plurality of attendees are identified. The message is... Ca Inc

08/10/17 / #20170230402

Automated data risk assessment

A method is described for receiving a plurality of node data streams through a data network from a plurality of source nodes, respectively, each of the plurality of node data streams comprising a plurality of node data. The method further comprises determining a respective risk assessment for each of the... Ca Inc

08/03/17 / #20170220382

Weight adjusted dynamic task propagation

A method of assigning data processing tasks to workload agents includes receiving workload parameters that relate to available capacities of a plurality of workload agents, identifying a primary workload agent based on at least one of the workload parameters; identifying a plurality of candidate secondary workload agents; identifying a secondary... Ca Inc

08/03/17 / #20170220383

Workload control in a workload scheduling system

A method includes receiving, at a workload agent, a plurality of jobs for processing by the workload agent; determining a maximum amount of time that the workload agent should take to process the jobs; and processing the jobs within the determined maximum amount of time. The maximum amount of time... Ca Inc

08/03/17 / #20170220451

Debugging in-cloud distributed code in live load environment

A multi-device data processing machine system includes a plurality of network-connected cliental servers including first and second production servers coupled to a dynamic load balancer. The machine system also includes an SaaS development server that is configured to pass under-development process requests to the load balancer in combination with a... Ca Inc

08/03/17 / #20170220606

Unified data model for integration between relational and non-relational databases

Schema-less databases can make data modeling and data management difficult and can detrimentally affect integration with an RDBMS. Inferring a schema from a schema-less database can improve integration by indicating a structure or organization of data in the schema-less database. A schema analyzer can infer a schema by processing data... Ca Inc

08/03/17 / #20170223048

Delegated authentication in an internet of things (iot) network

A method includes performing, by a processor of a network controller of a network: storing device identifications corresponding to respective ones of a plurality of devices connected via the network, respectively, storing an association between a first one and a second one of the plurality of devices, the association being... Ca Inc

07/27/17 / #20170213048

Protection of confidential data being displayed or input in a mobile device

A display is presented on a screen of a mobile device having an electromagnetic radiation source. The electromagnetic radiation source is activated while confidential data is being input in an input field of the display. The electromagnetic radiation source is deactivated after completion of the confidential data in the input... Ca Inc

07/27/17 / #20170214689

Network device authentication based on hashing content of sequential messages

A method, performed by an authentication processor of a first network device, includes receiving a first message through a network interface circuit from a second network device. The first message contains a first data unit to be operated upon by the first network device. A second message is received through... Ca Inc

07/20/17 / #20170206075

Dynamic release baselines in a continuous delivery environment

Embodiments of the present disclosure are directed to a common interface for associating an ordered set of instructions and/or resources from a release automation application with a configuration manager node associated with a server type. Embodiments are directed to identifying an application, identifying a deployment environment for deploying the application,... Ca Inc

07/20/17 / #20170206076

Dynamic release baselines in a continuous delivery environment

Embodiments of the present disclosure are directed to a common interface for associating an ordered set of instructions and/or resources from a release automation application with a configuration manager node associated with a server type. Embodiments are directed to a single-click bootstrapping of an unassociated node to a configuration management... Ca Inc

07/13/17 / #20170199727

Transaction flow visualization

Transaction data is accessed and a flow of a particular one of the plurality of transactions is determined from the transaction data, the flow describing involvement of a particular set of the software components in the particular transaction and a plurality of transaction fragments of the particular transaction. A duration... Ca Inc

07/13/17 / #20170199736

Transactional boundaries for software system profiling

Transaction data is received from a software-based agent instrumented on a particular software component in a system comprising a plurality of software components. The transaction data can describe characteristics of a particular transaction involving the particular software component and another software component in the plurality of software components as observed... Ca Inc

07/13/17 / #20170199806

Transactional boundaries for software system debugging

Transaction data is received from an agent instrumented on a first one of a plurality of software components in a system, the transaction data identifying characteristics observed by the agent during monitoring of the first software component during a transaction involving the first software component and a second one of... Ca Inc

07/13/17 / #20170199809

Graphical transaction model

Various techniques for interacting with a test case via a graphical model are disclosed. For example, one method involves displaying a first icon, which represents a first testing activity within a test case; displaying a second icon, which represents a second testing activity within the test case; and displaying a... Ca Inc

07/13/17 / #20170200097

Transaction flow visualization

First transaction data is accessed that was generated during monitoring of a first plurality of transactions performed by a software system during a first time period. A first set of transaction flows is determined from the first transaction data that describe involvement of a first set of software components of... Ca Inc

07/13/17 / #20170200098

Transaction flow visualization

Transaction data is accessed that was generated during monitoring of a plurality of transactions involving a plurality of software components in a system. A flow of a first one of the transactions is determined from the transaction data, the flow describing involvement of a first subset of the plurality of... Ca Inc

07/13/17 / #20170200160

Restricting account use by controlled replenishment

A restriction request message, including a restriction parameter for a secondary account, is received from a device that is associated with a primary account, via a network node that is outside of a secure authorization network. A replenishment request message, including a password and an account replenishment parameter for the... Ca Inc

07/13/17 / #20170201428

Interactive graphical user interface (gui) for managing sites

A control computer allows users to determine various resource-related aspects of complex network systems separated over a wide geographical area. The control computer generates interactive graphical indicators for each of one or more sites, and displays those indicators on geographical maps to identify the locations of those sites. The graphical... Ca Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Ca Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Ca Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###