Patents by Inventor Ling Thio

Ling Thio has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9009680
    Abstract: Instrumentation points are selected for an application by running the application with comprehensive instrumentation of its components in a development mode. The application can be run by a human operator and/or load simulator which provides requests to the application. The instrumented components are monitored as the application runs. A subset of the components is selected based on criteria such as an order in which the instrumented components are invoked, whether resource utilization, such as consumption of processor cycles, exceeds a threshold, or a frequency with which components are called or call other components, and only that subset is instrumented in a production mode of the application. In one approach, the subset includes components which are invoked when traffic to/from the application matches a pattern provided by an interaction model. As a result, relevant instrumentation points can be identified.
    Type: Grant
    Filed: December 18, 2006
    Date of Patent: April 14, 2015
    Assignee: CA, Inc.
    Inventors: Jeffrey R. Cobb, Daryl L. Puryear, Ling Thio
  • Patent number: 8667147
    Abstract: Multiple transaction components that comprise a transaction are correlated using a GUID generated at a browser application. The transaction components may occur asynchronously or synchronously between a network browser and one or more applications. An identifier is generated for a set of network browser requests corresponding to a single user input or some other event and the identifier is included in each request. Server traffic and the servers processing the request are monitored and data which includes the identifier is generated. Data for the transaction with multiple transaction components is reported using the GUID associated with the transaction.
    Type: Grant
    Filed: March 16, 2011
    Date of Patent: March 4, 2014
    Assignee: CA, Inc.
    Inventors: Ramesh Mani, Brian Zuzga, Ling Thio
  • Patent number: 8656006
    Abstract: Information is obtained from an application monitoring system which monitors the execution of an application and a traffic monitoring system which monitors traffic between clients and the application. The clients interact with the application to perform transactions or other tasks. Traffic monitoring data, such as information regarding defects and incidents, and application runtime data, such as traces of invoked application components, can be integrated in an output such as an interface to provide an enhanced understanding of system performance. Related traffic monitoring data and application runtime data can be linked by a request-response pair identifier associated with a request provided to the application and a response provided by the application.
    Type: Grant
    Filed: December 4, 2006
    Date of Patent: February 18, 2014
    Assignee: CA, Inc.
    Inventors: Jeffrey R. Cobb, Patrick C. O'Sullivan, Ling Thio
  • Patent number: 8650292
    Abstract: Synthetic transactions for a network system are generated based on monitoring of the network system to determine whether the network system may be blind to traffic. A process determines whether an application within an application server in a network system is processing traffic received by the application server, and whether a web server within the network system and in communication with the application server is receiving traffic that requires processing by the application. The process determines that the network system may be blind to the traffic, and, in response, generates a synthetic transaction instruction and a corresponding synthetic transaction to test whether the network system is blind to the traffic. Based on a response of the network system to the synthetic transaction, the process determines whether there is a malfunction of the application server or a period of low traffic activity of the application server.
    Type: Grant
    Filed: September 23, 2011
    Date of Patent: February 11, 2014
    Assignee: CA, Inc.
    Inventors: Jon Ruiz, Ling Thio, Brian Zuzga
  • Patent number: 8578017
    Abstract: Data collected during runtime and associated with a service level agreement and operating level agreement for a network service are automatically correlated together. A network monitoring system monitors the network service during runtime to determine SLA and OLA violations. An SLA is tested against traffic monitoring data derived from monitoring traffic between a network service system and one or more users of the system. An OLA is tested against application runtime data generated from monitoring a transaction occurring between an application server and a backend or other internal entity of the network service system. The data collected during runtime can be correlated using a hierarchy based on business transactions or in some other manner.
    Type: Grant
    Filed: December 13, 2006
    Date of Patent: November 5, 2013
    Assignee: CA, Inc.
    Inventors: Jeffrey R. Cobb, Ling Thio, Brian Zuzga
  • Patent number: 8402131
    Abstract: Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components).
    Type: Grant
    Filed: August 24, 2010
    Date of Patent: March 19, 2013
    Assignee: CA, Inc.
    Inventors: Jyoti K. Bansal, Ling Thio, Jeffrey R. Cobb
  • Publication number: 20120016983
    Abstract: Synthetic transactions for a network system are generated based on monitoring of the network system to determine whether the network system may be blind to traffic. A process determines whether an application within an application server in a network system is processing traffic received by the application server, and whether a web server within the network system and in communication with the application server is receiving traffic that requires processing by the application. The process determines that the network system may be blind to the traffic, and, in response, generates a synthetic transaction instruction and a corresponding synthetic transaction to test whether the network system is blind to the traffic. Based on a response of the network system to the synthetic transaction, the process determines whether there is a malfunction of the application server or a period of low traffic activity of the application server.
    Type: Application
    Filed: September 23, 2011
    Publication date: January 19, 2012
    Applicant: Computer Associated Think, Inc.
    Inventors: Jon Ruiz, Ling Thio, Brian Zuzga
  • Patent number: 8051163
    Abstract: Synthetic transactions for a network system are generated based on monitoring of the network system. One or more network system monitoring systems receive network system traffic, traffic monitoring data and/or application runtime data during a monitoring process. The traffic monitoring data may be derived from network system traffic and the application runtime data may be data associated with application transactions. The traffic, traffic monitoring data and application runtime data may contain information regarding the scope and frequency of the functionality tested by the actual traffic received by the network system. Synthetic transactions may be generated and transmitted to test the network system based on the scope and frequency of the functionality tested by actual traffic.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: November 1, 2011
    Assignee: Computer Associates Think, Inc.
    Inventors: Jon Ruiz, Ling Thio, Brian Zuzga
  • Publication number: 20110167156
    Abstract: Multiple transaction components that comprise a transaction are correlated using a GUID generated at a browser application. The transaction components may occur asynchronously or synchronously between a network browser and one or more applications. An identifier is generated for a set of network browser requests corresponding to a single user input or some other event and the identifier is included in each request. Server traffic and the servers processing the request are monitored and data which includes the identifier is generated. Data for the transaction with multiple transaction components is reported using the GUID associated with the transaction.
    Type: Application
    Filed: March 16, 2011
    Publication date: July 7, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Ramesh Mani, Brian Zuzga, Ling Thio
  • Patent number: 7953850
    Abstract: Multiple transaction components that comprise a transaction are correlated using a GUID generated at a browser application. The transaction components may occur asynchronously or synchronously between a network browser and one or more applications. An identifier is generated for a set of network browser requests corresponding to a single user input or some other event and the identifier is included in each request. Server traffic and the servers processing the request are monitored and data which includes the identifier is generated. Data for the transaction with multiple transaction components is reported using the GUID associated with the transaction.
    Type: Grant
    Filed: October 3, 2008
    Date of Patent: May 31, 2011
    Assignee: Computer Associates Think, Inc.
    Inventors: Ramesh Mani, Brian Zuzga, Ling Thio
  • Publication number: 20110022707
    Abstract: Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components).
    Type: Application
    Filed: August 24, 2010
    Publication date: January 27, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Jyoti K. Bansal, Ling Thio, Jeffrey R. Cobb
  • Patent number: 7805510
    Abstract: Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components).
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: September 28, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Jyoti K. Bansal, Ling Thio, Jeffrey R. Cobb
  • Publication number: 20100088404
    Abstract: Multiple transaction components that comprise a transaction are correlated using a GUID generated at a browser application. The transaction components may occur asynchronously or synchronously between a network browser and one or more applications. An identifier is generated for a set of network browser requests corresponding to a single user input or some other event and the identifier is included in each request. Server traffic and the servers processing the request are monitored and data which includes the identifier is generated. Data for the transaction with multiple transaction components is reported using the GUID associated with the transaction.
    Type: Application
    Filed: October 3, 2008
    Publication date: April 8, 2010
    Inventors: Ramesh Mani, Brian Zuzga, Ling Thio
  • Publication number: 20080148242
    Abstract: An interaction model for an application includes patterns which represent interactions between a client and an application. To determine whether the patterns accurately represent activity of the application, and to determine whether additional patterns are appropriate, the application is exercised. Requests to the application are analyzed to determine whether they correspond to the known patterns. If a request does not correspond to a known pattern, instrumented components which are invoked by the request are monitored to determine whether they meet one or more criterion, such as a resource utilization criterion. A report provides data regarding the instrumented components. New pattern candidates for the interaction model can be identified from non-matching requests which are deemed to be significant based on the associated components which are invoked.
    Type: Application
    Filed: December 18, 2006
    Publication date: June 19, 2008
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Jeffrey R. Cobb, Ling Thio
  • Publication number: 20080148039
    Abstract: Instrumentation points are selected for an application by running the application with comprehensive instrumentation of its components in a development mode. The application can be run by a human operator and/or load simulator which provides requests to the application. The instrumented components are monitored as the application runs. A subset of the components is selected based on criteria such as an order in which the instrumented components are invoked, whether resource utilization, such as consumption of processor cycles, exceeds a threshold, or a frequency with which components are called or call other components, and only that subset is instrumented in a production mode of the application. In one approach, the subset includes components which are invoked when traffic to/from the application matches a pattern provided by an interaction model. As a result, relevant instrumentation points can be identified.
    Type: Application
    Filed: December 18, 2006
    Publication date: June 19, 2008
    Applicant: Computer Associates Think, Inc.
    Inventors: Jeffrey R. Cobb, Daryl L. Puryear, Ling Thio
  • Publication number: 20070263541
    Abstract: Data collected during runtime and associated with a service level agreement and operating level agreement for a network service are automatically correlated together. A network monitoring system monitors the network service during runtime to determine SLA and OLA violations. An SLA is tested against traffic monitoring data derived from monitoring traffic between a network service system and one or more users of the system. An OLA is tested against application runtime data generated from monitoring a transaction occurring between an application server and a backend or other internal entity of the network service system. The data collected during runtime can be correlated using a hierarchy based on business transactions or in some other manner.
    Type: Application
    Filed: December 13, 2006
    Publication date: November 15, 2007
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Jeffrey R. Cobb, Ling Thio, Brian Zuzga
  • Publication number: 20070266045
    Abstract: Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components).
    Type: Application
    Filed: November 30, 2006
    Publication date: November 15, 2007
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Jyoti K. Bansal, Ling Thio, Jeffrey R. Cobb
  • Publication number: 20070266148
    Abstract: Synthetic transactions for a network system are generated based on monitoring of the network system. One or more network system monitoring systems receive network system traffic, traffic monitoring data and/or application runtime data during a monitoring process. The traffic monitoring data may be derived from network system traffic and the application runtime data may be data associated with application transactions. The traffic, traffic monitoring data and application runtime data may contain information regarding the scope and frequency of the functionality tested by the actual traffic received by the network system. Synthetic transactions may be generated and transmitted to test the network system based on the scope and frequency of the functionality tested by actual traffic.
    Type: Application
    Filed: November 30, 2006
    Publication date: November 15, 2007
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Jon Ruiz, Ling Thio, Brian Zuzga
  • Publication number: 20070266149
    Abstract: Information is obtained from an application monitoring system which monitors the execution of an application and a traffic monitoring system which monitors traffic between clients and the application. The clients interact with the application to perform transactions or other tasks. Traffic monitoring data, such as information regarding defects and incidents, and application runtime data, such as traces of invoked application components, can be integrated in an output such as an interface to provide an enhanced understanding of system performance. Related traffic monitoring data and application runtime data can be linked by a request-response pair identifier associated with a request provided to the application and a response provided by the application.
    Type: Application
    Filed: December 4, 2006
    Publication date: November 15, 2007
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Jeffrey R. Cobb, Patrick C. O'Sullivan, Ling Thio
  • Patent number: 7006448
    Abstract: A system and method is provided for measuring network round trip time by monitoring fast-response operations at one network endpoint, typically a client computer. A client computer of the system includes a network monitoring and analysis engine which monitors a sent packet for a fast-response operation. If a fast-response operation is detected, then the client computer assumes a server computer processed the packet substantially instantaneously. Thus, the processing time at the server computer is neglected as zero. The round trip time can then be approximated as the difference in time between when the client computer sent the packet and when the client computer received the response packet.
    Type: Grant
    Filed: September 29, 2000
    Date of Patent: February 28, 2006
    Assignee: Lucent Technologies Inc.
    Inventor: Ling Thio