Patent application number | Description | Published |
20100153529 | ENHANCING NETWORK DETAILS USING NETWORK MONITORING SCRIPTS - The present disclosure is directed to a system and method for enhancing network details using network monitoring scripts. In some implementations, a method includes receiving a request to execute a plurality of transactions with an application of a server to evaluate one or more services using an executed LoadRunner script. In response to the service request, the plurality of transactions are automatically executed with the application using the LoadRunner script populated with values of variables transmitted between the application and a client during at least one transaction previously executed with the client. Values of the variables transmitted between the application and the executed LoadRunner script are determined during execution of the plurality of transactions. | 06-17-2010 |
20100333072 | INTEGRATED PERFORMANCE AND LOAD TESTING TOOL FOR APPLICATION SERVERS - Implementations of the present disclosure provide for testing an application, and include loading a testing tool by a client that is in communication with an application server that executes the application, introducing probe code into a routine by a first component of the testing tool, the routine being called during execution of the application, and transmitting a request to the application using a second component of the testing tool. An elapsed time of an execution of the routine is determined based on the probe code, and a response is generated from the application server based on the request. A response time is determined based on the request and the response, and performance statistics are calculated based on the elapsed time and the response time. | 12-30-2010 |
20110029822 | TRACKING OF JAVA OBJECTS DURING REQUEST PROCESSING - In various example embodiments, a system and associated method to identify an instruction in program code associated with a memory leak in an architecture-neutral, language-based (e.g., Java®) enterprise application platform is disclosed. In an example embodiment of a method, the method comprises performing an allocation trace of program execution and a heap dump of memory used by the program, identifying potentially leaking data structures, identifying objects in the allocation trace associated with the potentially leaking data structures based on unique object identifiers, and identifying locations in the program code where the objects were created. | 02-03-2011 |
20120143720 | LOCATION BASED MOBILE SHOPPING - Disclosed are methods and systems for location based mobile shopping. The methods and systems involve receiving a wish list according to a user request on a computing device, the wish list including one or more items, price associated with the one or more items, a maximum shop distance preferred by the user, identifying one or more shops within the maximum distance preferred by the user based on a geographical location of the user computing device, retrieving item lists from one or more identified shops, matching the one or more items on the received item list with the one or more items in the wish list of the user and generating an alert to the user upon matching the items in the wish list of the user. | 06-07-2012 |
20120262292 | PORTABLE DEVICE INVENTORY TRACKING - Various embodiments of systems and methods for portable device inventory tracking are described herein. In various embodiments, a mother device scans a vicinity to register and track one or more satellite devices. During registration process, the mother device assigns an owner identifier value and an item identifier value to the satellite device and a user can save which satellite device to register. One or more rules can be configured to determine when a reachability request is to be sent to the one or more satellite devices. A method of an embodiment ensures that if a satellite device does not respond to the reachability request, an alert message can be generated on the mother device. The alert message can be prioritized and can consist of a log entry with detailed information about the alert or a time stamp and location of the last reachability request acknowledgement sent from the satellite device. | 10-18-2012 |
20120265842 | CREATING OPERATING SYSTEM INTERNET CONNECTIONS FOR MOBILE APPLICATIONS - Various embodiments of systems and methods for creating operating system internet connection for mobile applications are described. According to one aspect, the methods include requesting an Internet connection to be created in a service thread separate from the operating system thread of a mobile device. In a further aspect, the Internet connection is created in parallel to loading the mobile application data into the faster memory of the mobile device and starting the mobile application in a separate application thread. Hence, when the mobile application is started and the application data is initialized, the Internet connection is created and ready for use by the mobile application. | 10-18-2012 |
20130157684 | CROWD DETECTION AND GUIDANCE ON MOBILE DEVICES - Systems and methods to detect an overcrowded area and to provide guidance to people in and in the vicinity of the overcrowded area are provided. A census module is configured to determine a number of mobile client machines located in a defined geographical area. A capacity module is configured to determine that a capacity assigned to the defined geographical area is exceeded. The capacity is a number of people that is used to provide an indication that the defined geographical area is overcrowded. The determination is based on the number of mobile client machines located in the defined geographical area. An exit module is configured to assign an exit route to an exit of the defined geographical area to a client machine of the mobile client machines within the defined geographical area. A navigation module is configured to transmit instructions comprising the exit route to the client machine. | 06-20-2013 |
20130173428 | AUGMENTING PRODUCT INFORMATION ON A CLIENT DEVICE - Techniques for augmenting information related to a product captured at a client device are described herein. In one aspect, information for the product is captured at the client device. One or more data sources are chosen for extracting additional product data. The one or more data sources are selected from a set of data sources based on a registered characteristic of the data sources. In a further aspect, one or more data queries are sent to the selected one or more data sources, where data queries are generated based on the captured product information. In yet another aspect, the captured information for the product is augmented with the data retrieved by the one or more queries from the selected one or more data sources. | 07-04-2013 |
20130173961 | MEMORY-LEAK IDENTIFICATION - A memory-leak source in a data structure can be identified by counting insertions into the data structure and deletions from the data structure for locations in the execution path of a computer program. These insertion and deletion values can be used to identify at least one location as a memory-leak source that corresponds to an imbalance between insertions and deletions during the execution of the computer program. | 07-04-2013 |
20130317781 | DYNAMIC LOAD TESTING - A system includes sending of requests to a computing system based on a first number of users associated with a load test, evaluation of one or more characteristics of the computing system while sending the requests, determination to modify the first number of users to a second number of users based on the one or more evaluated characteristics, and sending of requests to the computing system based on the second number of users. | 11-28-2013 |
20140082315 | MEMORY ALLOCATION FOR LONG-LIVED OBJECTS - Managing memory allocations in a computer system may include tagging a class of data structures with a tag that identities a longer memory-allocation time for objects that correspond to the class. In response to a memory-allocation request for an object, whether or not the object is associated with the tag can be determined through the class. If the object is not associated with the tag, memory can be allocated for the object from a first memory-allocation area that corresponds to a shorter memory-allocation time, and if the object is associated with the tag, memory can be allocated for the object from a second memory-allocation area that corresponds to the longer memory-allocation time. | 03-20-2014 |
20140331118 | Persisting Objects in a Single Data Table - Disclosed is a system and method for persisting software objects. An object may be scanned to identify the members of the object. The members are transformed into an intermediate data structure. The intermediate data structure may be persisted in a single data table. Subsequent objects may be similarly scanned into respective intermediate data structure, and then persisted in the same single data table. | 11-06-2014 |
20140344325 | ASYNCHRONOUS CONTENT UPDATES IN THE BACKGROUND FOR IMPROVED APPLICATION PERFORMANCE - Server loads can be reduced while improving the experience for a user of a web application in which one or more images are produced at a server and transmitted over a communication channel to a client device. In some examples, navigation by a user to an application page that contains an image or other content resource that requires generation by a backend server but that might not immediately interest the user can involve an asynchronous download of the content resource to the client machine. In some variations, the asynchronous download can occur after a user input requesting an updating of the content resource initially displayed based on a cached resource. | 11-20-2014 |
20140351656 | TRACKING OF PROGRAM OBJECTS DURING REQUEST PROCESSING - Coding issues that create runtime memory leaks, for example in programs coded in a platform-independent programming language such as Java™, can be isolated at the program code line level. An allocation trace that retains, in active memory, a unique object identifier for each of a plurality of objects instantiated during program execution and an address in the active memory where each object is stored can be created. Memory leak candidates can be identified by directly examining contents of the active memory to identify one or more data structures that are increasing in size over time. The allocation trace can be combined with the identified memory leak candidates to generate information about at least one identified leaking object. | 11-27-2014 |