“Manoj was one of the best hires I made. When everybody is talking at 50K feet level, somebody needs to think at detailed level and know what's going under the hood - he is the one who delves into details to make the project successful. Self driven and strong willed, he holds himself and his team accountable. As a demanding manager, he can drive extraordinary work out of his team.”
About
Activity
-
GrafanaCON 2025 in Seattle is only 4 weeks away! I'm excited to: 🎤 Co-present the talk "Grafana Alloy: combining the OpenTelemetry Collector with a…
GrafanaCON 2025 in Seattle is only 4 weeks away! I'm excited to: 🎤 Co-present the talk "Grafana Alloy: combining the OpenTelemetry Collector with a…
Liked by Manoj Acharya
Experience & Education
Publications
-
SOA in the real world – experiences
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
The paper discusses our experiences in building a real-world, mission-critical enterprise business application on a service-oriented architecture for a leading consumer lending company.
Other authorsSee publication
Patents
-
Business transaction correlation with client request monitoring data
Issued US 9961129
A system monitors a client request and a backend business transaction performed in response to the request and correlates the data generated from monitoring the request and business transaction. A request may be monitored in detail to determine several metrics. The metrics may include sever connection time, response receipt completion time, document download time, document processing time, and page rendering time. The metrics may be determined for an entire content page as well as individual…
A system monitors a client request and a backend business transaction performed in response to the request and correlates the data generated from monitoring the request and business transaction. A request may be monitored in detail to determine several metrics. The metrics may include sever connection time, response receipt completion time, document download time, document processing time, and page rendering time. The metrics may be determined for an entire content page as well as individual page elements, such as Iframes and elements constructed from AJAX techniques.
-
Reporting page composition data
Issued US 9942361
Distributed applications are monitored and page composition metrics are reported in terms of a plurality of phases of a page loading lifecycle. The phases may include first byte received, page rendering time, onload time, post page load time, and other phases. For each phase, data regarding different types of requests may be reported. Data regarding AJAX and iFrame requests may be reported for each phase in a page load, providing more information regarding what is loaded and when. The data may…
Distributed applications are monitored and page composition metrics are reported in terms of a plurality of phases of a page loading lifecycle. The phases may include first byte received, page rendering time, onload time, post page load time, and other phases. For each phase, data regarding different types of requests may be reported. Data regarding AJAX and iFrame requests may be reported for each phase in a page load, providing more information regarding what is loaded and when. The data may be provided in a graphical ‘cascade’ format based on the phase. Information for AJAX, iFrame and other requests may include the number of such requests occurring in each phase, the average execution time of the requests, and other data. The requests and phases can be determined for multiple types of browsers based on data collection techniques compatible for each particular browser.
-
System and method for determining end user timing
Issued US 9935856
A system automatically determines end user timing across multiple platforms and network browsers. End user timing data may be captured using one or more techniques. The techniques may include utilizing a navigation timing standard and handler call back functionality. The end user timing data may be analyzed to identify which technique's data is most accurate, and the most accurate end user timing data is then reported.
-
Automatic asynchronous handoff identification
Issued US 9515901
Asynchronous handoffs between threads and other software components may be automatically detected, and the corresponding working objects may be tracked. The system may report monitoring information for an overall transaction that includes the original request and corresponding asynchronous requests. Automatically detecting asynchronous requests may include instrumenting a virtual machine, such as a Java Virtual Machine (JVM), to detect the creation of thread handoff objects and the object…
Asynchronous handoffs between threads and other software components may be automatically detected, and the corresponding working objects may be tracked. The system may report monitoring information for an overall transaction that includes the original request and corresponding asynchronous requests. Automatically detecting asynchronous requests may include instrumenting a virtual machine, such as a Java Virtual Machine (JVM), to detect the creation of thread handoff objects and the object and/or thread execution. Thread handoff objects may automatically tracked, tracked based on data learned over time, tracked based on user input, and otherwise configured. In some embodiments, after detecting the creation of a thread handoff object, an identification of the object of the call may be identified as being tracked in another server or application.
-
Automatic capture of detailed analysis information for web application outliers
Issued US 9311598
A system monitors a network or web application provided by one or more distributed applications and provides data for each and every method instance in an efficient low-cost manner. The web application may be provided by one or more web services each implemented as a virtual machine or one or more applications implemented on a virtual machine. Agents may be installed on one or more servers at an application level, virtual machine level, or other level. The agent may identify one or more hot…
A system monitors a network or web application provided by one or more distributed applications and provides data for each and every method instance in an efficient low-cost manner. The web application may be provided by one or more web services each implemented as a virtual machine or one or more applications implemented on a virtual machine. Agents may be installed on one or more servers at an application level, virtual machine level, or other level. The agent may identify one or more hot spot methods based on current or past performance, functionality, content, or business relevancy. Based on learning techniques, efficient monitoring, and resource management, the present system may capture data for and provide analysis information for outliers of a web application with very low overhead.
-
Isolation of Untrusted Code in Operating System Without Isolation Capability
Filed US 15011064
Code intended to operate in an operating system without an isolation mechanism is executed in isolation. The present system enables synthetic transactions to be executed in isolation without affecting other client data and files. Isolation may be outsourced to a separate set of servers that have an operating system which does support isolation. A handshake or other protocol is utilized to maintain secure data and communication. Untrusted script code provided by a customer is isolated in one or…
Code intended to operate in an operating system without an isolation mechanism is executed in isolation. The present system enables synthetic transactions to be executed in isolation without affecting other client data and files. Isolation may be outsourced to a separate set of servers that have an operating system which does support isolation. A handshake or other protocol is utilized to maintain secure data and communication. Untrusted script code provided by a customer is isolated in one or more remote servers. To execute the script on a client machine, a key is provided to access this script. A machine at which the script is to be run is provided with the key and the address of the script code on the remote server. A secure connection is established between the client machine and the script code server and script is executed on the client machine.
-
Custom correlation of a distributed business transaction
Filed US 14018349
A mechanism is provided for customizing communication of correlation data between servers using a custom or proprietary communication protocol. The system may modify a payload transmitted between servers to include monitoring parameters. The payload may be modified by expanding a portion of the payload or otherwise inserting data into the payload. The portion may include a header, footer, an additional property, a field, or other portion of the header. A mechanism may detect both outgoing calls…
A mechanism is provided for customizing communication of correlation data between servers using a custom or proprietary communication protocol. The system may modify a payload transmitted between servers to include monitoring parameters. The payload may be modified by expanding a portion of the payload or otherwise inserting data into the payload. The portion may include a header, footer, an additional property, a field, or other portion of the header. A mechanism may detect both outgoing calls and incoming requests to either modify the request with the payload or retrieve the payload from the request. The configuration preferences received from a user may be used to process the detected calls and modify a payload at a designed portion suitable to be expanded. Once sent, the configuration parameters may be used by a recipient server to detect the request with the modified payload and retrieve the monitoring parameter. The monitoring parameter may be used to correlate distributed transactions that occur over a set of servers which communicate with non-standard protocols.
-
Automatic capture of detailed analysis information for web application outliers with very low overhead
Issued US 9311598
A system monitors a network or web application provided by one or more distributed applications and provides data for each and every method instance in an efficient low-cost manner. The web application may be provided by one or more web services each implemented as a virtual machine or one or more applications implemented on a virtual machine. Agents may be installed on one or more servers at an application level, virtual machine level, or other level. The agent may identify one or more hot…
A system monitors a network or web application provided by one or more distributed applications and provides data for each and every method instance in an efficient low-cost manner. The web application may be provided by one or more web services each implemented as a virtual machine or one or more applications implemented on a virtual machine. Agents may be installed on one or more servers at an application level, virtual machine level, or other level. The agent may identify one or more hot spot methods based on current or past performance, functionality, content, or business relevancy. Based on learning techniques, efficient monitoring, and resource management, the present system may capture data for and provide analysis information for outliers of a web application with very low overhead.
-
Automatic capture of detailed analysis information based on remote server analysis
US 20210184947
A system monitors a network or web application provided by one or more distributed applications and provides data for each and every method instance in an efficient low-cost manner. Agents may monitor the performance of the distributed application by the web services and report monitoring data as runtime data to the remote server, for example a controller. The controller may analyze the data to identify one or more performance issues or “hot spot” methods based on current or past performance…
A system monitors a network or web application provided by one or more distributed applications and provides data for each and every method instance in an efficient low-cost manner. Agents may monitor the performance of the distributed application by the web services and report monitoring data as runtime data to the remote server, for example a controller. The controller may analyze the data to identify one or more performance issues or “hot spot” methods based on current or past performance, functionality, content, or business relevancy. Instructions and/or configuration information may be transmitted by the controller to the agents that correspond to a particular business transaction portion associated with a hot spot. The portions are then monitored to collect data associated with the hot spot and the hot spot data is reported back to the controller.
-
Automatically generating an application knowledge graph
US 20220245470
A system that automatically monitors an application without requiring administrators to manually identify what portions of the application should be monitored. The present system is flexible in that it can be deployed in several different environments having different operating parameters and nomenclature. The present application is able to automatically monitor applications in the different environments, and convert data, metric, and event nomenclature of the different environments to a…
A system that automatically monitors an application without requiring administrators to manually identify what portions of the application should be monitored. The present system is flexible in that it can be deployed in several different environments having different operating parameters and nomenclature. The present application is able to automatically monitor applications in the different environments, and convert data, metric, and event nomenclature of the different environments to a universal nomenclature. A system graph is then created from the nodes and metrics of each environment application that make up a client system. The system graph, and the properties of entities within the graph, can be displayed through an interface to a user.
-
Automatically generating assertions and insights
US 20220245476
A system monitors an application and automatically models, correlates, and presents insights. The monitoring is performed without requiring administrators to manually identify what portions of the application should be monitored. The modeling and correlating are performed using a knowledge graph and automated modeling system that identifies system entities, builds the knowledge graph, and reports the most crucial insights, determined automatically, using a dashboard that automatically reports…
A system monitors an application and automatically models, correlates, and presents insights. The monitoring is performed without requiring administrators to manually identify what portions of the application should be monitored. The modeling and correlating are performed using a knowledge graph and automated modeling system that identifies system entities, builds the knowledge graph, and reports the most crucial insights, determined automatically, using a dashboard that automatically reports on the most relevant system data and status.
Recommendations received
2 people have recommended Manoj
Join now to viewOther similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Manoj Acharya in United States
12 others named Manoj Acharya in United States are on LinkedIn
See others named Manoj Acharya