Time filter

Source Type

New York, NEW YORK, United States

CA, Inc., formerly Computer Associates International, Inc., is one of the largest independent software corporations in the world. CA for short, is an American, multinational, publicly held company headquartered in New York, New York. The company creates systems software that runs in mainframe, distributed computing, virtual machine and cloud computing environments.Although the company once sold anti-virus and Internet security commercial software programs for personal computers during its venture into the business-to-consumer market, it remains primarily known for its business-to-business mainframe and distributed information technology infrastructure applications since the spin off of their security products into Total Defense. CA Technologies claims that its computer software products are used by a majority of the Forbes Global 2,000 companies.CA Technologies posted $4.4 billion in revenue for fiscal year 2010 and maintains 100 offices in more than 45 countries. The company employs 13,200 people , including 5,900 engineers in software development. CA holds more than 400 patents worldwide, and has more than 700 patent applications pending.In 2010 the company acquired eight companies to support its Cloud strategy: 3Tera, Nimsoft, NetQoS, Oblicore, Cassatt, 4Base Technology, Arcot Systems, and Hyperformix. Wikipedia.

Rosenbloom P.S.,CA Technologies
Cognitive Systems Research | Year: 2011

Cognitive architectures need to resolve the diversity dilemma - i.e., to blend diversity and uniformity - in order to couple functionality and efficiency with minimality, integrability, extensibility and maintainability. Building diverse architectures upon a uniform implementation level of graphical models is an intriguing approach because of the homogeneous manner in which such models produce state-of-the-art algorithms spanning symbol, probability and signal processing. To explore this approach a hybrid (discrete and continuous) mixed (Boolean and Bayesian) variant of the Soar architecture is being implemented via graphical models. Initial steps reported here, including a graphical implementation of production match and the beginnings of a mixed decision cycle incorporating a simple semantic memory, begin to show the potential of such an approach for cognitive architecture. © 2010 Elsevier B.V. Source

Mate C.M.,CA Technologies
IEEE Transactions on Magnetics | Year: 2011

As the clearances in disk drives approach subnanometer values, accurately predicting lubricant behavior is becoming more critical to designing reliable slider-disk interfaces. Central to any analysis of lubricant in disk drives is the disjoining pressure of the lubricant films on the disk and slider surfaces. This paper reviews current measurement techniques of the disjoining pressure of the lubricants used in disk drives and theoretical expressions of the disjoining pressure as a function of lubricant thickness. This paper also discusses what disjoining pressure analyses will be needed for future disk drive technologies. © 2006 IEEE. Source

Ryu K.-S.,IBM | Thomas L.,CA Technologies | Yang S.-H.,IBM | Parkin S.,IBM
Nature Nanotechnology | Year: 2013

Spin-polarized currents provide a powerful means of manipulating the magnetization of nanodevices, and give rise to spin transfer torques that can drive magnetic domain walls along nanowires. In ultrathin magnetic wires, domain walls are found to move in the opposite direction to that expected from bulk spin transfer torques, and also at much higher speeds. Here we show that this is due to two intertwined phenomena, both derived from spin-orbit interactions. By measuring the influence of magnetic fields on current-driven domain-wall motion in perpendicularly magnetized Co/Ni/Co trilayers, we find an internal effective magnetic field acting on each domain wall, the direction of which alternates between successive domain walls. This chiral effective field arises from a Dzyaloshinskii-Moriya interaction at the Co/Pt interfaces and, in concert with spin Hall currents, drives the domain walls in lock-step along the nanowire. Elucidating the mechanism for the manipulation of domain walls in ultrathin magnetic films will enable the development of new families of spintronic devices. © 2013 Macmillan Publishers Limited. All rights reserved. Source

Braithwaite R.N.,CA Technologies
IEEE Transactions on Microwave Theory and Techniques | Year: 2013

A combined approach to digital predistortion (DPD) and crest factor reduction (CFR) is proposed. The new CFR is structured similar to DPD and is implemented by introducing a steady-state offset into the DPD coefficients. The DPD and CFR coefficients are estimated using separate adaptive processes but applied to the transmission path in a common module. The DPD/CFR module provides the means to exploit margins in the transmitter performance, allowing the tradeoff between peak-to-average-power ratio (PAPR), error vector magnitude, and adjacent channel power ratio (ACPR). The proposed approach applies CFR to the predistorted signal instead of the input signal. This allows the envelope clipping module, which is typically present to protect the power amplifier (PA), to be removed, thereby avoiding divergence problems during the iterative closed-loop estimation of the DPD coefficients. Results show that post-CFR lowers the PAPR of the predistorted signal by 5 dB, which reduces the stress on the peaking transistor in a Doherty PA. The combined DPD/CFR reduces the ACPR of the transmitter by 21 dB compared with the unlinearized PA. © 1963-2012 IEEE. Source

Agency: Cordis | Branch: H2020 | Program: RIA | Phase: ICT-07-2014 | Award Amount: 3.57M | Year: 2015

The most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications. They have to deal with the security of the individual components as well as with the overall application security including the communications and the data flow between the components. The main objective of MUSA is to support the security-intelligent lifecycle management of distributed applications over heterogeneous cloud resources, through a security framework that includes: security-by-design mechanisms to allow application self-protection at runtime, and methods and tools for the integrated security assurance in both the engineering and operation of multi-cloud applications. The MUSA framework leverages security-by-design, agile and DevOps approaches in multi-cloud applications, and enables the security-aware development and operation of multi-cloud applications. The framework will be composed of a) an IDE for creating the multi-cloud application taking into account its security requirements together with functional and business requirements, b) a set of security mechanisms embedded in the multi-cloud application components for self-protection, c) an automated deployment environment that, based on an intelligent decision support system, will allow for the dynamic distribution of the components according to security needs, and d) a security assurance platform in form of a SaaS that will support multi-cloud application runtime security control and transparency to increase user trust. The project will demonstrate and evaluate the economic viability and practical usability of the MUSA framework in highly relevant industrial applications representative of multi-cloud application development potential in Europe. The project duration will be 36 months, with an overall budget of 3,574,190 euros.

Discover hidden collaborations