Search

Carsten Andrea Blecken

from Mountain View, CA
Age ~59

Carsten Blecken Phones & Addresses

  • 313 Pettis Ave, Mountain View, CA 94041 (650) 254-1753
  • Gainesville, FL
  • 1803 Judah St, San Francisco, CA 94122 (415) 664-9115
  • Fair Oaks, CA
  • Santa Clara, CA

Work

Company: Tibco software inc. 2006 Position: Director, engineering and architect

Education

Degree: Doctorates, Doctor of Philosophy School / High School: University of Florida 1991 to 1996 Specialities: Computer Science, Physics

Skills

Web Services • Design Patterns • Java • Databases • Enterprise Software • Cloud Computing • Solution Architecture • Saas • Multithreading • Scalability • Enterprise Architecture • Software Development • Soa • Architecture • Web Development • Agile Methodologies • Sql • Service Oriented Architecture • C++ • Spark • Distributed Systems

Languages

English

Interests

Collecting Antiques • Exercise • Home Improvement • Shooting • Reading • Gourmet Cooking • Sports • The Arts • Food • Home Decoration • Health • Cooking • Electronics • Outdoors • Crafts • Fitness • Collecting • Kids • Medicine • Parenting • Boating • Investing

Industries

Computer Software

Resumes

Resumes

Carsten Blecken Photo 1

Director, Engineering And Architect

View page
Location:
313 Pettis Ave, Mountain View, CA 94041
Industry:
Computer Software
Work:
Tibco Software Inc.
Director, Engineering and Architect

Rovi 2003 - 2006
Staff Engineer

Commerce One 2000 - 2003
Technical Lead

Informix 1998 - 2000
Senior Software Engineer
Education:
University of Florida 1991 - 1996
Doctorates, Doctor of Philosophy, Computer Science, Physics
Skills:
Web Services
Design Patterns
Java
Databases
Enterprise Software
Cloud Computing
Solution Architecture
Saas
Multithreading
Scalability
Enterprise Architecture
Software Development
Soa
Architecture
Web Development
Agile Methodologies
Sql
Service Oriented Architecture
C++
Spark
Distributed Systems
Interests:
Collecting Antiques
Exercise
Home Improvement
Shooting
Reading
Gourmet Cooking
Sports
The Arts
Food
Home Decoration
Health
Cooking
Electronics
Outdoors
Crafts
Fitness
Collecting
Kids
Medicine
Parenting
Boating
Investing
Languages:
English

Publications

Us Patents

Software License Manager Employing License Proofs For Remote Execution Of Software Functions

View page
US Patent:
20060287959, Dec 21, 2006
Filed:
Jun 17, 2005
Appl. No.:
11/156104
Inventors:
Carsten Blecken - Mountain View CA, US
International Classification:
G06F 17/60
US Classification:
705059000
Abstract:
A user of a local computer requests that a remote computer run a software function of an application program by sending the request along with a license proof demonstrating that the local computer is authorized to run the software function using their respective license management software. Upon verifying the source, confirming that it has the right to run the software function, and verifying that the request is timely made, the license management software on the remote computer allows a user on that computer to run the software function as requested.

System And Method For Effectively Configuring A Marketsite Application Integrator

View page
US Patent:
20070174383, Jul 26, 2007
Filed:
Mar 16, 2007
Appl. No.:
11/725092
Inventors:
Richard Denoix - Pleasanton CA, US
Carsten Blecken - Mountain View CA, US
Jayaram Kasi - San Jose CA, US
Jong Park - Campbell CA, US
Gary Yue - San Jose CA, US
Steve Cheng - Milpitas CA, US
Changzhong Tong - Pleasanton CA, US
Assignee:
Open Invention Network LLC - Pound Ridge NY
International Classification:
G06F 15/16
US Classification:
709200000, 715700000
Abstract:
A system and method for effectively configuring a marketsite application integrator may include an application program running on a computer device that is coupled through a computer network to other 10 electronic entities for performing various types of electronic commercial transactions. An application integrator may be coupled to the application program for providing incoming data from a data source to the application program. The application integrator may also provide outgoing data from the application program to a data destination. The application integrator may 15 include various configurable integrator modules for selectively processing the incoming data and outgoing data in an appropriate and effective manner.

Systems And Methods For Usage Measurement Of Content Resources

View page
US Patent:
20090083155, Mar 26, 2009
Filed:
Aug 27, 2008
Appl. No.:
12/199781
Inventors:
Frederic Burgess TUDOR - Menlo Park CA, US
Carsten BLECKEN - Mountain View CA, US
Kevin NILSON - Mountain View CA, US
Assignee:
Espereka, Inc. - Menlo Park CA
International Classification:
G06Q 30/00
G06F 15/173
US Classification:
705 14, 709224, 705 1
Abstract:
Systems and methods are provided for an effective usage measurement of content resources in a hyperlinked environment such as the World Wide Web. In one embodiment, a content publisher is to include the usage monitoring hyperlink (“UMH”) in its published content so that access to the content resource generates a network based UMH resource request. The network based request contains sufficient information to identify the accessed content resource as well as the provider and publisher. The system and method can be used to reliably measure the number of accesses to a particular content resource, since the embedded UMH triggers a measurement request when the content resource is accessed.

Authenticated And Confidential Communication Between Software Components Executing In Un-Trusted Environments

View page
US Patent:
20060195689, Aug 31, 2006
Filed:
Feb 28, 2005
Appl. No.:
11/069736
Inventors:
Carsten Blecken - Mountain View CA, US
David Znidarsic - Palo Alto CA, US
Shailesh Agarwal - San Jose CA, US
Rajen Bose - Santa Clara CA, US
International Classification:
H04N 7/16
H04L 9/00
H04L 9/32
G06F 17/30
G06F 7/04
G06K 9/00
H03M 1/68
H04K 1/00
US Classification:
713156000, 713175000, 726026000
Abstract:
A method and system for implementing secure communication in an un-trusted execution environment. The method includes transmitting respective first and second certificates between a first component and a second component, wherein the first certificate and the second certificate are respectively hidden within software code comprising the first component and the second component. A secure communication channel is then generated between the first component and the second component by the second component using a first public key of the first certificate and the first component using a second public key of the second certificate. The identity of the first component is verified by the second component checking the first certificate with respect to a certificate authority. The identity of the second component is verified by the first component checking the second certificate with respect to the certificate authority. Upon successful verification of the first certificate and the second certificate, a data exchange is implemented via the secure communication channel.
Carsten Andrea Blecken from Mountain View, CA, age ~59 Get Report