Patents Assigned to Computer Associates Think, Inc.
  • Patent number: 8291191
    Abstract: A system and method includes steps or acts of: organizing table partitions in logical order; presenting the partition table numbers and their current ending values in logical order to a user; receiving an alter command from the user, the alter command specifying at least one logical partition number and its corresponding ending value; internally matching the specified logical partition number to its corresponding physical partition number; altering the physical partitioning of the table by manipulating one or more current ending values of partitions by altering the current ending value of the physical partition to which the specified logical partition is associated, such that new ending values are generated; and automatically generating at least one data definition language statement corresponding to the alter command, using the new ending value.
    Type: Grant
    Filed: February 13, 2008
    Date of Patent: October 16, 2012
    Assignee: Computer Associates Think, Inc.
    Inventors: Wayne Joseph Barbarek, James Lawrence Broadhurst
  • Publication number: 20120260133
    Abstract: A method for diagnosing problems in a computer system by visualizing flows through subsystems of the computer system. Diagnostic tools include a user interface which includes a triage map which graphically depicts subsystems, such as applications, through which a Business Transaction flows, and the calling relationship between the subsystems. The subsystems can be depicted by nodes which include alerts and performance information. The user can run a command to find transactions of a specific Business Transaction and/or front end subsystem which meet filter criterion such as response time and user identifier. Each captured transaction can be listed with information such as response time and reporting agent. Details of a particular transaction instance, such as its invoked components, can also be viewed in a transaction trace.
    Type: Application
    Filed: April 8, 2011
    Publication date: October 11, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Laura G. Beck, Natalya E. Litt, Nathan A. Isley
  • Publication number: 20120260236
    Abstract: A method for diagnosing problems in a computer system by visualizing flows through applications and other subsystems in a directed graph on a user interface. The user interface represents multiple instances of each application or other subsystem by a respective node, and edges indicate which nodes depend on one another. Aggregate metrics which are based on the multiple instances, and associated alerts, can be provided for the nodes and edges. An aging process can indicate which nodes have not been recently invoked. The user interface can also indicate which nodes and edges are associated with a given business transaction. In a summary view, a node hides the identity of invoked components such as servlets of the application, while in a detailed view these details are provided.
    Type: Application
    Filed: April 8, 2011
    Publication date: October 11, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Indranil Basak, Erhan Giral
  • Publication number: 20120259793
    Abstract: A model is used to provide a user interface to track flows through at least one application of a computer system. The model relates the structural aspects of the at least one application to a behavioral model such as a business transaction hierarchy. The structural part of the model includes linked Vertex and Edge records. Vertex records for different instances of a component can be aggregated to provide a single vertex or node for display in a user interface. A Vertex record is linked to an Agent record and a Metric Path record. The Edge records identify tail and head components of a call. A set of Edge records can be associated with a Transaction record in the behavioral part of the model. A Transaction record can be associated with a Business Transaction Record, and a Business Transaction record can be associated with a Business Service Record.
    Type: Application
    Filed: April 8, 2011
    Publication date: October 11, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Vladimir Umansky, Indranil Basak, Abhijit Sawant, Aaron Kenneth Blackwell, Jeffrey R. Cobb
  • Publication number: 20120260135
    Abstract: A method for diagnosing problems in a computer system by providing a user interface for visualizing flows through subsystems of the computer system, and allowing a user to explore relationships between a triage map which graphically depicts subsystems, and a transaction trace graph, which depicts a time sequence of invoked components of the subsystems. In one aspect, in response to a user selecting a portion of the transaction trace graph which depicts an invoked component, the user interface visually distinguishes one of the subsystems which invokes the invoked component. In another aspect, the transaction trace can be played back so that subsystems in the triage map are highlighted in turn, in a time sequence, as components of different subsystems are invoked. A time marker can skip to selected time points which result in updating of the triage map.
    Type: Application
    Filed: April 8, 2011
    Publication date: October 11, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Laura G. Beck, Natalya E. Litt, Nathan A. Isley
  • Publication number: 20120254214
    Abstract: A method for converting a distributed system includes providing a central database in communication with a database, in which the central database includes central schema information for accessing data stored in the central database. The method further includes transferring content data and schema information from the database to the central database for storage. The method further includes connecting schema information stored in the database to the central schema information such that each database is configured to receive a request for information, redirect the request from the database to the central database based on the referenced schema information, and receive, from the central database, the requested information.
    Type: Application
    Filed: June 11, 2012
    Publication date: October 4, 2012
    Applicant: Computer Associates Think, Inc
    Inventors: WILL C. LAUER, David J. Soares, Benjamin J. Tracy
  • Publication number: 20120239977
    Abstract: A method and system self-supportable devices and applications are provided. The method and system in one embodiment allows devices and applications to automatically communicate and service themselves, for example, by checking knowledgebase services and other services for instructions on how to handle an exception. In another embodiment, the devices and applications automatically initiate actions needed to handle the exception.
    Type: Application
    Filed: December 30, 2011
    Publication date: September 20, 2012
    Applicant: Computer Associates Think, Inc.
    Inventors: Jacob Lamm, Marvin Waschke, Yaakov Shapiro
  • Publication number: 20120233675
    Abstract: Embodiments of the invention provide systems and methods for the storage of One-Time Passwords (OTPs) on a device (principal) that needs to authenticate from time to time. It utilizes recent availability of data storage capacity not previously exploited in this arena. Also disclosed is the means to initialize and modify the system (all principals) in a secure manner, and the means to store the OTP production means on a device in a secure manner, even if the device has no built-in protected storage.
    Type: Application
    Filed: March 9, 2011
    Publication date: September 13, 2012
    Applicant: Computer Associates Think, Inc.
    Inventor: Geoffrey Hird
  • Publication number: 20120233123
    Abstract: The system and method for providing assured recovery and replication described herein may recover a master data source from a replica data source without impacting the master data source or the replica data source, and without having to install a standby version of an application associated with the master data source. In particular, a master snapshot may be created to copy application data stored in the master data source, wherein a replication server confirms that the replica data source can recover the master data source if the master snapshot and the replica data source are consistent. The replication server may create a replica snapshot to copy the replica data source and assign an identity associated with the master data source to the replica data source to recover the master data source. As such, replication may be resumed on a virtual machine disk file associated with the replica snapshot.
    Type: Application
    Filed: March 8, 2011
    Publication date: September 13, 2012
    Applicant: Computer Associates Think, Inc.
    Inventors: Liu Shisheng, Eric Harless, Paul Puthur Ignatius
  • Publication number: 20120226717
    Abstract: Embodiments herein include systems, methods, software, and data structures to generate and render visualizations of configuration items (CIs) represented in a Configuration Management Database (CMDB). One embodiment includes receiving a request for a CI graph from a client including a focus CI identifier represented in a CMDB. The focus CI may be used to retrieve data of related CIs, the data including CI identifiers. A process is then executed for each retrieved CI identifier to retrieve CI data as a function of the received CI identifier and to build a node XML and an edge XML representation of relations between the CIs. This method also includes aggregating the node and edge XML representations into a single XML document and then translating the document into a markup language document capable of being rendered in a graphical user interface. The markup language document is then transmitted to the requestor.
    Type: Application
    Filed: March 19, 2012
    Publication date: September 6, 2012
    Applicant: Computer Associates Think, Inc.
    Inventors: Nitin Maheshwari, Srikanth V, Abed Ali
  • Publication number: 20120221802
    Abstract: According to one embodiment of the present disclosure, a method for multiplex restore using next relative address may be provided. The method may include identifying an address of a first data chunk of a file stored on a storage device. The first data chunk may be read by accessing the storage device at the address of the first data chunk. A next relative address appended to the first data chunk may be identified. The next relative address may indicate a position of a next chunk. The next chunk may comprise a next data chunk of the file or an empty chunk associated with the file. The method may further include reading the next chunk by accessing the storage device at the position indicated by the next relative address.
    Type: Application
    Filed: February 24, 2011
    Publication date: August 30, 2012
    Applicant: Computer Associates Think, Inc.
    Inventor: Ai Huang
  • Publication number: 20120221527
    Abstract: According to one embodiment of the present disclosure, a method for multiplex backup using next relative addresses may be provided. The method may include receiving a first chunk and a second chunk that are each associated with a first file. A next relative address may be appended to the first chunk. The next relative address may indicate a position in a storage device. The first chunk with the next relative address may be written to the storage device at a first address. The method may further include writing the second chunk to the storage device at the position indicated by the next relative address of the first chunk.
    Type: Application
    Filed: February 24, 2011
    Publication date: August 30, 2012
    Applicant: Computer Associates Think, Inc.
    Inventor: Ai Huang
  • Publication number: 20120221526
    Abstract: A suite of network-based services, such as the services corresponding to the server application distributed by Microsoft® SharePoint™, may be provided to users with high availability. The suite of network-based services may include browser-based collaboration functions, process management functions, index and search functions, document-management functions, help and help search functions, and/or other functions. A plurality of computing devices functioning as servers may be backed up by a single computing device.
    Type: Application
    Filed: February 24, 2011
    Publication date: August 30, 2012
    Applicant: Computer Associates Think, Inc.
    Inventors: Peter Peng, Min Yan, Zhenghua Xu
  • Publication number: 20120216071
    Abstract: In certain embodiments, a service provided by a production server is facilitated. The production server is associated with a backup server configured to take over if the production server fails. The production server assigned a first identifier. A failover with a potential identity conflict is determined to have occurred. In the failover, the backup server has taken over for the production server and has been assigned the first identifier. A second identifier is assigned to the production server to replace the first identifier that was assigned to the production server in order to avoid the identity conflict.
    Type: Application
    Filed: February 18, 2011
    Publication date: August 23, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventor: Xiao Fei Niu
  • Publication number: 20120210237
    Abstract: According to certain embodiments, recording a trail of webpages includes repeating the following to yield steps of a trail: saving content of a webpage as historical content of the webpage in a step, and saving one or more parameters of the webpage in the step. The parameters comprise a location parameter of the webpage. Display of a trail overview comprising step selectors is initiated. Each step selector corresponds to a step and is configured to initiate display of the historical content of the webpage of the step corresponding to the step selector.
    Type: Application
    Filed: February 16, 2011
    Publication date: August 16, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Troy L. Coleman, Michael S. Cetaruk, Patrick A. Dickinson, Misty A. Cripps
  • Publication number: 20120210428
    Abstract: Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing patterns of how transactions flow through one or more software applications. For example, patterns of transaction flows are determined for an initial time period to establish a baseline of normal flow patterns. These normal flow patterns may be compared with patterns for transaction flows for a later time period. Deviations in the patterns of transaction flow may indicate a possible security intrusion.
    Type: Application
    Filed: February 14, 2011
    Publication date: August 16, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventor: Aaron Kenneth Blackwell
  • Publication number: 20120198439
    Abstract: Distributed installation configuration system and method are provided. The system and method in one aspect collects information about all products and components being installed from a centralized user interface, before the actual installation is performed, regardless of the target machine locations. The collected information is then stored centrally. Thereafter, subsequent installations, whether on the same or different machine locations, access this information for the subsequent installation procedure.
    Type: Application
    Filed: April 9, 2012
    Publication date: August 2, 2012
    Applicant: Computer Associates Think, Inc.
    Inventor: Travis David Kane
  • Publication number: 20120197844
    Abstract: Systems and methods for replicating data from a production server to a backup server include identifying one or more data blocks of a file that were modified after a first time instant and before a second time instant. The file may be associated with a protected directory of the production server. An representative data block (e.g., including a hash value) for at least one of the identified data blocks may be computed using a cryptography algorithm, e.g., MD5 or SHA-1. The computed cryptographic data block representing the identified data block may then be sent for replication to the backup server. An operation performed between the first time instant and the second time instant on one or more files of the protected directory may be recorded, and sent to the backup server.
    Type: Application
    Filed: February 1, 2011
    Publication date: August 2, 2012
    Applicant: Computer Associates Think, Inc.
    Inventors: Hector Wang, Haiyang Zhang, Shaorong Li, Guoxian Shang
  • Publication number: 20120197846
    Abstract: A continuously running application may be dynamically recovered. A database replica server may be directed to temporarily spool data changes in a database master server that stores application data associated with an application running on a web front-end master server. A specified rewind point may be obtained from among a plurality of existing rewind points of the application data stored in the database replica server. The database replica server may be directed to rewind the application data to a specified rewind point. An indication of data to be recovered in the rewound application data may be obtained. The web front-end master server may be directed to restore the data corresponding to the indication. The database replica server may be directed to resume replication of data changes in the database master server.
    Type: Application
    Filed: February 1, 2011
    Publication date: August 2, 2012
    Applicant: Computer Associates Think, Inc.
    Inventors: Peter Peng, Victor Liu, Zhenghua Xu
  • Publication number: 20120192152
    Abstract: A distributed processing system is described that employs “application-based” specialization. In particular, the distributed processing system is constructed as a collection of computing nodes in which each computing node performs a particular processing role within the operation of the overall distributed processing system. Each of the computing nodes includes an operating system, such as the Linux operating system, and includes a plug-in software module to provide a distributed memory operating system that employs the role-based computing techniques. An administration node maintains a database that defines a plurality of application roles. Each role is associated with a software application, and specifies a set of software components necessary for execution of the software application. The administration node deploys the software components to the application nodes in accordance with the application roles associates with each of the application nodes.
    Type: Application
    Filed: April 2, 2012
    Publication date: July 26, 2012
    Applicant: Computer Associates Think, Inc.
    Inventors: Steven M. Oberlin, David W. McAllister