Abstract: Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token.
Type:
Grant
Filed:
December 27, 2012
Date of Patent:
October 27, 2015
Assignee:
NetIQ Corporation
Inventors:
Lloyd Leon Burch, Carolyn B. McClain, Robert Skousen Stilmar, Dipto Chakravarty, Baha Masoud, Michael F. Angelo
Abstract: Techniques for mapping and managing resources are presented. Hardware capacity and information is collected over multiple processing environments for hardware resources. The information is mapped to logical business resources and resource pools. Capacity is rolled up and managed within logical groupings and the information gathering is managed via in-memory and on-file caching techniques.
Type:
Grant
Filed:
August 29, 2012
Date of Patent:
June 9, 2015
Assignee:
NetIQ Corporation
Inventors:
Lee Edward Lowry, Michael Joseph Sorensen
Abstract: In a computing system environment for viewing, accessing, and executing computing resources on one or more computing devices of a user, methods and apparatus include creating an object configured to provide at least one navigational aid for display on at least one of the computing devices. The object allows a user to view, navigate to, and access the computing resource. The object further includes one or more computing policies defining access rights for the computing resource and a listing of one or more other computing resources required for loading and/or executing the computing resource. Other computing resources necessary for loading and/or executing the computing resource are held separate from the object, thus providing information needed to execute the computing resource to the user while abstracting methods and resources required to build and use the computing resource.
Type:
Application
Filed:
October 31, 2013
Publication date:
April 30, 2015
Applicant:
NetIQ Corporation
Inventors:
Lloyd Leon Burch, Baha Masoud, Thomas Crabb
Abstract: Methods for correlating configuration change data to an application installation/removal event for a computer system are provided. Configuration change data records for the computer system are retrieved. The application installation/removal event is identified. Correlation criteria are determined. A plurality of the configuration change data records are automatically identified as being associated with the identified application installation/removal event based on the determined correlation criteria and a characteristic of the configuration change data records.
Abstract: Some embodiments of the present invention provide resource management systems, methods and computer program products that support web services by identifying a web service as an object in a common information model. Additional embodiments of the present invention provide systems, methods and computer program products that provide web services from an object-oriented resource management system using a published web services description, e.g., a WSDL file.
Abstract: Methods, systems and computer program products are provided for invariant representation of computer network information technology (IT) managed resources. A common information model for representing the managed resources is defined. An identification of a resource managed by an IT resource management point product is received. The identification includes an identification of a representation used by the point product for the resource managed by the point product. It is determined if an invariant representation for the resource managed by the point product has previously been defined under the common information model. The representation used by the point product for the resource managed by the point product is associated with the previously defined invariant representation for the resource managed by the point product when an invariant representation for resource managed by the point product has been previously defined.
Abstract: Methods for monitoring changes in objects on a computer system include receiving a request to generate a baseline snapshot of a plurality of objects having associated object types. The object types include at least one object having an object type not managed by a file system of the computer system. Current information is obtained, responsive to the request to generate a baseline snapshot, from a plurality of data collectors to determine at least one attribute of each of the objects to define the baseline snapshot. A request for a baseline report for the objects is received. Updated information is obtained, responsive to the request for a baseline report, from the plurality of data collectors to update the at least one attribute of each of the objects. The baseline snapshot is compared to the obtained updated information to determine if any of the objects have changed.
Type:
Grant
Filed:
March 16, 2010
Date of Patent:
April 3, 2012
Assignee:
NetIQ Corporation
Inventors:
Stephen Alstrin, Jiebo Guan, Randy Bowie
Abstract: A system, method, and computer-readable medium for performing network system diagnostics is provided. The method includes obtaining a respective identification of a first target device and a second target device deployed in a network; iteratively querying neighbor devices of at least one node in a communications path between the first and second target devices, wherein the neighbor devices and the first and second target device may comprise heterogeneous network nodes; and generating a layer 2 path trace that comprises identification of network devices interconnected on a physical path between the first and second target devices. A computer-readable medium includes instructions for execution by a processing system, wherein the instructions are configured to perform the foregoing method. A system includes a data processing system including a processor device for executing a diagnostics engine implemented as a set of computer-executable instructions configured to perform the foregoing method.
Type:
Grant
Filed:
August 3, 2006
Date of Patent:
June 22, 2010
Assignee:
Netiq Corporation
Inventors:
Michael Tod Schumacher, Jeffrey Todd Hicks
Abstract: Methods for monitoring changes in objects on a computer system include receiving a request to generate a baseline snapshot of a plurality of objects having associated object types. The object types include at least one object having an object type not managed by a file system of the computer system. Current information is obtained, responsive to the request to generate a baseline snapshot, from a plurality of data collectors to determine at least one attribute of each of the objects to define the baseline snapshot. A request for a baseline report for the objects is received. Updated information is obtained, responsive to the request for a baseline report, from the plurality of data collectors to update the at least one attribute of each of the objects. The baseline snapshot is compared to the obtained updated information to determine if any of the objects have changed.
Type:
Grant
Filed:
July 18, 2007
Date of Patent:
April 27, 2010
Assignee:
NetIQ Corporation
Inventors:
Stephen Alstrin, Jiebo Guan, Randy Bowie
Abstract: A path of a communication connection between a first node and a second node is determined. The path includes at least one connecting node. A first set of network performance data associated with the communication connection is obtained. Ones of a plurality of diagnostic rules is automatically evaluated based on the obtained first set of network performance data to identify a second set of network performance data to be collected.
Type:
Grant
Filed:
March 24, 2003
Date of Patent:
March 16, 2010
Assignee:
NetIQ Corporation
Inventors:
Christopher David Selvaggi, Michael Tod Schumacher, John Lee Wood
Abstract: Methods, systems and computer program products are provided for evaluating security of a network environment. Security data associated with an asset in the network environment collected over a first period of time is analyzed to detect security events occurring at a rate above a reference rate. Security data associated with the asset collected over a second period of time, greater than the first period of time, is analyzed to detect security events occurring at a rate below the reference rate. A threat index is generated based on the detected security events.
Abstract: A computerized method for managing objects created in a directory service of a distributed computing environment, including a component for backing up and restoring a single or plurality of directory service objects, a component for delegating security privileges to permit access to directory service objects, a component for retrieving data in policy storage format and representing the data in human-readable form, a component having a graphical user interface including a display capable of searching and reporting policy storage data in human readable form, a component capable of replicating a single or plurality of directory service objects across the domain tree boundaries of the directory service, a component for analyzing the effect a particular setting will have on a particular target represented as a directory service object before the setting is added to the directory service.
Type:
Grant
Filed:
March 6, 2002
Date of Patent:
July 8, 2008
Assignee:
NetIQ Corporation
Inventors:
Senthil Prabakaran, Vladimir Kazachkov, Dilip Radhakrishnan
Abstract: Methods, systems and computer program products are provided for synchronizing clocks in a computer network. A first node clock is synchronized to a second node clock by establishing an initial value of a virtual second node clock at the first node. The initial value may be established based on the first node clock and a timing record received from the second node. A frequency bias adjustment factor is determined for the virtual second node clock based on a plurality of clock requests from the first node and a plurality of corresponding responses from the second node spaced apart in time. The responses from the second node include the timing record based on the second node clock. A time of the virtual second node clock is provided based on the frequency bias adjustment factor responsive to requests for the virtual second node clock at a time between requests.
Type:
Grant
Filed:
September 11, 2001
Date of Patent:
October 16, 2007
Assignee:
NetIQ Corporation
Inventors:
Edward Adams Robie, Jr., Jeffrey Todd Hicks, John Lee Wood
Abstract: Methods, systems and computer program products are provided for evaluating performance of a network that supports packetized communications. A network test protocol that is associated with the packetized communication is initiated and network performance data is obtained based on the initiated network test protocol. An overall network quality rating is generated based on the obtained performance data and a network impairment indicator is calculated based on the overall network quality rating.
Type:
Grant
Filed:
September 27, 2002
Date of Patent:
September 25, 2007
Assignee:
NetIQ Corporation
Inventors:
Jeffrey Todd Hicks, John Lee Wood, Gary Michael Weichinger, Steven Thomas Joyce
Abstract: Methods, systems and computer program products are provided for monitoring a task executing on a data processing system, the task having an associated work in process queue and an associated work pending queue. The task is configured to properly execute requests that are terminated in progress and restarted from an initial start point. A watchdog task determines if the task is executing properly and restarts the task if it is not executing properly. Restarting is provided by placing requests in the work in process queue of the terminated task in the work pending queue and clearing the work in process queue. Execution by the task of requests from the work pending queue is then reinitiated.
Type:
Grant
Filed:
December 12, 2003
Date of Patent:
August 15, 2006
Assignee:
NetIQ Corporation
Inventors:
William Tsun, Vikas Chandra, John Lee Wood, Peter James Schwaller
Abstract: Different web pages on a web server are associated with different qualification profiles, each of which is assigned a value by the web-site proprietor. Traffic data hits at the web-site are analyzed to determine which web pages the visitor viewed on the web server. Each qualifying visitor is thereafter associated with a qualification profile and a corresponding value. In another aspect of the invention, visitors arriving as a result of an advertisement on a remote web-site are tracked. The web-site proprietor is consequently able to determine a return on advertising investment based on the value of visitors brought to the site by the tracked advertisement.
Type:
Application
Filed:
April 25, 2005
Publication date:
November 17, 2005
Applicant:
NetIQ Corporation
Inventors:
Elijahu Shapira, David Montgomery, W. Boyd
Abstract: Dynamic filtering methods, systems and computer program products are provided for network performance test results which may apply network troubleshooting expertise and knowledge of network topology to select and display test results in a manner which may facilitate analysis of those results by IT staffs. In a further aspect of the present invention, a severity index is provided which may be generated based on exception events from a plurality of network performance measurements, for example, response time, throughput and availability, which measurements are generated from test results obtained from agents located on various devices on a computer network. The test results may be obtained from either passive application monitor agents or active network test agents.
Type:
Grant
Filed:
January 7, 2000
Date of Patent:
May 31, 2005
Assignee:
NetIQ Corporation
Inventors:
Peter James Schwaller, Joan Marie Bellinghausen, Dana Scott Borger, John C. Christensen, Steven Thomas Joyce, Roger Allen Lingle, David V. H. Quan, Scott Alan Southard