Abstract: In one aspect, a computer-implemented method for generating commands used to modify a plurality of limit key values includes determining a current value for each of the plurality of limit keys, determining a new value for each of the plurality of limit keys, and generating a normalized internal key for the current values and the new values of each of the limit keys. The method further includes iteratively determining a sequence order for each limit key using the current normalized internal keys and the new normalized limit keys and using the sequence order of each limit key to generate commands used to change the value of each limit key from the current value to the new value. The method may also include generating data used to indicate that a sequence order could not be determined.
Abstract: Systems and methods for deploying agents for a management system across IT infrastructure in an automated fashion are disclosed herein. Embodiments of the present invention allow agents to be substantially automatically deployed or configured in conjunction with previously unknown or newly added application components. More specifically, embodiments of the present invention may track traffic associated with application components to identify unknown application components. Agents may then be deployed to monitor these newly identified application components.
Abstract: According to an example implementation, a computer-readable storage medium, computer-implemented method and a system are provided to detect a plurality of computer events, determine an event severity for each event, select a set of the events having a highest severity of the plurality of events, determine an event category for each event in the set of events, display an event management console including an entry for each event of the set of events, each entry in the event management console including at least an event description and an event severity indicator that indicates event severity, and wherein the displayed event management console also includes one or more evocations for each event category of the set of events, each evocation providing a suggested course of action to address events of the event category.
Abstract: A layer manager provides at least two content layers within a user interface window of a software application. A tab manager provides at least two content tabs within at least one of the content layers. A transfer manager is configured to transfer at least one content tab between the at least two content layers.
Abstract: A cost estimator may estimate execution costs for execution of at least one query against a database, using at least one existing index, if any, and based on estimation criteria determined from analyzing the query execution. A candidate index provider may provide candidate indexes, based on the estimation criteria, and re-estimate the execution costs to obtain updated execution costs, using the candidate indexes. An index recommender may recommend a recommended index, based on the updated execution costs.
Abstract: In one general aspect, a computer-implemented method includes a computer-implemented method that includes executing, using at least one processor, instructions recorded on a non-transitory computer-readable storage medium. The method includes receiving a request to insert a data record within a database of a data collection system. The data record can be placed within a buffer in a main memory of the data collection system. A record data structure and a record index structure associated with the data record are defined. The record data structure and the record index structure are stored within a storage chunk in a storage medium of the database, and the storage medium is different than the main memory. The storage chunk has an associated index that can be used to retrieve the data record and the storage chunk can include other data records different than the data record associated with the received request.
Type:
Application
Filed:
September 30, 2011
Publication date:
April 4, 2013
Applicant:
BMC SOFTWARE, INC.
Inventors:
Brian B. James, Eric T. Hardison, David L. Janicek
Abstract: A computer-implemented method includes executing instructions stored on a computer-readable medium. The computer-implemented method includes receiving, at a server hosting a strongly-typed object-oriented application programming interface (API), a single API call to request data from the strongly-typed object-oriented API, where the single API call includes a tuple having multiple object types, obtaining the requested data and returning the requested data.
Abstract: In one general aspect, a computer-readable storage medium can be configured to store instructions that when executed cause a processor to perform a process. The instructions can include instructions to identify, at a mainframe computing environment during an initiation phase associated with a management utility process, a set of tasks for implementing the management utility process, and instructions to send, to a non-mainframe computing environment, a description identifying at least a portion of the set of tasks. The instructions can also include instructions to receive an indicator, at the mainframe computing environment, that processing based on the at least the portion of the set of tasks associated with the management utility process has been completed, and instructions to execute a termination phase of the management utility process at the mainframe computing environment in response to the indicator.
Abstract: In one general aspect, a computer-readable storage medium can be configured to store instructions that when executed cause a processor to perform a process. The instructions can include instructions to receive, during a first portion of an execution of a main program including a database query program and based on a first configuration for monitoring the database query program, a parameter value representing performance of execution of the database query program. The instructions can include instructions to produce an indicator that a performance condition has been satisfied based, at least in part, on the parameter value, and instructions to trigger execution of a second configuration for monitoring the database query program during a second portion of the execution of the main program in response to the performance condition being satisfied.
Abstract: A technique for collecting and correlating locking data collects and correlates information on a plurality of programs waiting on or holding a plurality of resources in a multi-computer database system. The technique identifies a program executing on one computer of the multi-computer database system that is waiting on a resource. The technique also identifies a second program, executing on another computer, as the ultimate holder of the resource. An operator display screen displays information corresponding to the first program and the second program. The operator display screen may be switched between a multiline display format and a single line display format. The collection, identification, and display of the locking data is performed periodically, to allow the operator to discover locking problems and take a desired corrective action.
Type:
Grant
Filed:
February 26, 2010
Date of Patent:
March 26, 2013
Assignee:
BMC Software, Inc.
Inventors:
Loc D. Tran, Gary B. Genest, Dale J. Stroyick
Abstract: Systems, methods and computer readable media for providing virtual private clouds within a public cloud are described. Examples include a method wherein a service provider deploys a primary instance of a cloud-in-a-box (CIAB) to his cloud computing system to create a public cloud. A CIAB includes adapters configured to manage virtual infrastructure of the cloud, and end-user portal and an administrative portal. A nested instance of CIAB may be deployed to one of the virtual machines, with one of the adapters of the nested instance of CIAB being connected to the end-user portal of the primary instance. An administrator of the nested instance may create his own library of virtual machine images and offer the library to the end-users of the nested CAIB instance.
Abstract: Disclosed are embodiments of systems and methods to derive a semantic network from a CMDB relationship graph which can then be queried in a natural way from a linguistic standpoint (i.e., using natural language queries). Because disclosed embodiments combine natural language queries with an inferencing engine the disclosed systems and methods automatically “connect the dots” between disparate pieces of information and can allow for a richer user experience. In general, CMDB graph relationships can be converted into semantic networks. Once a semantic network is created, queries can be phrased to leverage the inferential relationships between objects in the semantic network.
Abstract: This disclosure relates generally to the field of federated configuration management databases (CMDBs). To claim compliance with the CMDBf Standard (“the Standard”), a CMDB implementation must provide working and interoperable implementations of the interfaces defined in the Standard. To make a working implementation, certain non-obvious features are required that are not addressed by the Standard. Among these requirements are: registering management data repositories (MDRs) so that they can be federated; managing/maintaining the list of federated MDRs; querying an MDR for its Data Model; using such MDR Data Models to define mappings of one or more attributes from the MDR data model to one or more attributes of one or more of the CMDB's data models; identifying attributes and defining rules to be used when reconciliation is performed; and managing as well as storing data representative of those mappings. This disclosure addresses these and other deficiencies.
Abstract: A Method to redirect SRB routines from otherwise non-zIIP eligible processes on an IBM z/OS series mainframe to a zIIP eligible enclave is disclosed. This redirection is achieved by intercepting otherwise blocked operations and allowing them to complete processing without errors imposed by the zIIP processor configuration. After appropriately intercepting and redirecting these blocked operations more processing may be performed on the more financially cost effective zIIP processor by users of mainframe computing environments.
Abstract: Disclosed are systems and methods to provide a persistent authorized server address space (ASAS). The ASAS can host components from product suites that are not able to execute in an authorized state. To host other product's components, the ASAS receives “messages” from the unauthorized product components in the form of a generic eXtensible Markup Language (XML) protocol. These messages may request product initialization/administration or performance of a function by the ASAS on behalf of the requesting product. Security constraints are also provided to ensure system and data integrity. Further, the ASAS is not tightly coupled to any requesting product so that flexibility of product update or update to the ASAS itself may not be unnecessarily constrained.
Type:
Grant
Filed:
April 28, 2010
Date of Patent:
January 8, 2013
Assignee:
BMC Software, Inc.
Inventors:
Chris Palmer, Michel Laviolette, Benton Thomas Porter
Abstract: A Method to redirect SRB routines from otherwise non-zIIP eligible processes on an IBM z/OS series mainframe to a zIIP eligible enclave is disclosed. This redirection is achieved by intercepting otherwise blocked operations and allowing them to complete processing without errors imposed by the zIIP processor configuration. After appropriately intercepting and redirecting these blocked operations more processing may be performed on the more financially cost effective zIIP processor by users of mainframe computing environments.
Abstract: A computer program product is tangibly embodied on a computer-readable medium and includes executable code that, when executed, is configured to cause a data processing apparatus to display multiple objects in a three dimensional (3D) representation, where the multiple objects are visual representations of real objects, and display a subset of the objects and associated metadata in a shaped lens that is movable within the 3D representation in all three axes, where the subset of the objects displayed within the shaped lens are sized larger than the objects outside of the shaped lens.
Type:
Application
Filed:
June 30, 2011
Publication date:
January 3, 2013
Applicant:
BMC SOFTWARE INC.
Inventors:
Ricky Poston, Michael Cooper, Ting He, Scott Sellers
Abstract: In one general aspect, an apparatus can include a completion identifier configured to identify, for completion processing, a large object (LOB) deleted from an auxiliary table within a DB2 database environment based on a space map record associated with the large object where the auxiliary table functions as an auxiliary space to a base table. The apparatus can also include a completion analyzer configured to identify a resource where an image of the large object is stored at a time before the deletion of the large object from the auxiliary table.
Type:
Application
Filed:
August 4, 2011
Publication date:
January 3, 2013
Applicant:
BMC SOFTWARE, INC.
Inventors:
Oscar J. Garza, Michael J. Hanus, Kenneth M. McDonald, Kenneth J. Durfee
Abstract: In one general aspect, a computer system can include instructions configured to store on a non-transitory computer-readable storage medium. The computer system can include a subgraph transformer configured to transform a plurality of subgraphs of a source graph into a plurality of transformed subgraphs, and configured to define a target graph that is a transformed version of the source graph based on the plurality of transformed subgraphs. The computer system can include a change detector configured to receive an indicator that a portion of the source graph has been changed, and a synchronization module configured to synchronize a portion of the target graph with the changed portion of the source graph.
Abstract: A computer program product is tangibly embodied on a computer-readable medium and includes executable code that, when executed, is configured to cause a data processing apparatus to display multiple objects in a single pane, where the multiple objects are visual representations of real objects and the multiple objects are dynamically sized and spaced relative to one another to fit all of the objects in the single pane. The computer program product includes executable code that, when executed, causes the data processing apparatus to display a subset of the objects and associated metadata in an examination frame. The examination frame is sized to fit within the single pane, where the subset of the objects displayed within the examination frame are sized larger than the objects outside of the examination frame.