Patents Assigned to Computer Associated Think, Inc.
-
Publication number: 20110219200Abstract: A system includes a client machine or first server, and a second server. The first server is coupled via a network connection to the second server. The second server is configured to provide an electronic mail service. The first server includes a processor configured to receive an electronic mail message from the second server via a network browser rendered on the client machine, to apply an archive policy to the electronic mail message, and to store the electronic mail message in a computer data storage medium coupled to the first server.Type: ApplicationFiled: March 4, 2010Publication date: September 8, 2011Applicant: Computer Associates Think, Inc.Inventor: Lei Xiao
-
Patent number: 8015456Abstract: The network fault manager described herein may generate an alarm data table having various columns and rows respectively corresponding to different alarm data fields and different alarms. The alarm data table may be associated with a primary key that includes a subset of the different data fields in the multiple columns to uniquely represent the different alarms in the multiple rows. In response to removing one or more of the different alarm data fields in the subset from the primary key, the primary key may non-uniquely represent the different alarms in a plurality of the multiple rows. Thus, the alarm data table may be collapsed to combine the different alarms non-uniquely represented in the plurality of the multiple rows into one combined row uniquely representing the different alarms, whereby the collapsed alarm data table may replace the plurality of the multiple rows with the combined row.Type: GrantFiled: October 6, 2008Date of Patent: September 6, 2011Assignee: Computer Associates Think, Inc.Inventors: Lawrence A. Stabile, Mark W. Sylor, Thomas Allen LaRosa, Bradley S. Carey, David William Russo, Kevin M. Jackson, Albert Briner, Jeremiah David Small, Matthew Eric Baddeley
-
Publication number: 20110208606Abstract: A system and method for IT services e-commerce arena for cloud computing environments is disclosed. The method includes receiving, from each of a plurality of service clients, a request for processing time on a processor. The method also includes receiving, from each of a plurality of service providers, an offer for processing time on a processor operated by each respective service provider. Additionally, the method includes generating a buyer group based on information included in each respective request, wherein the buyer group comprises a selected one or more of the plurality of service clients to receive processing time on a processing resource and selecting one of the plurality of service providers to provide processing time on the processor operated by the selected service provider to the service clients in the buyer group. Further, the method includes initiating a transaction between each of the service clients in the buyer group and the selected service provider.Type: ApplicationFiled: February 19, 2010Publication date: August 25, 2011Applicant: Computer Associates Think, Inc.Inventors: Ethan Hadar, Ajei Gopal
-
Publication number: 20110208928Abstract: A method for improving performance of data container backups comprises identifying a data container on a source computer to be backed up. A snapshot image of the data container is generated, wherein the snapshot image comprises one or more partitions. Data is read simultaneously from each of the one or more partitions to a destination computer over one or more transport paths. Each of the one or more transport paths comprises one or more threads. The data read to the destination computer is backed up such that the data retains a physical block sequence of the data container.Type: ApplicationFiled: February 22, 2010Publication date: August 25, 2011Applicant: Computer Associates Think, Inc.Inventors: Anuj Chandra, Ujjwal Daga, Yellapragada Venkata Subrahmanya Sarma, Siva Sai Prasad Palagummi
-
Patent number: 8005943Abstract: Network performance is monitored using timing information retrieved from a client device, server in communication with the client, or both. Client side timing information is retrieved using performance monitoring code provided by the server. The code may be provided to the client as part of a content response. Once content in the provided content response is loaded, the code sends the timing information to the server. The server may then process the timing information to calculate response time and other time information metrics.Type: GrantFiled: November 21, 2005Date of Patent: August 23, 2011Assignee: Computer Associates Think, Inc.Inventors: Brian Zuzga, John B. Bley, Mark Jacob Addleman, Krates Ng
-
Patent number: 8006301Abstract: A method for computer security, includes intercepting an incoming communication, placing the communication into a quarantine queue, selecting a communication from the quarantine queue, determining whether the selected communication contains undesirable code, determining whether a quarantine time for the selected communication has lapsed if the selected communication does not contain undesirable code and placing the selected communication back in the quarantine queue if the quarantine time has not elapsed.Type: GrantFiled: May 17, 2005Date of Patent: August 23, 2011Assignee: Computer Associates Think, Inc.Inventor: David E. Huddleston
-
Publication number: 20110202529Abstract: This document discusses, among other things, a method for reconciliation of a configuration item with a configuration management database. Properties of the configuration item are divided into a plurality of classes. Different classes correspond to properties having a different relationship with a corresponding configuration item. At least one property of the configuration item is compared to properties of configuration items in a configuration management database. Different actions are taken with respect to the configuration item based on the class of the property being compared.Type: ApplicationFiled: February 16, 2010Publication date: August 18, 2011Applicant: Computer Associates Think, Inc.Inventor: Marvin Garold Waschke
-
Publication number: 20110202927Abstract: A system for executing applications designed to run on a single SMP computer on an easily scalable network of computers, while providing each application with computing resources, including processing power, memory and others that exceed the resources available on any single computer. A server agent program, a grid switch apparatus and a grid controller apparatus are included. Methods for creating processes and resources, and for accessing resources transparently across multiple servers are also provided.Type: ApplicationFiled: April 25, 2011Publication date: August 18, 2011Applicant: Computer Associates Think, Inc.Inventors: Vladimir Miloushev, Peter Nickolov, Becky L. Hester, Borislav S. Marinov
-
Publication number: 20110191773Abstract: A system and method for datacenter power management is disclosed. In particular embodiments, the method includes receiving, with a processor, a request for execution of an application. The method also includes for each of a plurality of datacenters, determining an amount of electricity required to execute the application at the respective datacenter. The method also includes, for each of the plurality of datacenters, determining a cost associated with executing the application at the respective datacenter based, at least in part, on the amount of electricity required to execute the application at the respective datacenter. The method further includes selecting one of the plurality of datacenters to execute the application based, at least in part, on the cost associated with executing the application at the respective datacenter and executing the application at the selected datacenter.Type: ApplicationFiled: February 1, 2010Publication date: August 4, 2011Applicant: Computer Associates Think, Inc.Inventors: Milan Pavel, Stephen B. Boston, Paul Patti, Andrew Sanchez
-
Patent number: 7991809Abstract: A system and method for managing zone integrity in a storage area network (SAN) is provided. A SAN fabric may be partitioned into one or more zone sets, where each zone set may include a plurality of zones. A topology of any of the zones may be modified, without compromising zone integrity, by converting the zone into a topologically dynamic zone. The zone may be converted by redefining members of the zone in terms of their respective member definitions, which may be specific attributes used to identify the members in the fabric. As such, zone integrity may be preserved when a topology of any member of the converted zone is modified.Type: GrantFiled: June 4, 2007Date of Patent: August 2, 2011Assignee: Computer Associates Think, Inc.Inventor: Subrahmanya Sarma Yellapragada
-
Patent number: 7991976Abstract: A method, system, and computer program manager for a computing system memory in the operation of a computing process. At least one memory segment provides memory resources for the computing process, which includes a plurality of memory objects, each of the memory objects includes an equal number of bytes and has a predetermined order that associates the address of the memory object in the memory segment to the addresses of the remainder of the plurality of memory objects. A pointer identifies a first memory object from the plurality of memory objects. The first memory object occupies a first ordered position according to the predetermined order. The process allocates the first memory objects from the memory segment during the operation of the computing process. The pointer increments to a second memory object having a second ordered position relative to the first memory object.Type: GrantFiled: June 19, 2008Date of Patent: August 2, 2011Assignee: Computer Associates Think, Inc.Inventor: David A. Jordan
-
Patent number: 7992045Abstract: Monitoring asynchronous transactions in a computing environment is disclosed. A first unique identifier is determined when a first method executes. The identifier is associated with an asynchronous transaction. A second unique identifier is determined when a second method executes. If it is determined that the first unique identifier and the second unique identifier match, then is it determined that the asynchronous transaction started with the first method and completed with the second method. In one embodiment, code that identifies a routine that has instructions for determining the first unique identifier at runtime is added to the first method, and code that identifies a routine that has instructions for determining the second unique identifier at runtime is added to the second method.Type: GrantFiled: December 2, 2008Date of Patent: August 2, 2011Assignee: Computer Associates Think, Inc.Inventors: Jyoti Kumar Bansal, Kartik Shankaranarayanan, Aditya Pandit, Haroon Rashid Ahmed, Stuart Todd Rader
-
Patent number: 7992132Abstract: A flexible, platform-independent integration infrastructure is provided. The integration infrastructure may include an integration bridge and at least one plug-in, where the at least one plug-in may include translation rules, mapping rules, and other information associated with a component coupled to the plug-in. The translation rules, mapping rules, and other information may be used by the integration bridge during a mapping process to control communication between components. Based on the rules and information, a mapping translator of the integration bridge converts data received from component into a form readable by another component.Type: GrantFiled: November 13, 2006Date of Patent: August 2, 2011Assignee: Computer Associates Think, Inc.Inventors: Dushan Fernando, Anthony Candappa, Koustubh Pawar, Nitin Maheshwari
-
Patent number: 7987495Abstract: The system and method described herein provides multi-context security policy management in a networked computing infrastructure. The system and method may generate a plurality of security contexts regarding different security characteristics of the communication between a computing device and the networked computing infrastructure. The computing device then requests access to at least one specific element of the computing infrastructure. The security policy definitions of the at least one specific element are compared with one or more of the security contexts to determine whether access to the specific elements should be granted.Type: GrantFiled: December 26, 2007Date of Patent: July 26, 2011Assignee: Computer Associates Think, Inc.Inventors: Sophia Maler, Vadim Lander, Andrew Rappaport
-
Publication number: 20110179313Abstract: A method includes receiving at a computing system empirical data related to one or more information technology entities. The method further includes receiving at the computing system one or more user experience indicators, the user experience indicators indicative of a user's experience using a computer application. The method further includes correlating by the computing system the empirical data with the one or more user experience indicators to determine a quality of service delivered to a user for a plurality of time periods. The method further includes determining by the computing system, based on the correlation, whether one or more issues with one of the one or more information technology entities are related to the quality of service delivered to the user.Type: ApplicationFiled: January 19, 2010Publication date: July 21, 2011Applicant: Computer Associates Think, Inc.Inventors: Wilson T. MacDonald, Joel D. Kaufman, Daniel L. Holmes, Kathleen A. Hickey
-
Patent number: 7984443Abstract: This disclosure provides a system and method for normalizing job properties. In one embodiment, a job manager is operable to identify a property of a job, with the job being associated with an operating environment. The job manager is further operable to normalize the property of the job and present the normalized property of the job to a user.Type: GrantFiled: July 20, 2005Date of Patent: July 19, 2011Assignee: Computer Associates Think, Inc.Inventors: An V. Ly, Arun Padmanabhan, Edward F. Chen
-
Patent number: 7984129Abstract: A system and method for high-performance profiling of web-enabled application events are provided. In one embodiment, the method includes registering a profiler as a provider to an event tracer. Information associated with an event is captured using the profiler, the event is associated with a web-enabled application. A function token is associated with the captured information, which is communicated to the event tracer.Type: GrantFiled: July 7, 2004Date of Patent: July 19, 2011Assignee: Computer Associates Think, Inc.Inventor: Jeffrey A. Vaught
-
Patent number: 7979267Abstract: A natural language tool is provided for specifying a subset of data. The data may be dynamic and have elements which are inter-related. The inter-related data is specified using a natural language expression. The natural language tool enables a user to construct a natural language expression using embedded fields. A user may configure, add and remove fields within the expression. A natural language expression contains at least two configurable fields. The fields of an expression have a tiered relationship. When a higher tiered field is changed, one or more lower tiered fields may be changed in response to the higher field change.Type: GrantFiled: January 6, 2006Date of Patent: July 12, 2011Assignee: Computer Associates Think, Inc.Inventors: Jon Ruiz, Carl Seglem, Ju-Kay Kwek
-
Patent number: 7979857Abstract: A method and an apparatus for dynamic memory resource management are provided. Memory activity information is collected for a virtual machine. Additional memory shares are dynamically allocated to the virtual machine, as needed, based on the memory activity information for the virtual machine and based on a specified priority of the virtual machine in order to properly adjust the total physical memory used by the virtual machine.Type: GrantFiled: April 25, 2005Date of Patent: July 12, 2011Assignee: Computer Associates Think, Inc.Inventors: Kouros H. Esfahany, Michael R. Chiaramonte, Karthik Narayanan
-
Patent number: 7979863Abstract: Methods and apparatuses for dynamic CPU resource management are provided. CPU related information is collected for one or more virtual machines. CPU shares and affinity of a virtual machine are dynamically changed, as needed, based on the CPU usage information for the virtual machine and based on a specified priority of the virtual machine.Type: GrantFiled: April 25, 2005Date of Patent: July 12, 2011Assignee: Computer Associates Think, Inc.Inventors: Kouros H. Esfahany, Michael R. Chiaramonte, Karthik Narayanan