Abstract: Data relating to execution flows running on different processes or threads at a computer system is correlated. The execution flows may represent sequences of software components that are invoked or other computer system resources that are consumed. A first execution flow fulfills a first request by transmitting a second request which initiates a second execution flow, such as at another computer system. The second request includes meta data which identifies a context of the first request, such as a URL, an agent which monitors the first execution flow, and the component in the first execution flow which initiated the second request. A manager receives information regarding the first execution flow from the first agent, and information regarding the second execution flow, along with the meta data, from a second agent, for correlating the first and second execution flows. The received information may include execution flow shape data.
Type:
Grant
Filed:
December 15, 2005
Date of Patent:
May 24, 2011
Assignee:
Computer Associates Think, Inc.
Inventors:
Gabriel J. Vanrenen, Jeffrey R. Cobb, Daryl L. Puryear
Abstract: A system and method for analyzing enterprise applications driven by business processes is provided. The method for analyzing business processes comprises the steps of obtaining process data, serializing the process data, identifying patterns in the serialized process data, creating analyzed process data based on the identified patterns, and publishing the analyzed process data. In addition, the patterns can be identified using one or more of user-defined algorithms, rules, and reference process models, and the user-defined algorithms can be plug-ins. Also, information regarding the analyzed process data can be displayed.
Abstract: A system and method for automated control of building equipment. Systems management information including, for example, key stroke information, mouse movement information, host name information and/or IP address information may be utilized to determine a location of a managed resource in a building from which the systems management information is received. Based on, the systems management information, the determined location and/or one or more policies, one or more requests to control appropriate building equipment may be triggered.
Abstract: A computer system includes a plurality of computer processor dependent nodes and a plurality of computer processor antecedent nodes. Each node includes a severity value relating to an operational state of the node. A dependent node and an antecedent node pair include a significance value relating to a criticality that the antecedent node has to its paired dependent node. The antecedent node comprises a relevance value, wherein the relevance value is a function of the severity value of the antecedent node and the significance value for the antecedent node and the dependent node. The relevance value is used to determine an impact that the antecedent node has on the paired dependent node.
Abstract: An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made.
Abstract: The present disclosure is directed to a method and system for detecting malware using a remote server. In accordance with a particular embodiment of the present disclosure a hash value for a file is generated. The hash value is transmitted to a remote server. A notification is received from the remote server indicating whether the file comprises malware. At least one operation on the file is prevented if the notification indicates the file comprises malware.
Abstract: The various embodiments herein include operate to identify, consolidate, and reduce redundant backup data storage. One embodiment includes storing data blocks and first signatures of data chunks of each stored data block, the first signature of each data chunk including a reference to a storage location of the data chunk within a stored data block, the stored data blocks including data blocks of previous and recent backup sessions. Some embodiments further include storing second signatures in a second signature repository, where the second signatures are calculated based on determined boundaries of the first signatures from previous backup sessions. At least one of the second signatures is calculated based on at least two first signatures, and in the range of 32 to 64 first signatures in some embodiments. Some embodiments may identify data chunks of the recent backup session present in the stored data blocks prior to the recent backup session.
Abstract: A system and method provide for a reception of data at a computer processor. The data relates to a dataset in a computer system. The computer processor calculates a weight for the dataset as a function of the data, and the processor executes an action on the dataset as a function of the weight. In an embodiment, the action is a backup of data on the computer system, and through recalculation of the weight over a period of time, the backup schedule, backup media, and other parameters are altered based on the changing weight for a dataset.
Abstract: A system and method for providing service level management in a web-based environment are provided. In one embodiment, the method includes intercepting a communication between a web-based environment and a client. The client is identified based, at least in part, on the communication. A web-based application is also identified based, at least in part, on the communication, with the web-based application associated with the web-based environment. The communication is processed using the identified web-based application. A real-time service level is determined for the identified client based, at least in part, on the processing of the communication by the web-based application.
Abstract: A method for building a rulebase includes receiving a plurality of rulebase components. The method also includes merging the rulebase components to create a consolidated rulebase.
Type:
Grant
Filed:
November 2, 2010
Date of Patent:
May 3, 2011
Assignee:
Computer Associates Think, Inc.
Inventors:
Peter J. Herrera, Ronald Cass, Kirk D. Wilson, It-Beng Tan
Abstract: A system and method for automatically detecting, reporting, and tracking conflicts in a change management system is provided. In particular, the system and method described herein may be used to identify potential conflicts associated with resources and schedules involved in a proposed change to an information technology infrastructure. A conflict analysis engine may analyze a change order that includes planned changes to an information technology infrastructure to identify potential conflicts associated with the change order that includes the planned changes to the information technology infrastructure. The potential conflicts may then be added to a conflicts list for the change order and a workflow may be created to manage resolving the potential conflicts. Thus, in response to resolving the potential conflicts, the planned changes may be deployed within the information technology infrastructure.
Type:
Application
Filed:
October 28, 2009
Publication date:
April 28, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
Richard Kevin Magnuson, Stephen J. Siwek, Kelvin Lam, Rashmi Rekha Sahoo, A.V.S.S.N.S. Sudhakar, David Andrew Tootill
Abstract: A system for executing applications designed to run on a single SMP computer on an easily scalable network of computers, while providing each application with computing resources, including processing power, memory and others that exceed the resources available on any single computer. A server agent program, a grid switch apparatus and a grid controller apparatus are included. Methods for creating processes and resources, and for accessing resources transparently across multiple servers are also provided.
Type:
Grant
Filed:
April 24, 2008
Date of Patent:
April 26, 2011
Assignee:
Computer Associates Think, Inc.
Inventors:
Vladimir Miloushev, Peter Nickolov, Becky L. Hester, Borislav S. Marinov
Abstract: A system and method for detecting and countering malicious code in an enterprise network are provided. A pattern recognition processor monitors local operations on a plurality of local machines connected through an enterprise network, to detect irregular local behavior patterns. An alert may be generated after an irregularity in behavior pattern on a local machine is detected. Irregular behavior alerts from a plurality of local machines are analyzed. If similar alerts are received from at least a threshold number of local machines over a corresponding period of time, one or more countermeasure operations are selected based on the analysis of the irregular behavior alerts. The selected countermeasure operations are communicated to the local machines and performed by the local machines.
Abstract: A business transformation logic engine for integrating data from a source application to a target application and method thereof are provided. The business transformation logic engine includes a receiving module for receiving data from the source application in a first predetermined format; and at least one transformation handler for transforming the received data into a second predetermined format usable by the target application. The method includes the steps of receiving an XML message including the source data; creating a message context object from the XML message; transforming the message context object using user-configured XSL entries; applying business rules to the transformed message context object; mapping source data elements of the transformed message context object to target data elements; and transforming the XSL-transformed data into a workflow request for integrating the source data to the target application.
Type:
Grant
Filed:
July 9, 2004
Date of Patent:
April 12, 2011
Assignee:
Computer Associates Think, Inc.
Inventors:
Jesus Fernandez, Catherine Elizabeth Sullivan, Kejian Qiu, Ronald Jacobson
Abstract: Methods, systems, apparatus and computer-readable media are disclosed for generating extract files. A first example method is disclosed for generating an extract file. The method includes receiving a data request and analyzing the data request to identify at least one record of at least one file containing data associated with the data request. The method also includes extracting the identified records and formatting the identified records according to a comma separated value format. The method further includes outputting an extract file containing the formatted records. Other methods, apparatus, systems and computer readable media are disclosed for generating extract files.
Type:
Grant
Filed:
July 12, 2004
Date of Patent:
April 12, 2011
Assignee:
Computer Associates Think, Inc.
Inventors:
Philippe Gauthey, Jan van Kan, Frederick H. Buckley, Peter G. McCullough
Abstract: In one embodiment, a method for communicating messages in a computing environment includes receiving a message from a client, storing the message in a persistent memory, sending the message to an intended destination until the message is received by the intended destination, and deleting the message from the persistent memory after the message is received by the intended destination.
Abstract: A system and method retrieve an image using a first computer processor, and transmit the image from the first computer processor to a second remote computer processor. The first computer processor and the second remote computer processor are coupled via a network connection. The image is received at the network connection, and the image is a lightweight operating system that is configured to be stored in and execute in a virtual memory coupled to the second remote computer processor. The second remote computer processor is not equipped with additional hardware or an agent to receive or execute the image.
Type:
Application
Filed:
October 2, 2009
Publication date:
April 7, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
Todd Thomas Albers, James Martin Shaffer, Forest Rankin Carlisle
Abstract: A system includes a plurality of remote servers deployed in a remote network, a central information management server, and a connector for routing transmissions between the plurality of remote servers and the central information management server.
Type:
Grant
Filed:
September 5, 2008
Date of Patent:
April 5, 2011
Assignee:
Computer Associates Think, Inc.
Inventors:
Christopher A. Buia, Daniel Holmes, Kyle Andrew Pause
Abstract: A method for analyzing content of multimedia files is presented. The method comprises processing messages from mail servers, determining a type of the message, executing a convert module and obtaining text content of the message when said type is audio, extracting text from the text content or the message, creating a text version of components from the text, dividing the text version into different files, and analyzing the different files. Further, the messages can be captured, sent to a pending folder, retrieved from the pending folder. Creating the text version and dividing the text version can be performed by a mail engine. Natural language processing can be performed on the files. The text can be examined for compliance and, if appropriate, marked with quarantine violations.
Abstract: An application is monitored to identify different execution paths, e.g., sequences of invoked components, which occur due to the receipt of messages by the application. Similarities between the execution paths are determined based on a distance algorithm, in one approach, and execution paths which are similar are assigned to a common group. Additionally, application runtime data such as response times is obtained for the execution paths and aggregated for the group. The messages can also be grouped based on the grouping of the execution paths. Further, a representative execution path can be determined for each execution path group for comparison to subsequent execution paths. A representative message can similarly be determined for each message group. Results can be reported which include a group identifier, representative message, representative execution path, count, and aggregated runtime data.
Type:
Grant
Filed:
December 1, 2006
Date of Patent:
March 29, 2011
Assignee:
Computer Associates Think, Inc.
Inventors:
Jyoti Kumar Bansal, David Isaiah Seidman, Mark J. Addleman