Patents Assigned to Computer Associated Think, Inc.
  • Publication number: 20100299275
    Abstract: A system and method for social computing distribute a message from an author to one or more subscribers as a function of the content of the message. In an embodiment, the content of a message is related to a meta-tag. In another embodiment, the author of a message is associated with a group of people which are of interest to the subscribers. In another embodiment, the transmitted messages can be based on the subject matter of content that is associated with a subscriber.
    Type: Application
    Filed: May 21, 2009
    Publication date: November 25, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Steven Greenspan
  • Patent number: 7840535
    Abstract: An approach to validating replicated data allows use of a validation procedure that may modify the data replica. The approach features suspension of updating of the data replica for data replication and enabling restoration of the data replica to a state prior to any modification of the data as a result of the validation procedure. After validation, the data replica is restored before resuming updating for data replication.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: November 23, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Dima Barboi, Leonid Shtilman
  • Patent number: 7840895
    Abstract: In one embodiment of the invention, a system for data manipulation includes a mapper module operable to receive a first data format of a source file, receive a second data format of a target file, and automatically generate a script to represent a movement of data from the source file to the target file. A server is operable to execute the script, a first interface module is coupled to the source file and is operable to load the data in accordance with the script, and a second interface module is coupled to the target file and is operable to store the data in accordance with the script.
    Type: Grant
    Filed: May 23, 2005
    Date of Patent: November 23, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Rishi Bhatia, Matthew J. Schulze, John M. Tomaszewski, Robert B. Kittredge, Davanum Srinivas
  • Patent number: 7840633
    Abstract: In one embodiment, a method for communicating messages between components in a client/server environment comprises initiating, in response to a request from an application on a server system, a process for receiving messages from one or more first components associated with a client system, the process initiated using a generalized architecture for communicating messages between components in a client/server application. The method includes registering with the process one or more second components associated with the application, receiving at the process associated with the application a message intended for a second component on the server system, the message initiated by a first component on a client system. The method includes unpacking at least a portion of the received message, determining the second component associated with the server system for which the message is intended, and initiating the second component for which the message is intended in response to the message.
    Type: Grant
    Filed: February 24, 2009
    Date of Patent: November 23, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Bruce A. DeFrang, Patrick R. Lee
  • Patent number: 7841006
    Abstract: In accordance with a particular embodiment of the present invention, a method of detecting kernel level rootkits includes requesting first information from a kernel level process, the first information including first contents. The first information is received at a user level process. The method also includes compiling second information at kernel level, the second information including second contents corresponding to an expected first contents of the first information. The first contents are compared to the second contents.
    Type: Grant
    Filed: October 5, 2005
    Date of Patent: November 23, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Paul A. Gassoway
  • Publication number: 20100293329
    Abstract: A computer system and process restores files on multiple disk drives from a plurality of backup files on a plurality of media types and at a plurality of locations. The system receives at a processor a restore command, and partitions the restore command into two or more sub-jobs. The system determines a location for each of the plurality of media types, and matches each sub-job with a different media type at a different location. The system then restores the files from each different media type at a different location to the multiple disk drives in parallel.
    Type: Application
    Filed: May 13, 2009
    Publication date: November 18, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Hao Wang
  • Patent number: 7836482
    Abstract: An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyser, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made.
    Type: Grant
    Filed: May 12, 2005
    Date of Patent: November 16, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Peter Bryan Malcolm
  • Patent number: 7832012
    Abstract: A method for detecting malicious programs, the method includes determining whether an object is suspicious, opening the suspicious object in a disposable, secure, single purpose VM (virtual machine) session and detecting indications of malicious behavior when the suspicious object is opened within the VM session.
    Type: Grant
    Filed: May 17, 2005
    Date of Patent: November 9, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: David E. Huddleston
  • Patent number: 7831614
    Abstract: A method for generating a structured query language (SQL) script based on a template includes selecting one object from a plurality of objects in a data model. At least one instruction is selected based, at least in part, on a type of the selected object and, then, an associated template string is selected based on each selected instruction. At least a portion of a SQL script is automatically generated based on the one or more selected template strings.
    Type: Grant
    Filed: July 9, 2004
    Date of Patent: November 9, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Tad A. Deffler
  • Publication number: 20100281001
    Abstract: A computerized process receives at a processor a request to restore a file to memory. One or more media types and one or more media residencies that are associated with a plurality of backups of the file are identified. Each of the media types and media residencies has a restore factor associated with it. A calculated restore factor is determined for each combination of media type and media residency using the restore factor of each media type and each media residency. A media type and a media residency are selected as a function of the calculated restore factor. The file is restored to memory using the selected media type and the selected media residency.
    Type: Application
    Filed: May 4, 2009
    Publication date: November 4, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Hao Wang
  • Publication number: 20100281210
    Abstract: According to one embodiment, a backup is searched for data to be restored from a volume. The backup comprises multiple disks. The volume is stored in one or more spans on the disks. The spans containing the data to be restored from the volume are identified as desired spans, and a current disk is searched for the desired spans. A first subset of data is read from the desired spans on the current disk. A second subset of data is recorded on an unread list. The second subset of data comprises the data to be restored from the desired spans that are not on the current disk. The remaining data is read from the remaining disks according to the unread list.
    Type: Application
    Filed: May 1, 2009
    Publication date: November 4, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Manorama Pidapa
  • Publication number: 20100281167
    Abstract: The present invention describes a system for automatically monitoring and managing Service Level Agreements on behalf of Service providers (such as Application Service providers). The system is based on a specialized SLA language that can translate complex or simple Service Level Agreements into measurable and controllable criterion. The system enables Application Service providers to set up customized Service Level Agreements with customers, and monitor, modify and control all aspects of these agreements, including billing, sales, Customer Relation Management, customer support and Quality of Service. The technology on which the present invention is based is a formula driven language that translates Service Level Agreement details into commands. As such these details can be tracked and processed to produce detailed reports and summaries.
    Type: Application
    Filed: June 8, 2010
    Publication date: November 4, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Lior Musman, Arye Barkan, Aviv Freidin, Noam Rotem, Dror Treves, Gal Baram, Sharon Wagner
  • Publication number: 20100281006
    Abstract: A database management system managing one or more databases to suspend access to at least one selected database by one or more processes or applications (e.g., message processing programs, batch messaging programs, etc.). In some instances, the one or more databases may include one or more IMS databases. Access to the at least one selected database may be suspended to enable one or more operations to be performed on the at least one selected database by the database management system and/or an outside entity (e.g., a user, an external application, etc.). For example, the one or more operations may include an imaging operation, a loading operation, an unloading operation, a start operation, a stop operation, and/or other operations. In some instances, access to the at least one selected database may be suspended without canceling transactions being executed by the one or more processes or applications on the selected at least one database.
    Type: Application
    Filed: July 14, 2010
    Publication date: November 4, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: JOHANN E. SCHOLTZ
  • Publication number: 20100281215
    Abstract: According to one embodiment, a backup is searched for data to be restored from a striped volume. The backup comprises multiple disks divided into stripes. The stripes that contain data to be restored from the striped volume are identified as desired stripes, and a current disk is searched for the desired stripes. The content of a first subset of desired stripes is read from the current disk. A second subset of desired stripes that are not on the current disk are recorded on an unread list. The remaining content is read from the remaining disks according to the unread list.
    Type: Application
    Filed: May 1, 2009
    Publication date: November 4, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Manorama Pidapa
  • Patent number: 7827524
    Abstract: A method includes receiving a modeling template, the modeling template comprising a plurality of modeling constructs and profile constructs, each profile construct generated from a modeling profile and comprising an extension of one of the modeling constructs. The method further includes parsing the modeling template into the plurality of modeling constructs and profile constructs. One or more object-oriented constructs are defined based, at least in part, on the parsed modeling constructs and profile constructs. Source code is automatically generated in an object-oriented programming language based, at least in part, on the defined object-oriented constructs. The object-oriented programming language comprises an object-oriented programming language with embedded inferencing.
    Type: Grant
    Filed: April 22, 2003
    Date of Patent: November 2, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Kirk D. Wilson, Christopher X. Condit, It-Beng Tan
  • Publication number: 20100274621
    Abstract: A method for scheduling an information technology (IT) project includes receiving a project request at an interface and determining one or more tasks associated with the project request. The method also includes identifying one or more hardware components coupled to a network operable to perform each of the one or more tasks and retrieving a schedule for each of the identified hardware components. The method further includes selecting a hardware component to perform each of the one or more tasks scheduling each of the selected hardware components to perform each of the one or more tasks.
    Type: Application
    Filed: April 28, 2009
    Publication date: October 28, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Kiran P. Diwakar, Sumeet Mathur
  • Publication number: 20100271956
    Abstract: A method for identifying disruptions using network and systems data includes receiving resource utilization information for a network component at a first time and receiving resource utilization information for the network component at a second time. The method also includes identifying a resource utilization pattern for the network component, predicting a resource utilization for the network component at a third time based on the resource utilization pattern, and determining whether the predicted resource utilization will breach a utilization threshold for the network component.
    Type: Application
    Filed: April 28, 2009
    Publication date: October 28, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Kiran P. Diwakar, Sumeet Mathur
  • Publication number: 20100275060
    Abstract: A method and system for protecting computer system state in one aspect generates signatures associated with system dump data, compares the signatures with those of the previous system dump data. Only those system dump data whose signatures are different from the previous dump are transferred for storing.
    Type: Application
    Filed: April 28, 2009
    Publication date: October 28, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Victor Liu, Jinqiang Wang, Peter Peng
  • Patent number: 7823146
    Abstract: A method and system for software installation, includes detecting a software request, identifying a caller, determining a system history of the software request based on at least one of a caller identification and the software request.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: October 26, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Luke Adam Surace
  • Patent number: 7822736
    Abstract: According to one embodiment of the invention, a method for managing an index arrangement for a directory includes storing a plurality of data values from the directory in an alternate evaluator. The alternate evaluator includes a processor operable to process a directory operation. The method also includes generating a first index corresponding to the plurality of data values, the first index comprising at least one page having a variable size. The method further includes storing a first value in the at least one page and a corresponding pointer to each occurrence of the respective data value stored in the alternate evaluator.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: October 26, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Richard H. Harvey, Ronald W. Ramsay