Abstract: A system and method for social computing distribute a message from an author to one or more subscribers as a function of the content of the message. In an embodiment, the content of a message is related to a meta-tag. In another embodiment, the author of a message is associated with a group of people which are of interest to the subscribers. In another embodiment, the transmitted messages can be based on the subject matter of content that is associated with a subscriber.
Abstract: An approach to validating replicated data allows use of a validation procedure that may modify the data replica. The approach features suspension of updating of the data replica for data replication and enabling restoration of the data replica to a state prior to any modification of the data as a result of the validation procedure. After validation, the data replica is restored before resuming updating for data replication.
Abstract: In one embodiment of the invention, a system for data manipulation includes a mapper module operable to receive a first data format of a source file, receive a second data format of a target file, and automatically generate a script to represent a movement of data from the source file to the target file. A server is operable to execute the script, a first interface module is coupled to the source file and is operable to load the data in accordance with the script, and a second interface module is coupled to the target file and is operable to store the data in accordance with the script.
Type:
Grant
Filed:
May 23, 2005
Date of Patent:
November 23, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Rishi Bhatia, Matthew J. Schulze, John M. Tomaszewski, Robert B. Kittredge, Davanum Srinivas
Abstract: In one embodiment, a method for communicating messages between components in a client/server environment comprises initiating, in response to a request from an application on a server system, a process for receiving messages from one or more first components associated with a client system, the process initiated using a generalized architecture for communicating messages between components in a client/server application. The method includes registering with the process one or more second components associated with the application, receiving at the process associated with the application a message intended for a second component on the server system, the message initiated by a first component on a client system. The method includes unpacking at least a portion of the received message, determining the second component associated with the server system for which the message is intended, and initiating the second component for which the message is intended in response to the message.
Abstract: In accordance with a particular embodiment of the present invention, a method of detecting kernel level rootkits includes requesting first information from a kernel level process, the first information including first contents. The first information is received at a user level process. The method also includes compiling second information at kernel level, the second information including second contents corresponding to an expected first contents of the first information. The first contents are compared to the second contents.
Abstract: A computer system and process restores files on multiple disk drives from a plurality of backup files on a plurality of media types and at a plurality of locations. The system receives at a processor a restore command, and partitions the restore command into two or more sub-jobs. The system determines a location for each of the plurality of media types, and matches each sub-job with a different media type at a different location. The system then restores the files from each different media type at a different location to the multiple disk drives in parallel.
Abstract: An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyser, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made.
Abstract: A method for detecting malicious programs, the method includes determining whether an object is suspicious, opening the suspicious object in a disposable, secure, single purpose VM (virtual machine) session and detecting indications of malicious behavior when the suspicious object is opened within the VM session.
Abstract: A method for generating a structured query language (SQL) script based on a template includes selecting one object from a plurality of objects in a data model. At least one instruction is selected based, at least in part, on a type of the selected object and, then, an associated template string is selected based on each selected instruction. At least a portion of a SQL script is automatically generated based on the one or more selected template strings.
Abstract: A computerized process receives at a processor a request to restore a file to memory. One or more media types and one or more media residencies that are associated with a plurality of backups of the file are identified. Each of the media types and media residencies has a restore factor associated with it. A calculated restore factor is determined for each combination of media type and media residency using the restore factor of each media type and each media residency. A media type and a media residency are selected as a function of the calculated restore factor. The file is restored to memory using the selected media type and the selected media residency.
Abstract: According to one embodiment, a backup is searched for data to be restored from a volume. The backup comprises multiple disks. The volume is stored in one or more spans on the disks. The spans containing the data to be restored from the volume are identified as desired spans, and a current disk is searched for the desired spans. A first subset of data is read from the desired spans on the current disk. A second subset of data is recorded on an unread list. The second subset of data comprises the data to be restored from the desired spans that are not on the current disk. The remaining data is read from the remaining disks according to the unread list.
Abstract: The present invention describes a system for automatically monitoring and managing Service Level Agreements on behalf of Service providers (such as Application Service providers). The system is based on a specialized SLA language that can translate complex or simple Service Level Agreements into measurable and controllable criterion. The system enables Application Service providers to set up customized Service Level Agreements with customers, and monitor, modify and control all aspects of these agreements, including billing, sales, Customer Relation Management, customer support and Quality of Service. The technology on which the present invention is based is a formula driven language that translates Service Level Agreement details into commands. As such these details can be tracked and processed to produce detailed reports and summaries.
Abstract: A database management system managing one or more databases to suspend access to at least one selected database by one or more processes or applications (e.g., message processing programs, batch messaging programs, etc.). In some instances, the one or more databases may include one or more IMS databases. Access to the at least one selected database may be suspended to enable one or more operations to be performed on the at least one selected database by the database management system and/or an outside entity (e.g., a user, an external application, etc.). For example, the one or more operations may include an imaging operation, a loading operation, an unloading operation, a start operation, a stop operation, and/or other operations. In some instances, access to the at least one selected database may be suspended without canceling transactions being executed by the one or more processes or applications on the selected at least one database.
Abstract: According to one embodiment, a backup is searched for data to be restored from a striped volume. The backup comprises multiple disks divided into stripes. The stripes that contain data to be restored from the striped volume are identified as desired stripes, and a current disk is searched for the desired stripes. The content of a first subset of desired stripes is read from the current disk. A second subset of desired stripes that are not on the current disk are recorded on an unread list. The remaining content is read from the remaining disks according to the unread list.
Abstract: A method includes receiving a modeling template, the modeling template comprising a plurality of modeling constructs and profile constructs, each profile construct generated from a modeling profile and comprising an extension of one of the modeling constructs. The method further includes parsing the modeling template into the plurality of modeling constructs and profile constructs. One or more object-oriented constructs are defined based, at least in part, on the parsed modeling constructs and profile constructs. Source code is automatically generated in an object-oriented programming language based, at least in part, on the defined object-oriented constructs. The object-oriented programming language comprises an object-oriented programming language with embedded inferencing.
Type:
Grant
Filed:
April 22, 2003
Date of Patent:
November 2, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Kirk D. Wilson, Christopher X. Condit, It-Beng Tan
Abstract: A method for scheduling an information technology (IT) project includes receiving a project request at an interface and determining one or more tasks associated with the project request. The method also includes identifying one or more hardware components coupled to a network operable to perform each of the one or more tasks and retrieving a schedule for each of the identified hardware components. The method further includes selecting a hardware component to perform each of the one or more tasks scheduling each of the selected hardware components to perform each of the one or more tasks.
Abstract: A method for identifying disruptions using network and systems data includes receiving resource utilization information for a network component at a first time and receiving resource utilization information for the network component at a second time. The method also includes identifying a resource utilization pattern for the network component, predicting a resource utilization for the network component at a third time based on the resource utilization pattern, and determining whether the predicted resource utilization will breach a utilization threshold for the network component.
Abstract: A method and system for protecting computer system state in one aspect generates signatures associated with system dump data, compares the signatures with those of the previous system dump data. Only those system dump data whose signatures are different from the previous dump are transferred for storing.
Abstract: A method and system for software installation, includes detecting a software request, identifying a caller, determining a system history of the software request based on at least one of a caller identification and the software request.
Abstract: According to one embodiment of the invention, a method for managing an index arrangement for a directory includes storing a plurality of data values from the directory in an alternate evaluator. The alternate evaluator includes a processor operable to process a directory operation. The method also includes generating a first index corresponding to the plurality of data values, the first index comprising at least one page having a variable size. The method further includes storing a first value in the at least one page and a corresponding pointer to each occurrence of the respective data value stored in the alternate evaluator.