Abstract: A system and method for modifying execution scripts associated with a job scheduler may include monitoring for the execution of a task to determine when the task has failed. Details of the failed task may be identified and used to attempt recovery from the task failure. After initiating any recovery tasks, execution of the recovery tasks may be monitored, and one or more supplementary recovery tasks may be identified and executed, or the original task may be rerun at an appropriate execution point based on the initial point of failure. Thus, when a task has failed, an iterative process may begin where various effects of the failed task are attempted to be rolled back, and depending on the success of the rollback, the initial task can be rerun at the point of failure, or further recovery tasks may be executed.
Type:
Application
Filed:
January 11, 2010
Publication date:
August 19, 2010
Applicant:
Computer Associates Think, Inc.
Inventors:
Serguei Mankovskii, Colin Banger, Jody Steele, Tomas Gray
Abstract: A database management system managing one or more databases to suspend access to at least one selected database by one or more processes or applications (e.g., message processing programs, batch messaging programs, etc.). In some instances, the one or more databases may include one or more IMS databases. Access to the at least one selected database may be suspended to enable one or more operations to be performed on the at least one selected database by the database management system and/or an outside entity (e.g., a user, an external application, etc.). For example, the one or more operations may include an imaging operation, a loading operation, an unloading operation, a start operation, a stop operation, and/or other operations. In some instances, access to the at least one selected database may be suspended without canceling transactions being executed by the one or more processes or applications on the selected at least one database.
Abstract: Method and system for retrieving and sorting data entries in a directory is provided. A unique predetermined identifier is stored in a directory. The unique predetermined identifier is assigned as a relative distinguished name (RDN) for at least two entries, where the unique predetermined identifier is monotonically increased for each entry.
Abstract: A method for hierarchical visualization of multi-dimensional data is provided. A first dimension-reduction process is applied to a multi-dimensional data set to obtain a first visualization. A subset of the multi-dimensional data set associated with a selected region of the dimension-reduced first visualization is selected. A second dimension-reduction process is applied to the selected subset of the multi-dimensional data set to obtain at least one additional visualization.
Abstract: In a system for managing data, voice, application and video networks and associated systems and services that comprise multiple, interconnected network technologies, a management system suited for a particular networking technology manages each separate technology domain. Multiple management systems thus manage multiple domains with respect to fault, configuration, accounting, performance, and security management. The management systems that manage the individual networking technology domains are then themselves managed by a higher-level system, called an inter-domain management system, which performs cross-domain management. The individual management systems of the invention collect data from their respective technology domains and provide it to an intra-domain data collection function.
Abstract: In one embodiment of a method and apparatus for protecting data, voice, and video networks from individuals with malicious intent, a real network or network device has a vicarious simulated counterpart that may take the place of the real device or network upon appropriate triggering. The simulated counterpart behaves like the real device, but records the suspect transactions. The integrity of the real network or device is therefore continuously maintained because the suspect is isolated from the real network and the suspect transactions are not passed on to the actual device or network. The recorded transactions may then be analyzed for purposes of exposing the perpetrator, discovering perpetrator behavior patterns, and identifying device or network security weaknesses.
Type:
Grant
Filed:
April 12, 2002
Date of Patent:
August 3, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Michael P. Shevenell, Lundy M. Lewis, Richard W. Graham
Abstract: According to one embodiment of the present disclosure, a method for migrating data from a storage device includes accessing data on a storage device. The method also includes providing at least one interface that allows for selecting a first operating system stored on the storage device. The interface further allows for selecting one or more settings stored on the storage device. The method further includes initiating a migration of the one or more settings from the storage device. The method further includes storing the one or more settings.
Type:
Application
Filed:
January 29, 2009
Publication date:
July 29, 2010
Applicant:
Computer Associates Think, Inc.
Inventors:
Shivesh Kumar Pappu, Santosh Kumar Gupta, Laural S. Gentry, Nishant S. Thorat, Arvind Raghavendran
Abstract: A method for reserving and provisioning IT resources comprises receiving, from a user, a request to reserve a desired configuration of IT resources. The desired configuration comprises one or more desired technical specifications and a desired reservation time having a start time and an end time. The method further comprises accessing an IT resource database to determine one or more of a plurality of resource pools that the user has access to. The one or more resource pools are consulted to determine if one or more IT resources matching the desired configuration are available. If the one or more IT resources matching the desired configuration are available, the one or more IT resources are reserved for the user and provided to the user at the start time.
Type:
Application
Filed:
January 23, 2009
Publication date:
July 29, 2010
Applicant:
Computer Associates Think, Inc.
Inventors:
Marcin P. Tauter, Christine Teresa Munson, Lin Shi, Bin Zhao, Peter A. Cryer, George D. Watt, Vasken Torossian
Abstract: A system and method of deleting rows from a database directory table is provided. In one aspect, candidate rows to delete from a database directory table are identified. An image copy of the database directory table is created and the candidate rows are updated for deletion in the image copy. A recover module or utility recovers the database directory table from the updated image copy.
Abstract: A system for analyzing business events is provided. The system includes a reactive event processing module, a proactive event processing module and a predictive event processing module. The reactive, proactive and predictive processing modules are each operative to receive and initiate an process associated with a respective type of business event. The system further includes an event delivery module. The event delivery module is operative to deliver the business events to the reactive event processing module, the proactive event processing module and the predictive event processing module.
Abstract: A method for generating a web-enabled graphical user interface plug-in includes loading a resource script file for a windowed software application. At least one GUI plug-in is automatically generated based, at least in part, on the resource script file. Each GUI plug-in is operable to present at least a portion of the software application in a web-enabled format.
Abstract: In certain embodiments, a method for generating a graphical user interface (GUI) element comprises storing code for each of one or more types of GUI elements and receiving a request to generate a particular type of GUI element, the request comprising one or more parameters. The method further comprises accessing the code for the requested particular type of GUI element and automatically generating a GUI element package based on the code for the requested particular type of GUI element and the one or more parameters of the request.
Abstract: A method for detecting malicious programs within a computer network includes monitoring at least one first packet of data communicated over the network, analyzing the at least one first packet of data to detect the presence of a malicious program, generating a signature of the at least one first packet of data when a malicious program is detected, monitoring at least one second packet of data communicated over the network and detecting evidence of the malicious program in the at least one second packet of data utilizing the generated signature.
Abstract: A near out-of-memory condition in a memory space is detected by creating softly reachable objects which are garbage collected when the memory space is becoming full. The softly reachable objects are objects that can be cleared at the discretion of the garbage collector when heap memory is running low. An agent process of an application can create soft reference objects which reference the softly reachable objects, and periodically poll the soft reference objects to determine if the softly reachable objects have been cleared. If they have been cleared, the agent reports to the application so that a graceful shutdown of the application can be initiated. A report can also be sent to a user interface or other output device. Additional information regarding the memory space can be gained by using softly reachable objects of different sizes and/or ages. Further, a wait period for the polling can be set adaptively.
Type:
Grant
Filed:
December 13, 2006
Date of Patent:
July 20, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Jyoti Kumar Bansal, David Isaiah Seidman, Mark J. Addleman
Abstract: A method for configuring a product includes locating one or more desired nodes from one or more configuration hierarchies of configuration nodes and determining a configuration based on the one or more desired nodes from the one or more configuration hierarchies of configuration nodes.
Abstract: A method and system for maintaining computer security including providing a signature file; receiving an incoming message from at least one client computer; comparing the received incoming message with the signature file to determine whether the incoming message is malicious; and blocking the incoming messages determined to be malicious from reaching a web server.
Abstract: A trigger support system and method for a bi-directional job broker is provided. One or more action requests, or triggers, are registered, for example, by a manager job scheduler or a broker. The one or more action requests are associated with one or more jobs scheduled to run on a client job scheduler. A broker communicates the one or more action requests to the client job scheduler. The client job scheduler takes an action based on the one or more action requests and reports the result of the action to the manager job scheduler.
Abstract: A system and method for recovering a database table that depends on a tablespace receives a backup copy of the tablespace and reads log records associated with the table. The system then applies the log records to the backup copy and builds new table data pages from the backup copy. Finally, the system scans the new table data pages for records of the first table and updates the table from the records.
Abstract: A method and system for updating an archive of a computer file to reflect changes made to the file includes selecting one of a plurality of comparison methods as a preferred comparison method. The comparison methods include a first comparison method wherein the file is compared to an archive of the file and a second comparison method wherein a first set of tokens statistically representative of the file is computed and compared to a second set of tokens statistically representative of the archive of the file. The method further includes carrying out the preferred comparison method to generate indicia of differences between the file and the archive of the file for updating the archive of the file.
Abstract: A network management system includes a fault diagnosis engine, a topology mapper, an impact analyzer and a help desk system. The topology mapper includes a discovery module, a memory, and a presentation module. The discovery module is constructed and arranged to discover network elements in a communications network. The memory constructed and arranged to store topology data received from the discovery module. The presentation module constructed and arranged to present data related to topology of the communication network.
Type:
Grant
Filed:
October 29, 2002
Date of Patent:
July 6, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Scott Ball, Joseph Greenwald, Christopher Buia, David K. Taylor, Jonathan P. Caron, Jun He