Patents Assigned to Computer Associated Think, Inc.
  • Publication number: 20100211815
    Abstract: A system and method for modifying execution scripts associated with a job scheduler may include monitoring for the execution of a task to determine when the task has failed. Details of the failed task may be identified and used to attempt recovery from the task failure. After initiating any recovery tasks, execution of the recovery tasks may be monitored, and one or more supplementary recovery tasks may be identified and executed, or the original task may be rerun at an appropriate execution point based on the initial point of failure. Thus, when a task has failed, an iterative process may begin where various effects of the failed task are attempted to be rolled back, and depending on the success of the rollback, the initial task can be rerun at the point of failure, or further recovery tasks may be executed.
    Type: Application
    Filed: January 11, 2010
    Publication date: August 19, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Serguei Mankovskii, Colin Banger, Jody Steele, Tomas Gray
  • Patent number: 7778985
    Abstract: A database management system managing one or more databases to suspend access to at least one selected database by one or more processes or applications (e.g., message processing programs, batch messaging programs, etc.). In some instances, the one or more databases may include one or more IMS databases. Access to the at least one selected database may be suspended to enable one or more operations to be performed on the at least one selected database by the database management system and/or an outside entity (e.g., a user, an external application, etc.). For example, the one or more operations may include an imaging operation, a loading operation, an unloading operation, a start operation, a stop operation, and/or other operations. In some instances, access to the at least one selected database may be suspended without canceling transactions being executed by the one or more processes or applications on the selected at least one database.
    Type: Grant
    Filed: December 8, 2006
    Date of Patent: August 17, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Johann E. Scholtz
  • Patent number: 7779057
    Abstract: Method and system for retrieving and sorting data entries in a directory is provided. A unique predetermined identifier is stored in a directory. The unique predetermined identifier is assigned as a relative distinguished name (RDN) for at least two entries, where the unique predetermined identifier is monotonically increased for each entry.
    Type: Grant
    Filed: July 9, 2004
    Date of Patent: August 17, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Christopher Betts, Tony Rogers
  • Patent number: 7777743
    Abstract: A method for hierarchical visualization of multi-dimensional data is provided. A first dimension-reduction process is applied to a multi-dimensional data set to obtain a first visualization. A subset of the multi-dimensional data set associated with a selected region of the dimension-reduced first visualization is selected. A second dimension-reduction process is applied to the selected subset of the multi-dimensional data set to obtain at least one additional visualization.
    Type: Grant
    Filed: March 28, 2003
    Date of Patent: August 17, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Yoh-Han Pao, Zhuo Meng, Baofu Duan
  • Patent number: 7769847
    Abstract: In a system for managing data, voice, application and video networks and associated systems and services that comprise multiple, interconnected network technologies, a management system suited for a particular networking technology manages each separate technology domain. Multiple management systems thus manage multiple domains with respect to fault, configuration, accounting, performance, and security management. The management systems that manage the individual networking technology domains are then themselves managed by a higher-level system, called an inter-domain management system, which performs cross-domain management. The individual management systems of the invention collect data from their respective technology domains and provide it to an intra-domain data collection function.
    Type: Grant
    Filed: July 13, 2001
    Date of Patent: August 3, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Lundy M. Lewis
  • Patent number: 7770223
    Abstract: In one embodiment of a method and apparatus for protecting data, voice, and video networks from individuals with malicious intent, a real network or network device has a vicarious simulated counterpart that may take the place of the real device or network upon appropriate triggering. The simulated counterpart behaves like the real device, but records the suspect transactions. The integrity of the real network or device is therefore continuously maintained because the suspect is isolated from the real network and the suspect transactions are not passed on to the actual device or network. The recorded transactions may then be analyzed for purposes of exposing the perpetrator, discovering perpetrator behavior patterns, and identifying device or network security weaknesses.
    Type: Grant
    Filed: April 12, 2002
    Date of Patent: August 3, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Michael P. Shevenell, Lundy M. Lewis, Richard W. Graham
  • Publication number: 20100191868
    Abstract: According to one embodiment of the present disclosure, a method for migrating data from a storage device includes accessing data on a storage device. The method also includes providing at least one interface that allows for selecting a first operating system stored on the storage device. The interface further allows for selecting one or more settings stored on the storage device. The method further includes initiating a migration of the one or more settings from the storage device. The method further includes storing the one or more settings.
    Type: Application
    Filed: January 29, 2009
    Publication date: July 29, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Shivesh Kumar Pappu, Santosh Kumar Gupta, Laural S. Gentry, Nishant S. Thorat, Arvind Raghavendran
  • Publication number: 20100191881
    Abstract: A method for reserving and provisioning IT resources comprises receiving, from a user, a request to reserve a desired configuration of IT resources. The desired configuration comprises one or more desired technical specifications and a desired reservation time having a start time and an end time. The method further comprises accessing an IT resource database to determine one or more of a plurality of resource pools that the user has access to. The one or more resource pools are consulted to determine if one or more IT resources matching the desired configuration are available. If the one or more IT resources matching the desired configuration are available, the one or more IT resources are reserved for the user and provided to the user at the start time.
    Type: Application
    Filed: January 23, 2009
    Publication date: July 29, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Marcin P. Tauter, Christine Teresa Munson, Lin Shi, Bin Zhao, Peter A. Cryer, George D. Watt, Vasken Torossian
  • Patent number: 7765247
    Abstract: A system and method of deleting rows from a database directory table is provided. In one aspect, candidate rows to delete from a database directory table are identified. An image copy of the database directory table is created and the candidate rows are updated for deletion in the image copy. A recover module or utility recovers the database directory table from the updated image copy.
    Type: Grant
    Filed: August 5, 2004
    Date of Patent: July 27, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: John C. Tucker
  • Patent number: 7765557
    Abstract: A system for analyzing business events is provided. The system includes a reactive event processing module, a proactive event processing module and a predictive event processing module. The reactive, proactive and predictive processing modules are each operative to receive and initiate an process associated with a respective type of business event. The system further includes an event delivery module. The event delivery module is operative to deliver the business events to the reactive event processing module, the proactive event processing module and the predictive event processing module.
    Type: Grant
    Filed: July 5, 2002
    Date of Patent: July 27, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Alan Young
  • Patent number: 7765523
    Abstract: A method for generating a web-enabled graphical user interface plug-in includes loading a resource script file for a windowed software application. At least one GUI plug-in is automatically generated based, at least in part, on the resource script file. Each GUI plug-in is operable to present at least a portion of the software application in a web-enabled format.
    Type: Grant
    Filed: July 9, 2004
    Date of Patent: July 27, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Darrell Kooy
  • Patent number: 7761842
    Abstract: In certain embodiments, a method for generating a graphical user interface (GUI) element comprises storing code for each of one or more types of GUI elements and receiving a request to generate a particular type of GUI element, the request comprising one or more parameters. The method further comprises accessing the code for the requested particular type of GUI element and automatically generating a GUI element package based on the code for the requested particular type of GUI element and the one or more parameters of the request.
    Type: Grant
    Filed: July 9, 2004
    Date of Patent: July 20, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Arthur Udler
  • Patent number: 7761919
    Abstract: A method for detecting malicious programs within a computer network includes monitoring at least one first packet of data communicated over the network, analyzing the at least one first packet of data to detect the presence of a malicious program, generating a signature of the at least one first packet of data when a malicious program is detected, monitoring at least one second packet of data communicated over the network and detecting evidence of the malicious program in the at least one second packet of data utilizing the generated signature.
    Type: Grant
    Filed: May 18, 2005
    Date of Patent: July 20, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Paul Gassoway
  • Patent number: 7761487
    Abstract: A near out-of-memory condition in a memory space is detected by creating softly reachable objects which are garbage collected when the memory space is becoming full. The softly reachable objects are objects that can be cleared at the discretion of the garbage collector when heap memory is running low. An agent process of an application can create soft reference objects which reference the softly reachable objects, and periodically poll the soft reference objects to determine if the softly reachable objects have been cleared. If they have been cleared, the agent reports to the application so that a graceful shutdown of the application can be initiated. A report can also be sent to a user interface or other output device. Additional information regarding the memory space can be gained by using softly reachable objects of different sizes and/or ages. Further, a wait period for the polling can be set adaptively.
    Type: Grant
    Filed: December 13, 2006
    Date of Patent: July 20, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Jyoti Kumar Bansal, David Isaiah Seidman, Mark J. Addleman
  • Patent number: 7760746
    Abstract: A method for configuring a product includes locating one or more desired nodes from one or more configuration hierarchies of configuration nodes and determining a configuration based on the one or more desired nodes from the one or more configuration hierarchies of configuration nodes.
    Type: Grant
    Filed: November 30, 2004
    Date of Patent: July 20, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Christopher Betts, Tony Rogers
  • Patent number: 7757287
    Abstract: A method and system for maintaining computer security including providing a signature file; receiving an incoming message from at least one client computer; comparing the received incoming message with the signature file to determine whether the incoming message is malicious; and blocking the incoming messages determined to be malicious from reaching a web server.
    Type: Grant
    Filed: April 19, 2004
    Date of Patent: July 13, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Paul A. Gassoway
  • Patent number: 7757235
    Abstract: A trigger support system and method for a bi-directional job broker is provided. One or more action requests, or triggers, are registered, for example, by a manager job scheduler or a broker. The one or more action requests are associated with one or more jobs scheduled to run on a client job scheduler. A broker communicates the one or more action requests to the client job scheduler. The client job scheduler takes an action based on the one or more action requests and reports the result of the action to the manager job scheduler.
    Type: Grant
    Filed: July 12, 2004
    Date of Patent: July 13, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Bradford C. Davis, Nick Minchenko
  • Patent number: 7756818
    Abstract: A system and method for recovering a database table that depends on a tablespace receives a backup copy of the tablespace and reads log records associated with the table. The system then applies the log records to the backup copy and builds new table data pages from the backup copy. Finally, the system scans the new table data pages for records of the first table and updates the table from the records.
    Type: Grant
    Filed: July 7, 1999
    Date of Patent: July 13, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Christopher F. Parker
  • Publication number: 20100174685
    Abstract: A method and system for updating an archive of a computer file to reflect changes made to the file includes selecting one of a plurality of comparison methods as a preferred comparison method. The comparison methods include a first comparison method wherein the file is compared to an archive of the file and a second comparison method wherein a first set of tokens statistically representative of the file is computed and compared to a second set of tokens statistically representative of the archive of the file. The method further includes carrying out the preferred comparison method to generate indicia of differences between the file and the archive of the file for updating the archive of the file.
    Type: Application
    Filed: March 16, 2010
    Publication date: July 8, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Karl D. Forster
  • Patent number: 7752024
    Abstract: A network management system includes a fault diagnosis engine, a topology mapper, an impact analyzer and a help desk system. The topology mapper includes a discovery module, a memory, and a presentation module. The discovery module is constructed and arranged to discover network elements in a communications network. The memory constructed and arranged to store topology data received from the discovery module. The presentation module constructed and arranged to present data related to topology of the communication network.
    Type: Grant
    Filed: October 29, 2002
    Date of Patent: July 6, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Scott Ball, Joseph Greenwald, Christopher Buia, David K. Taylor, Jonathan P. Caron, Jun He