Abstract: Method and apparatus for service level management, wherein business processes are composed of services. A state of the service is defined by one or more service parameters, and the service parameters depend upon performance of network components that support the service, e.g., component parameters. The state of the service may depend, for example, on a collection of service parameter values for availability, reliability, security, integrity and response time. A service level agreement is a contract between a supplier and a customer that identifies services supported by a network, service parameters for the services, and service levels (e.g., acceptable levels) for each service parameter.
Abstract: A method for managing cloud computing systems includes establishing a connection between a cloud computing interface and cloud computing systems. Each of the cloud computing systems includes computing resources accessible by a proprietary interface. The cloud computing interface includes object methods that abstract the proprietary interface of each of the cloud computing systems. The method further includes receiving a request to perform an operation on one or more of the cloud computing systems. The method further includes provisioning at least one object method to implement the request.
Type:
Application
Filed:
October 20, 2009
Publication date:
May 20, 2010
Applicant:
Computer Associates Think, Inc.
Inventors:
Kouros Hodaee Esfahany, Michael Ralph Chiaramonte, Efraim Moscovich, Gregory L. Bodine
Abstract: A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Information Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources.
Type:
Application
Filed:
September 16, 2009
Publication date:
May 20, 2010
Applicant:
Computer Associates Think, Inc.
Inventors:
Ethan Hadar, Carrie E. Gates, Kouros Hodaee Esfahany, Michael Ralph Chiaramonte, Efraim Moscovich, Gregory L. Bodine
Abstract: According to one embodiment of the present invention, a method includes receiving, in near real time, data associated with a utilization of one or more objects. The method further includes comparing the data associated with the utilization of the one or more objects with one or more rules associated with the utilization of the one or more objects. The method further includes determining, in near real time, a cost associated with the utilization of the one or more objects based at least on the comparison. The method further includes providing, in near real time, an indication of the cost associated with the utilization of the one or more objects.
Abstract: An apparatus and method for processing mixed data for a selected task is provided. An input transformation module converts mixed data into converted data. A functional mapping module processes the converted data to provide a functional output for the selected task. The selected task may be one or a combination of a variety of possible tasks, including search, recall, prediction, classification, etc. For example, the selected task may be for data mining, database search, targeted marketing, computer virus detection, etc.
Type:
Grant
Filed:
April 18, 2003
Date of Patent:
May 11, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Zhuo Meng, Baofu Duan, Yoh-Han Pao, Ronald J Cass
Abstract: A method for dynamically constructing a web page is disclosed which includes receiving a uniform resource locator identifying a web page. The web page references a plurality of elements. The method also includes receiving a user identifier representing a user and evaluating each of the referenced elements based on the user identifier to identify a subset of at least one element the user is authorized to access. The method further includes determining a data conversion specification associated with the user and determining a data representation specification associated with the user. The subset of elements that the user is authorized to access is converted and presented to the user. Systems and computer-readable storage media for defining and presenting a composite web page are also disclosed.
Type:
Grant
Filed:
January 31, 2002
Date of Patent:
May 11, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Kaihu Chen, George Hong zhi Hsu, Surya Rao V. Nanduri, Manoj Thopcherneni, Mohamed Faisal Faquih, David Dwyer, Myo Min Latt
Abstract: The invention provides a system and method for tracking memory information associated with dynamically loaded kernel modules with the help of a tracking system. The tracking system defines its own kernel memory allocation functions. Whenever, a dynamic kernel module is loaded/unloaded into/from the kernel space, these newly defined functions are called in response to kernel memory allocation/de-allocation requests from the kernel module. The newly defined functions are responsible for allocating and de-allocating kernel memory, as well as, keeping track of information relating to the kernel memory allocations/de-allocations. The tracked information may be used to identify the source of kernel memory leaks.
Abstract: The present invention is directed to a method and system for management and configuration of remote agents. In accordance with one embodiment of the present invention, at least one web service is provided. At least one remote agent on a network is detected by the web service by retrieving agent metadata from network devices based on one or more detection parameters. At least one of managing and configuring the at least one remote agent is performed based on the web service.
Abstract: Methods and systems are disclosed for creating and recovering backup copies of computer data in an enterprise. An example method is disclosed for recovering computer data from a plurality sequential access devices. The method includes identifying a plurality of objects to be recovered, identifying a backup corresponding to each identified object to be recovered, and identifying a volume or multi-volume set corresponding to each backup, each backup being stored on the corresponding volume or set of volumes. The method also includes determining a number of sequential access media devices available for use. In accordance with the example method, the plurality of objects may be sorted according to the size of the volume or set of volumes corresponding to each of the identified objects. The method further includes recovering the objects in the order in which they were sorted.
Abstract: A method and system for an extensible macro language is provided. The system for providing the extensible macro language includes a parser and a macro handler for processing macro commands not previously defined in the macro language. The parser analyzes keywords in a macro language expression and recognizes one or more keywords representing macro commands that were not previously defined in the macro language. The macro handler receives the keywords in the macro expression and retrieves from a registry of keywords, an executable code or procedure associated with the keyword. The executable code is run to process the macro command represented by the keyword. The template language registry may be augmented to include any keywords and associated codes for extending the macro language.
Abstract: In one embodiment, software for remediation management is operable to automatically identify an asset in an enterprise network. One or more vulnerabilities of the identified asset is automatically identified based on comparing the identified asset to content associated with the one or more vulnerabilities. At least a portion of the content is collected from a plurality of third party content providers. Other example software for remediation management may be operable to identify one or more vulnerabilities of an asset based on comparing the asset to content associated with the one or more vulnerabilities and automatically generate remediations for the asset based on the content associated with the one or more vulnerabilities.
Type:
Application
Filed:
December 22, 2009
Publication date:
April 22, 2010
Applicant:
Computer Associates Think, Inc.
Inventors:
Darci O'Brien, John Giubileo, David C. Rankin
Abstract: A system and method for managing at least one checked out file of a source control management repository are provided. The system includes a source control repository including at least one checked out file; a database including at least one parameter associated with the at least one checked out file; and a computing device for identifying the at least one checked out file, retrieving the at least one parameter associated with the at least one checked out file, and generating a report including the at least one parameter. The report may be presented to a user via a display or formatted as an XML file to be employed in other computing applications, e.g., automated backups.
Abstract: A system and method for scheduling and managing computer applications is provided. In one embodiment, an event processor dispatches messages to run a job to an agent module residing on a local or remote node. The agent module, upon receiving the messages, spawns processes to run the job, returning status notifications of the running job to the event processor.
Abstract: A method for suppressing the generation of an event includes checking an in-kernel cache to determine if data relating to a file is within the in-kernel cache. Determining whether the file has been modified since a last time an event was generated for the file where data relating to a particular file is found to be within the in-kernel cache. Suppressing the generation of an event for the file where it is determined that the file has not been modified since the last time an event was generated for the file.
Abstract: A technique for automated discovery of relationships between components providing a service and discovery of the relationship of shared components to other services. A discovery engine determines a management address for a component experiencing a problem and retrieves a TCP connection table for the component. It then identifies TCP connections that are either active or that were recently active. For each, the destination address is added to a global connection table. After the TCP connection table has been processed in this manner, the global connection table is traversed and TCP connection tables for each listed destination address are examined recursively. At the conclusion of this recursive process, the management table contains a list of management agents in the distributed system to which the original component had a TCP connection, either directly or indirectly.
Abstract: In one embodiment, software for remediation management is operable to automatically identify an asset in an enterprise network. One or more vulnerabilities of the identified asset is automatically identified based on comparing the identified asset to content associated with the one or more vulnerabilities. At least a portion of the content is collected from a plurality of third party content providers. Other example software for remediation management may be operable to identify one or more vulnerabilities of an asset based on comparing the asset to content associated with the one or more vulnerabilities and automatically generate remediations for the asset based on the content associated with the one or more vulnerabilities.
Type:
Grant
Filed:
May 20, 2005
Date of Patent:
April 13, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Darci O'Brien, John Giubileo, David C. Rankin
Abstract: In one embodiment of the invention, a method for designing data movement from a source file to a target file includes receiving a first data format of a source file via a graphical user interface, receiving a second data format of a target file via the graphical user interface, receiving mappings from a user via the graphical user interface to represent a desired movement of data from the source file to the target file, and automatically converting the mappings into a script to represent a movement of data from the source file to the target file.
Type:
Grant
Filed:
May 23, 2005
Date of Patent:
April 13, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Rishi Bhatia, Matthew J. Schulze, John M. Tomaszewski, Robert B. Kittredge, Davanum Srinivas
Abstract: Apparatus and methods for creating a composite data source having a common data representation from disparate sources of voice data. Data transmission links are established to heterogeneous messaging data sources, requests for voice data is sent using data access protocols, the voice data is received, and a set of voice data transformation rules are selectively applied to the voice data to transform the data into a common data representation. The common data representation can also be used as a source for reporting and graphical displays to monitor the operational aspects of the sources of voice data.
Abstract: Systems and methods are provided for encrypting data without regard to applications writing the data to, or reading the data from, encrypted data storage devices. An operating system intercept detects information indicating that a file will be encrypted and, in respond, sets device-level flags indicating encryption and also establishes one or more encryption keys to be used in the encryption process. A second intercept detects an input/output event and, in response, calls an encryption application to encrypt (or decrypt) the data before it is written to (or read from) the data storage device.
Type:
Grant
Filed:
April 18, 2006
Date of Patent:
April 6, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Russell A. Witt, Timothy R. Bruce, David L. Helsley, Osvaldo A. Ridner, John M. Casey
Abstract: A method comprises storing one or more configuration items in a local data cache, wherein a user may access the one or more configuration items from the local data cache without retrieving the one or more configuration items from a configuration management database. Modifications made, by the user, to the one or more configuration items are saved in the local data cache. The one or more modified configuration items may be uploaded to the configuration management database.