Patents Assigned to Computer Associated Think, Inc.
  • Patent number: 7725570
    Abstract: Method and apparatus for service level management, wherein business processes are composed of services. A state of the service is defined by one or more service parameters, and the service parameters depend upon performance of network components that support the service, e.g., component parameters. The state of the service may depend, for example, on a collection of service parameter values for availability, reliability, security, integrity and response time. A service level agreement is a contract between a supplier and a customer that identifies services supported by a network, service parameters for the services, and service levels (e.g., acceptable levels) for each service parameter.
    Type: Grant
    Filed: May 23, 2000
    Date of Patent: May 25, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Lundy Lewis
  • Publication number: 20100125669
    Abstract: A method for managing cloud computing systems includes establishing a connection between a cloud computing interface and cloud computing systems. Each of the cloud computing systems includes computing resources accessible by a proprietary interface. The cloud computing interface includes object methods that abstract the proprietary interface of each of the cloud computing systems. The method further includes receiving a request to perform an operation on one or more of the cloud computing systems. The method further includes provisioning at least one object method to implement the request.
    Type: Application
    Filed: October 20, 2009
    Publication date: May 20, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Kouros Hodaee Esfahany, Michael Ralph Chiaramonte, Efraim Moscovich, Gregory L. Bodine
  • Publication number: 20100125664
    Abstract: A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Information Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources.
    Type: Application
    Filed: September 16, 2009
    Publication date: May 20, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Ethan Hadar, Carrie E. Gates, Kouros Hodaee Esfahany, Michael Ralph Chiaramonte, Efraim Moscovich, Gregory L. Bodine
  • Publication number: 20100125721
    Abstract: According to one embodiment of the present invention, a method includes receiving, in near real time, data associated with a utilization of one or more objects. The method further includes comparing the data associated with the utilization of the one or more objects with one or more rules associated with the utilization of the one or more objects. The method further includes determining, in near real time, a cost associated with the utilization of the one or more objects based at least on the comparison. The method further includes providing, in near real time, an indication of the cost associated with the utilization of the one or more objects.
    Type: Application
    Filed: November 2, 2009
    Publication date: May 20, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Vincent R. Re
  • Patent number: 7716148
    Abstract: An apparatus and method for processing mixed data for a selected task is provided. An input transformation module converts mixed data into converted data. A functional mapping module processes the converted data to provide a functional output for the selected task. The selected task may be one or a combination of a variety of possible tasks, including search, recall, prediction, classification, etc. For example, the selected task may be for data mining, database search, targeted marketing, computer virus detection, etc.
    Type: Grant
    Filed: April 18, 2003
    Date of Patent: May 11, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Zhuo Meng, Baofu Duan, Yoh-Han Pao, Ronald J Cass
  • Patent number: 7716591
    Abstract: A method for dynamically constructing a web page is disclosed which includes receiving a uniform resource locator identifying a web page. The web page references a plurality of elements. The method also includes receiving a user identifier representing a user and evaluating each of the referenced elements based on the user identifier to identify a subset of at least one element the user is authorized to access. The method further includes determining a data conversion specification associated with the user and determining a data representation specification associated with the user. The subset of elements that the user is authorized to access is converted and presented to the user. Systems and computer-readable storage media for defining and presenting a composite web page are also disclosed.
    Type: Grant
    Filed: January 31, 2002
    Date of Patent: May 11, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Kaihu Chen, George Hong zhi Hsu, Surya Rao V. Nanduri, Manoj Thopcherneni, Mohamed Faisal Faquih, David Dwyer, Myo Min Latt
  • Publication number: 20100115273
    Abstract: The invention provides a system and method for tracking memory information associated with dynamically loaded kernel modules with the help of a tracking system. The tracking system defines its own kernel memory allocation functions. Whenever, a dynamic kernel module is loaded/unloaded into/from the kernel space, these newly defined functions are called in response to kernel memory allocation/de-allocation requests from the kernel module. The newly defined functions are responsible for allocating and de-allocating kernel memory, as well as, keeping track of information relating to the kernel memory allocations/de-allocations. The tracked information may be used to identify the source of kernel memory leaks.
    Type: Application
    Filed: January 11, 2010
    Publication date: May 6, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Jes Kiran Chittigala
  • Patent number: 7711803
    Abstract: The present invention is directed to a method and system for management and configuration of remote agents. In accordance with one embodiment of the present invention, at least one web service is provided. At least one remote agent on a network is detected by the web service by retrieving agent metadata from network devices based on one or more detection parameters. At least one of managing and configuring the at least one remote agent is performed based on the web service.
    Type: Grant
    Filed: March 30, 2004
    Date of Patent: May 4, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Rutvik Doshi, Kartik Shankaranarayanan, Saurav Mohapatra
  • Patent number: 7711912
    Abstract: Methods and systems are disclosed for creating and recovering backup copies of computer data in an enterprise. An example method is disclosed for recovering computer data from a plurality sequential access devices. The method includes identifying a plurality of objects to be recovered, identifying a backup corresponding to each identified object to be recovered, and identifying a volume or multi-volume set corresponding to each backup, each backup being stored on the corresponding volume or set of volumes. The method also includes determining a number of sequential access media devices available for use. In accordance with the example method, the plurality of objects may be sorted according to the size of the volume or set of volumes corresponding to each of the identified objects. The method further includes recovering the objects in the order in which they were sorted.
    Type: Grant
    Filed: March 2, 2007
    Date of Patent: May 4, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: John B. Sandrock-Grabsky
  • Patent number: 7711685
    Abstract: A method and system for an extensible macro language is provided. The system for providing the extensible macro language includes a parser and a macro handler for processing macro commands not previously defined in the macro language. The parser analyzes keywords in a macro language expression and recognizes one or more keywords representing macro commands that were not previously defined in the macro language. The macro handler receives the keywords in the macro expression and retrieves from a registry of keywords, an executable code or procedure associated with the keyword. The executable code is run to process the macro command represented by the keyword. The template language registry may be augmented to include any keywords and associated codes for extending the macro language.
    Type: Grant
    Filed: October 16, 1999
    Date of Patent: May 4, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Tad A. Deffler, Eric Mintz
  • Publication number: 20100100965
    Abstract: In one embodiment, software for remediation management is operable to automatically identify an asset in an enterprise network. One or more vulnerabilities of the identified asset is automatically identified based on comparing the identified asset to content associated with the one or more vulnerabilities. At least a portion of the content is collected from a plurality of third party content providers. Other example software for remediation management may be operable to identify one or more vulnerabilities of an asset based on comparing the asset to content associated with the one or more vulnerabilities and automatically generate remediations for the asset based on the content associated with the one or more vulnerabilities.
    Type: Application
    Filed: December 22, 2009
    Publication date: April 22, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Darci O'Brien, John Giubileo, David C. Rankin
  • Patent number: 7702661
    Abstract: A system and method for managing at least one checked out file of a source control management repository are provided. The system includes a source control repository including at least one checked out file; a database including at least one parameter associated with the at least one checked out file; and a computing device for identifying the at least one checked out file, retrieving the at least one parameter associated with the at least one checked out file, and generating a report including the at least one parameter. The report may be presented to a user via a display or formatted as an XML file to be employed in other computing applications, e.g., automated backups.
    Type: Grant
    Filed: March 2, 2005
    Date of Patent: April 20, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Rishi Bhatia
  • Patent number: 7703100
    Abstract: A system and method for scheduling and managing computer applications is provided. In one embodiment, an event processor dispatches messages to run a job to an agent module residing on a local or remote node. The agent module, upon receiving the messages, spawns processes to run the job, returning status notifications of the running job to the event processor.
    Type: Grant
    Filed: July 12, 2004
    Date of Patent: April 20, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Bradford C. Davis, Nick Minchenko
  • Patent number: 7703139
    Abstract: A method for suppressing the generation of an event includes checking an in-kernel cache to determine if data relating to a file is within the in-kernel cache. Determining whether the file has been modified since a last time an event was generated for the file where data relating to a particular file is found to be within the in-kernel cache. Suppressing the generation of an event for the file where it is determined that the file has not been modified since the last time an event was generated for the file.
    Type: Grant
    Filed: May 18, 2005
    Date of Patent: April 20, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Dmitry Grebenev
  • Patent number: 7697545
    Abstract: A technique for automated discovery of relationships between components providing a service and discovery of the relationship of shared components to other services. A discovery engine determines a management address for a component experiencing a problem and retrieves a TCP connection table for the component. It then identifies TCP connections that are either active or that were recently active. For each, the destination address is added to a global connection table. After the TCP connection table has been processed in this manner, the global connection table is traversed and TCP connection tables for each listed destination address are examined recursively. At the conclusion of this recursive process, the management table contains a list of management agents in the distributed system to which the original component had a TCP connection, either directly or indirectly.
    Type: Grant
    Filed: July 14, 2005
    Date of Patent: April 13, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Patrick O'Sullivan
  • Patent number: 7698275
    Abstract: In one embodiment, software for remediation management is operable to automatically identify an asset in an enterprise network. One or more vulnerabilities of the identified asset is automatically identified based on comparing the identified asset to content associated with the one or more vulnerabilities. At least a portion of the content is collected from a plurality of third party content providers. Other example software for remediation management may be operable to identify one or more vulnerabilities of an asset based on comparing the asset to content associated with the one or more vulnerabilities and automatically generate remediations for the asset based on the content associated with the one or more vulnerabilities.
    Type: Grant
    Filed: May 20, 2005
    Date of Patent: April 13, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Darci O'Brien, John Giubileo, David C. Rankin
  • Patent number: 7698634
    Abstract: In one embodiment of the invention, a method for designing data movement from a source file to a target file includes receiving a first data format of a source file via a graphical user interface, receiving a second data format of a target file via the graphical user interface, receiving mappings from a user via the graphical user interface to represent a desired movement of data from the source file to the target file, and automatically converting the mappings into a script to represent a movement of data from the source file to the target file.
    Type: Grant
    Filed: May 23, 2005
    Date of Patent: April 13, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Rishi Bhatia, Matthew J. Schulze, John M. Tomaszewski, Robert B. Kittredge, Davanum Srinivas
  • Patent number: 7693268
    Abstract: Apparatus and methods for creating a composite data source having a common data representation from disparate sources of voice data. Data transmission links are established to heterogeneous messaging data sources, requests for voice data is sent using data access protocols, the voice data is received, and a set of voice data transformation rules are selectively applied to the voice data to transform the data into a common data representation. The common data representation can also be used as a source for reporting and graphical displays to monitor the operational aspects of the sources of voice data.
    Type: Grant
    Filed: April 1, 2005
    Date of Patent: April 6, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Joseph A. Rossi, Gaetane A. Scouras
  • Patent number: 7694134
    Abstract: Systems and methods are provided for encrypting data without regard to applications writing the data to, or reading the data from, encrypted data storage devices. An operating system intercept detects information indicating that a file will be encrypted and, in respond, sets device-level flags indicating encryption and also establishes one or more encryption keys to be used in the encryption process. A second intercept detects an input/output event and, in response, calls an encryption application to encrypt (or decrypt) the data before it is written to (or read from) the data storage device.
    Type: Grant
    Filed: April 18, 2006
    Date of Patent: April 6, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Russell A. Witt, Timothy R. Bruce, David L. Helsley, Osvaldo A. Ridner, John M. Casey
  • Publication number: 20100082701
    Abstract: A method comprises storing one or more configuration items in a local data cache, wherein a user may access the one or more configuration items from the local data cache without retrieving the one or more configuration items from a configuration management database. Modifications made, by the user, to the one or more configuration items are saved in the local data cache. The one or more modified configuration items may be uploaded to the configuration management database.
    Type: Application
    Filed: September 24, 2008
    Publication date: April 1, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Nitin Maheshwari