Abstract: A system and method are provided for simulating computer networks. Network device simulator provides individual simulations of individual network devices, which operate independently of one another. Network simulator contains the simulated network topology and provides connection information to the network device simulators. The network simulator also allows an operator to alter the simulator topology and inject simulator conditions. A Network Management Station (NMS) manages the simulated network as if it were a real network.
Abstract: A method comprises extracting one or more document identifiers from a document currently displayed on the user's computer screen. The method further comprises searching an enterprise network, using the one or more document identifiers, for one or more related documents that are related to the document currently displayed on the user's computer screen. The one or more related documents may then be filtered, and the user may be notified of the one or more filtered related documents.
Abstract: A method of processing a database service query is provided. In one embodiment, the method includes receiving a service query, applying principles of logic to the service query to obtain a sum of terms, evaluating each term as one or more separate SQL instructions, and executing each separate SQL instruction. Preferably, the sum of terms is additionally expanded to remove NOT operators, using for example Boolean logic.
Abstract: A method discovers whether network interfaces associated with a device are capable of being channel bonded. In particular, each network interface associated with a device broadcasts a message on a network that other network interfaces can identify as having originated on the sending network interface. If a second network interface associated with the device receives a message and identifies the message as having originated on a first network interface associated with the same device, the first and second network interfaces can be channel bonded.
Abstract: A method for governance, risk, and compliance management includes, at a user interface, enabling a user to define a plurality of goals of an organization. The method further includes at the user interface, enabling the user to input a plurality of controls, each control comprising a measure implemented by the organization to achieve one or more of the plurality of goals of the organization and input linking information that links each of the plurality of controls to the one or more of the plurality of goals for which it was implemented. The method further includes at one or more processors coupled to a memory, storing the plurality of goals, the plurality of controls, and the linking information in the memory.
Abstract: A method for governance, risk, and compliance management may include at a user interface, enabling a user to define a project template including a list of related controls, one or more control templates, and a testing project configuration (“TPC”) file for each control of a plurality of controls. The user may initiate a testing project by selecting the project template. The method may further include, in response to selection of the project template, at the one or more processors, automatically generating a list of tasks to be performed to test the related controls and automatically outputting the list of tasks.
Type:
Application
Filed:
April 17, 2009
Publication date:
October 22, 2009
Applicant:
Computer Associates Think, Inc.
Inventors:
Murali Swaminathan, David Israel, Poornima T. Ramarao
Abstract: In particular embodiments, the present invention provides a system and method for governance, risk, and compliance management. For example, a method for governance, risk, and compliance management includes providing an interface for defining a control to be used to reach a goal of an organization. The control provides a procedure to be followed by the organization. The method further includes providing the interface for defining a metric for tracking a progress of the organization towards reaching the goal using the procedure. The method further includes receiving metric data from an external source. The metric data corresponds to the metric. The method further includes tracking the progress of the organization towards reaching the goal using at least the metric and the metric data. The method further includes displaying the progress of the organization towards reaching the goal.
Type:
Application
Filed:
December 18, 2008
Publication date:
October 22, 2009
Applicant:
Computer Associates Think, Inc.
Inventors:
Mark L. Moerdler, Christopher S. Boswell, Galina Datskovsky, Murali Swaminathan, Bryan R. Diebold, Ying Ding, John D. Benton, Thomas J. McHale, Michael W. Stricklen
Abstract: The present disclosure is directed to a method and system for generating a unified service model. In accordance with a particular embodiment of the present disclosure, configuration items are received. The configuration items include configuration data for at least one service. Key indicators are received. The key indicators include metrics for the performance of the service. At least one association is identified between the configuration items and the key indicators. A unified service model is generated based on the association. The unified service model includes at least a graphical representation of the service and service requirements.
Type:
Application
Filed:
April 15, 2008
Publication date:
October 15, 2009
Applicant:
Computer Associates Think, Inc.
Inventors:
Greg Goodman, Donald E. LeClair, Maurice H. Donegan, III
Abstract: A system and method for generating a business critical impact analysis report includes steps of: inserting a rank value field in each configuration item relationship type definition; inserting a rank value field in each single relationship between configuration items; determining default rank values for the rank value fields; assigning the default rank values to the single relationships and the relationship type definitions; receiving a user request to generate the business critical impact analysis report at a selected rank level of configuration items; and presenting the business critical impact analysis report to the user, displaying the configuration items and their relationships corresponding to the selected level.
Abstract: In one embodiment of a method and apparatus for predicting and preventing network attacks, data is collected from network devices during an attack. The collected data is analyzed to identify specific temporal precursors of the attack. The future network activity is then monitored for the presence of the identified temporal attack precursors. When the presence of a precursor is detected, appropriate protective action is taken. Preferably, all steps in this process occur automatically. In the preferred embodiment, the process is performed under the control of one or more network or element management systems. The possible network domain includes data, voice, and video networks and multiple, interconnected network technologies. In one embodiment, triggers responsive to the presence of the identified precursors are placed into a network or element management system.
Type:
Grant
Filed:
May 3, 2002
Date of Patent:
October 13, 2009
Assignee:
Computer Associates Think, Inc.
Inventors:
Lundy M. Lewis, Joao B. D. Cabrera, Raman K. Mehra
Abstract: A system and method for model object sharing are provided. In one embodiment, a method for model object sharing includes selecting a template object from a template model in a modeling repository. The template model was generated by a first modeling tool. A copy of the template object is generated. The copy is converted to a form compatible with a second modeling tool. The copy is then associated with the selected template object.
Abstract: A method, system, API, GUI, and computer readable media for managing object-based clusters is provided. The method provides a computer executable methodology for discovering, monitoring, and managing object-based clusters. The system provides a computer-based system for facilitating interactions with heterogeneous cluster solutions. The system includes computer components for detecting clusters and supervising detected clusters and/or components.
Abstract: A method and system for aggregating data in an enterprise network are provided. In one embodiment, a method for processing data in an enterprise network includes receiving real-time network performance data associated with a network resource. A database is updated with the real-time network performance data. The database table includes historical network performance data associated with the real-time network performance data.
Abstract: An apparatus for managing traps in a network environment is provided. The apparatus includes a trap manager and a trap daemon. The trap manager includes an interface for managing trap filters in a network management application. The trap daemon monitors for traps received by the network management application and applies the trap filters to the traps.
Abstract: Method and apparatus for service level management, wherein business processes are composed of services. A state of the service is defined by one or more service parameters, and the service parameters depend upon performance of network components that support the service, e.g., component parameters. The state of the service may depend, for example, on a collection of service parameter values for availability, reliability, security, integrity and response time. A service level agreement is a contract between a supplier and a customer that identifies services supported by a network, service parameters for the services, and service levels (e.g., acceptable levels) for each service parameter.
Abstract: According to one embodiment, a method includes providing one or more selectable criteria that each characterize a respective software license restriction. One or more selections of the one or more selectable criteria are received. A license metric is generated. The license metric corresponds to one or more selections of the one or more selectable criteria. A total number of instances of one or more software products is determined using the generated license metric.
Type:
Application
Filed:
March 27, 2008
Publication date:
October 1, 2009
Applicant:
Computer Associates Think, Inc.
Inventors:
David Disciascio, Lee B. Bash, Erika M. Caley, Nan Wu
Abstract: According to one embodiment, a method for determining license compliance includes receiving data regarding a plurality of licenses, including at least first and second licenses. The first license has a corresponding first license count that applies to a first software product. The second license has a corresponding second license count that applies to the first software product. An instance count of the first software product is determined. A determination is made regarding whether the instance count can be apportioned to the first and second licenses, such that neither the first or second license counts are exceeded.
Abstract: According to one embodiment, a method includes receiving data regarding a plurality of licenses. Each license is associated with one or more respective software products. The data is partitioned such that first and second licenses of the plurality of licenses are grouped together. The first and second licenses are each associated with at least a first software product of the one or more respective software products. A first group identification is assigned to the first and second licenses.
Abstract: The present disclosure is directed to a method and system for generating a malware sequence file. In accordance with a particular embodiment of the present disclosure, a malware sequence file is generated by identifying a common sequence among files. Identifying a common sequence among the files includes comparing at least a first file and at least a second file to identify a first output sequence. Identifying a common sequence among the files also includes comparing at least a third file and the first output sequence to identify a second output sequence.
Type:
Application
Filed:
March 14, 2008
Publication date:
September 17, 2009
Applicant:
Computer Associates Think, Inc.
Inventors:
Timothy D. Ebringer, Hamish O'Dea, Trevor Douglas Yann, Kelsey Molenkamp
Abstract: In certain embodiments, a method for synchronizing login processes in a web environment includes receiving user authentication information for a particular one of a plurality of access points, each access point operable to provide a user system that submitted the user authentication information access to one or more target items. The method includes authenticating the user authentication information to determine whether the user system associated with the user authentication information is authorized to access the one or more target items associated with the particular access point. The method includes initiating a successful login to the particular access point if it is determined that the user system associated with the user authentication information is authorized to access the one or more target items and automatically propagating the successful login to the particular access point to one or more of the other access points based at least on the successful login to the particular access point.