Abstract: Apparatus and methods for automatically processing and displaying information for managing equipment or services in a network. The information is automatically inserted into a hierarchical data structure, which can then presented in a ticker display for viewing by a user. The information concerning the network equipment or services may also be used to determine the users affected by particular network failures.
Type:
Grant
Filed:
January 16, 2005
Date of Patent:
April 28, 2009
Assignee:
Computer Associates Think, Inc.
Inventors:
Gordon Andrew Booman, John Oliver Boutotte, Robert Alan Lindberg, Florent Mali, Patricia Anne Mulligan, Jaimin D. Patel, Mark W. Sylor
Abstract: A system, method and database development tool are disclosed for automatically generating the complete dependency graph for use in debugging stored code objects in a database, by using a recursive dependency tracking algorithm which takes into consideration the indirect dependencies on triggers as well as the dependencies on implementations of object oriented code objects which are represented as separate objects in the database catalog.
Abstract: A method and system presents an online reorganization of at least a portion of a database. The database includes a plurality of rows stored in a plurality of physical blocks and the rows are categorized by a plurality of reference groups. The database manager is operable to identify a target subset of physical blocks based, at least in part, on one of the reference groups and to identify a source subset of physical blocks associated with the particular reference group. The database manager is further operable to dynamically move the rows stored in a first physical block in the source subset to a second physical block in the target subset while the database is online.
Abstract: According to one embodiment, providing application information includes receiving a request for application information associated with a checkpoint. A checkpoint corresponds to an incremental backup of a sequence of incremental backups of the application information. The following is performed for each logical block of one or more logical blocks that store the application information: establish whether any incremental backup records a change for a logical block; process the request using an incremental backup if the incremental backup records a change for the logical block; and process the request using a full backup of the application information if no incremental backup records a change for the logical block.
Abstract: In one embodiment, a method for communicating messages between components in a client/server environment comprises initiating, in response to a request from an application on a server system, a process for receiving messages from one or more first components associated with a client system, the process initiated using a generalized architecture for communicating messages between components in a client/server application. The method includes registering with the process one or more second components associated with the application, receiving at the process associated with the application a message intended for a second component on the server system, the message initiated by a first component on a client system. The method includes unpacking at least a portion of the received message, determining the second component associated with the server system for which the message is intended, and initiating the second component for which the message is intended in response to the message.
Abstract: In one embodiment, a method for data management includes receiving a request for information associated with an incompatible foreign data source and the compatible native data source. In response to at least the request, technical and logical information for locating and processing the foreign data source are automatically identified. Foreign data from the foreign data source is retrieved in accordance with the technical information. Native data from the native data source is retrieved. At least a portion of the foreign data and at least a portion of the native data is merged in accordance with at least the logical information.
Abstract: Software for providing a management interface comprises a descriptor file comprising at least one type for at least one resource and further comprising at least one attribute for each type. A management component associated with one of the resources describes at least one of the types. The management component is operable to provide a management interface exposing at least one of the attributes associated with each of the one or more types describing the resource.
Abstract: A method for building a rulebase includes receiving a plurality of rulebase components. The method also includes merging the rulebase components to create a consolidated rulebase.
Type:
Application
Filed:
April 7, 2008
Publication date:
April 2, 2009
Applicant:
Computer Associates Think, Inc.
Inventors:
Peter J. Herrera, Ronald Cass, Kirk D. Wilson, It-Beng Tan
Abstract: New code is added to existing object code in order to add new functionality. For example, a call to start a profiler function can be added at the beginning of a Java method and a call to stop the profiler function can be added at the exits of the Java method. A method may have many different exits. To insure that the profiler process is stopped regardless of which exit is performed, the byte code and exception table are modified.
Abstract: The present disclosure is directed to a method and system for compressing data. In accordance with a particular embodiment of the present disclosure, at least one data string is received. The at least one data string includes characters. A token string corresponding to the at least one data string is generated. At least one repeated substring in the at least one data string is identified. A refer-back token associated with the at least one repeated substring is generated. The refer-back token indicates a position of the at least one repeated substring and a length of the at least one repeated substring.
Abstract: A method for centralizing web application interaction, the method including handling a request, using a central point of entry, from a remote application, determining a local application suitable for processing the request, and handing out the request to the, local application determined to be suitable for processing the request.
Abstract: In a method embodiment, a method includes periodically polling data sent to an output. The output is operable to render the data into a human-perceptible form. The method further includes determining if at least one partition of a first plurality of discrete partitions of the perdiodically polled data is substantially identical to a combination of respective portions of at least two partitions of a second plurality of discrete partitions of data recorded within a computer-readable storage.
Abstract: A method for discovering remote agents includes providing at least one web service. At least one remote agent may be discovered based on the at least one web service. The at least one web service may include an agent metadata service and/or an agent managed object query service running on the one or more remote agents. The agent managed object query service may provide information regarding managed objects found on one or more remote agents and the results of the discovery may be displayed to a user.
Abstract: In one embodiment, a method for monitoring performance of one or more methods and one or more database calls each associated with at least one method, includes correlating a database call generated by a method with the method that generated the database call. The method also includes monitoring one or more parameters associated with the database call and displaying to a client a first identifier of the database call, a second identifier of the method that generated the data base call, and one or more of the one or more parameters associated with the database call.
Abstract: A method and system for detecting and removing malicious code from a computer system. The method determines an operating system of the computer system, scans the computer system for malicious code based on the operating system and detects the malicious code. The method and system may also remove the malicious code from the computer system. The method may retrieve from a data file, information relating to the malicious code including at least one command for restoring the computer system to a state that existed prior to modification by the malicious code, and may execute the at least one command for restoring the computer system to substantially the same state as it existed prior to modification by the malicious code. The method scans predetermined memory locations based on the operating system.
Abstract: A method for dynamic creation of a phase Gantt chart, includes entering project management data into a repository, receiving a request from at least one client to obtain the project management data and generating the phase Gantt chart in response to the received request based on the project management data stored in the repository.
Abstract: A method for validating acquired data corresponding to a schema includes determining whether object classes of the acquired data corresponds to an object class of the schema, determining whether the acquired data conforms to a syntax of the corresponding object class of the schema, and determining whether the acquired data is executable when applied to the corresponding object class of the schema.
Abstract: A method for bandwidth control includes maintaining priority rules for IP traffic. The method further includes determining current traffic characteristics associated with at least a portion of the IP traffic. The method also includes modifying a priority level based in part on the current traffic characteristics. In one embodiment, the method includes modifying a priority level based on a priority level associated with another user, application, protocol type, or interface identifier. In accordance with another embodiment, priority levels are modified in a plurality of networks or network elements.
Abstract: A system (100) for analyzing a fault includes a fault object factory (110) constructed and arranged to receive fault data and create a fault object (112), and a fault diagnosis engine (101) constructed and arranged to perform root cause analysis of the fault object. The system may further include a fault detector (130) constructed and arranged to detect the fault data in a monitored entity, a fault repository (140) constructed and arranged to store and access the fault object; and a fault handler (150) constructed and arranged to be triggered by the fault diagnosis engine to analyze the fault object.
Type:
Grant
Filed:
May 7, 2001
Date of Patent:
March 3, 2009
Assignee:
Computer Associates Think, Inc.
Inventors:
Christopher A. Buia, Thomas S. Pantelis, David K. Taylor, Scott Ball, Nathaniel J. Rockwell
Abstract: One or more new methods are added to existing object code. The existing object code includes a first method that is capable of producing a result. New code is added to the first method. The new code provides the result to one or more of the new methods. After the modification, the result (e.g. a return value or exception) from the first method can be accessed and used by other threads, processes, systems, entities etc. that were not originally programmed to access the result or exception.