Patents Assigned to Computer Associated Think, Inc.
  • Publication number: 20090049000
    Abstract: According to one embodiment of the disclosure, a graphical model-driven system includes a graphical knowledge pattern system coupled to a modeler interface. The graphical knowledge pattern system has a graphical knowledge pattern library for the storage of a plurality of graphical knowledge patterns that are configured to classify information according to one or more information related criteria. The modeler interface is operable to receive a request for information from the user interface and retrieve information from one or more knowledge based systems according to one or more information related criteria of a particular graphical knowledge pattern.
    Type: Application
    Filed: August 7, 2008
    Publication date: February 19, 2009
    Applicant: Computer Associates Think, Inc.
    Inventor: Ethan Hadar
  • Patent number: 7492785
    Abstract: A method of processing data received at a local system in response to polling a remote device, wherein the local system includes a local clock, the method involving: sending a first poll to the remote device; receiving a response from the remote device to the first poll, the response to the first poll containing data and a time stamp indicating when the remote device responded to the first poll; for the data received in response to the first poll, computing a first time by using both a time that was derived from the local clock for a previous poll of the remote device and also the time stamp contained in the response to the first poll; comparing the computed first time to information that the local system stored in connection with the first poll, wherein the information that the local system stored in connection with the first poll was derived from the local clock; and determining how to process the data received in response to the first poll based on comparing the computed first time to the information that
    Type: Grant
    Filed: June 23, 2004
    Date of Patent: February 17, 2009
    Assignee: Computer Associates Think, Inc.
    Inventors: Daniel R. Seligman, David L. Shepard, Mark W. Sylor, Gordon Booman, Lawrence A. Stabile
  • Patent number: 7493562
    Abstract: A method and system for administering bridge ports for a network are provided. In one embodiment, a method for administering bridge ports for a network includes retrieving information associated with a plurality of switches, the information including at least identifiers of bridging ports of the switches and propagation statuses of the bridging ports. The information for the plurality of switches is displayed through an interactive display. The interactive display is operable to receive updates through the interactive display to at least one of the propagation statuses of at least one of the bridging ports of at least one of the switches. The at least one propagation status is changed based on the updates.
    Type: Grant
    Filed: January 15, 2004
    Date of Patent: February 17, 2009
    Assignee: Computer Associates Think, Inc.
    Inventors: Ping H. Kui, Joseph M. McAndrews, Fang Yang
  • Patent number: 7490145
    Abstract: A method of monitoring an element in a computer network including monitoring a preselected variable relating to that element; defining a threshold for the monitored preselected variable; establishing a sliding window in time; repeatedly generating a time above threshold value, the time above threshold value being a measure of an amount of time during which the monitored variable exceeded the threshold during the sliding window of time; detecting when the time above threshold value exceeds a condition window value; and in response to detecting when the time above threshold value exceeds the condition window, generating an alarm.
    Type: Grant
    Filed: June 21, 2001
    Date of Patent: February 10, 2009
    Assignee: Computer Associates Think, Inc.
    Inventors: Mark W. Sylor, George Iglesias, Jay B. Wolf, Will C. Lauer, Lawrence A. Stabile
  • Patent number: 7487188
    Abstract: In one embodiment, a Database Management System (DBMS) providing increased fault tolerance includes a first DBMS instance communicably coupled with a data store. The DBMS further includes a second DBMS instance communicably coupled with the data store, with the second DBMS instance including a shadow instance operable to monitor data processing of the first DBMS instance using a communication facility.
    Type: Grant
    Filed: July 25, 2005
    Date of Patent: February 3, 2009
    Assignee: Computer Associates Think, Inc.
    Inventors: Kenneth W. Eaton, Kevin P. Shuma, Joseph B. Lynn
  • Patent number: 7483902
    Abstract: Methods, systems, apparatus and computer-readable media are disclosed for creating and using self describing events in automation. A first exemplary method is disclosed that includes querying a plurality of managed components, receiving a response, and processing each response to select event types as triggers for steps in an automated workflow using attributes of events as arguments to workflow steps. This method further discloses the monitoring, detection, and processing of events defined in the workflow. Processing of an event includes creating a machine readable data payload containing event information including the event type, event attributes, and a grammar to which the event conforms. Using the provided grammar, components in the automated workflow can interpret the data payload and perform the actions defined in the automated workflow. Other methods, apparatus, systems and computer readable media are disclosed for presenting event information.
    Type: Grant
    Filed: July 12, 2004
    Date of Patent: January 27, 2009
    Assignee: Computer Associates Think, Inc.
    Inventors: Rohit Ghai, Edward Grinvald
  • Patent number: 7483978
    Abstract: In certain embodiments, a method for providing a unified user interface for managing a plurality of heterogeneous computing environments comprises displaying at least a portion of a framework user interface, the framework user interface comprising common functionality and a standard layout for the unified user interface. A listing of a subset of the heterogeneous computing environments may be displayed. Each of the heterogeneous computing environments may be modeled by one or more objects, each object corresponding to a particular computing environment. The method further includes, in response to an interaction request with respect to a particular computing environment, applying an appropriate plug-in, based on a mapping of the object that corresponds to the particular computing environment to the appropriate plug-in, to perform the requested interaction.
    Type: Grant
    Filed: May 15, 2006
    Date of Patent: January 27, 2009
    Assignee: Computer Associates Think, Inc.
    Inventors: Kouros H. Esfahany, William E. Boyle
  • Patent number: 7483976
    Abstract: The present invention is directed to a method and apparatus for identifying occurrences of transactions, especially in computer networks. A unique identifier, denoted “request identifier”, is associated with each service request. Accordingly, for a sequence of service requests detected, a corresponding sequence of request identifiers is generated. The request identifier sequence is compared to regular expressions that correspond to different transactions. If the request identifier sequence matches a regular expression, this sequence is deemed to represent an occurrence of that transaction.
    Type: Grant
    Filed: November 11, 2005
    Date of Patent: January 27, 2009
    Assignee: Computer Associates Think, Inc.
    Inventor: Perry R. Ross
  • Patent number: 7483868
    Abstract: Method of incrementally forming and adaptively updating a neural net model are provided. A function approximation node is incrementally added to the neural net model. Function parameters for the function approximation node are determined and function parameters of other nodes in the neural network model are updated, by using the function parameters of the other nodes prior to addition of the function approximation node to the neural network model.
    Type: Grant
    Filed: February 26, 2003
    Date of Patent: January 27, 2009
    Assignee: Computer Associates Think, Inc.
    Inventors: Zhuo Meng, Yoh-Han Pao
  • Patent number: 7478375
    Abstract: A method for concern-based processing of a directed acyclic graph (DAG) using aspect-oriented programming includes instantiating a plurality of aspects, each aspect associated with one concern for processing one or more DAGs, each DAG comprising a plurality of nodes. One of the DAGs is selected for processing and processed based on at least a portion of the instantiated aspects.
    Type: Grant
    Filed: May 21, 2004
    Date of Patent: January 13, 2009
    Assignee: Computer Associates Think, Inc.
    Inventor: Christian Kersters
  • Publication number: 20090006307
    Abstract: A method and system for collecting installed application data from a computer system. The method includes scanning a file system of the computer system to produce file system data, and scanning an installed application database of the computer system to produce installed application data. The method further includes collecting system information associated with the computer system. The method still further includes combining the file system data, the application data, and the system information to produce an output file.
    Type: Application
    Filed: June 28, 2007
    Publication date: January 1, 2009
    Applicant: Computer Associates Think, Inc.
    Inventors: Michael Wolf, Matthias Roth, Gerhard Scholand, Achim Recksiek
  • Patent number: 7469139
    Abstract: The disclosure provides a wireless manager operable to receive a request from a mobile device to wirelessly communicate with an enterprise network, with the request including information operable to dynamically identify a location of the mobile device. The wireless manager is further operable to automatically associate an access zone with the mobile device with the access zone comprising at least one logical characteristic, compare the location information to the associated access zone, and, if the location information indicates that the mobile device does not violate the access zone, authorize wireless communications with the enterprise network.
    Type: Grant
    Filed: May 24, 2005
    Date of Patent: December 23, 2008
    Assignee: Computer Associates Think, Inc.
    Inventor: Joannes G. van de Groenendaal
  • Publication number: 20080313459
    Abstract: A method for delivering an update to at least one user, including creating an electronic communication including an update and a unique signature identifying, the electronic communication as including the update and sending the electronic communication to the user.
    Type: Application
    Filed: August 20, 2008
    Publication date: December 18, 2008
    Applicant: Computer Associates Think, Inc.
    Inventor: Tony Kwan
  • Patent number: 7467375
    Abstract: A system and method for transforming a procedural program having procedural language code into an object-oriented program, comprises scanning the procedural language code and creating a map based on the scanned procedural language code, storing the scanned procedural language code as intermediate code, processing at least a segment of the procedural language code using the map, creating a first data structure using the processed segment, modifying the intermediate code based on the first data structure and generating an object-oriented program having an object class based on the modified intermediate code.
    Type: Grant
    Filed: January 13, 2003
    Date of Patent: December 16, 2008
    Assignee: Computer Associates Think, Inc.
    Inventors: David Tondreau, John Mahony
  • Publication number: 20080306711
    Abstract: Programmatic root cause analysis of application performance problems is provided in accordance with various embodiments. Transactions having multiple components can be monitored to determine if they are exceeding a threshold for their execution time. Monitoring the transactions can include instrumenting one or more applications to gather component level information. For transactions exceeding a threshold, the data collected for the individual components can be analyzed to automatically diagnose the potential cause of the performance problem. Time-series analytical techniques are employed to determine normal values for transaction and component execution times. The values can be dynamic or static. Deviations from these normal values can be detected and reported as a possible cause. Other filters in addition to or in place of execution times for transactions and components can also be used.
    Type: Application
    Filed: June 5, 2007
    Publication date: December 11, 2008
    Applicant: Computer Associates Think, Inc.
    Inventor: Jyoti Bansal
  • Publication number: 20080307525
    Abstract: A system and method is provided for evaluating security threats to an enterprise network. The relative severities of security threats are determined, based in part, on the context of each threat within the enterprise network and in relation to the operation of a business. As a result, it is possible to prioritize security threats having the greatest magnitude and also threats that are directed against the most valuable business network devices. The invention comprises a plurality of network agents operating on a plurality of network devices for generating event messages. The event messages contain security data and are forwarded to an event manager for analysis. The event manager comprises an event correlator and an asset context manager. The event correlator detects security threats from the interrelationships between the security data contained in the event messages.
    Type: Application
    Filed: June 5, 2007
    Publication date: December 11, 2008
    Applicant: Computer Associates Think, Inc.
    Inventor: Michael D. Nickle
  • Publication number: 20080301147
    Abstract: A system and method for managing zone integrity in a storage area network (SAN) is provided. A SAN fabric may be partitioned into one or more zone sets, where each zone set may include a plurality of zones. A topology of any of the zones may be modified, without compromising zone integrity, by converting the zone into a topologically dynamic zone. The zone may be converted by redefining members of the zone in terms of their respective member definitions, which may be specific attributes used to identify the members in the fabric. As such, zone integrity may be preserved when a topology of any member of the converted zone is modified.
    Type: Application
    Filed: June 4, 2007
    Publication date: December 4, 2008
    Applicant: Computer Associates Think, Inc.
    Inventor: Subrahmanya Sarma Yellapragada
  • Publication number: 20080295100
    Abstract: A system and method for diagnosing and managing resources in an information technology (IT) infrastructure is provided. The system and method may include storing information relating to a plurality of IT resources, business processes that use the IT resources, and services that support the business processes. Associations may be generated among the IT resource information, the business process information, and the service information. As such, when a change in status occurs for any of the IT resources, the business processes, or the services, the generated associations may be used to determine an impact on other IT resources, business processes, or services.
    Type: Application
    Filed: May 25, 2007
    Publication date: November 27, 2008
    Applicant: Computer Associates Think, Inc.
    Inventor: John Ainsworth
  • Publication number: 20080287056
    Abstract: A system and method for providing wireless network services using three-dimensional access zones is provided. One or more sensors may determine signal strength information, distance, or other positional information for wireless devices. An agent may provide information relating to fixed wireless reference points, and may control underlying operating systems for the reference points based on policies defined by a manager. For example, the manager may be coupled to the sensors and to the agent, and may define a three-dimensional coordinate system for a managed environment. By collecting information from the sensors and the agent, the manager may triangulate three-dimensional locations of the wireless devices, and may enforce three-dimensional access zone policies for the wireless network via the agent.
    Type: Application
    Filed: May 16, 2007
    Publication date: November 20, 2008
    Applicant: Computer Associates Think, Inc.
    Inventor: Joannes G. van de Groenendaal
  • Publication number: 20080279387
    Abstract: A method for key distribution includes steps or acts of: deprecating a first key on a server; receiving a request from a client wherein the client request includes the deprecated key; verifying the client request by using the deprecated key provided in the client request to decrypt the client request; and sending a communication to the client advising that the first key has been updated. An additional step of sending instructions to the client on obtaining the updated key may also be provided. Additionally, instructions on obtaining the updated key may be sent to the client.
    Type: Application
    Filed: May 10, 2007
    Publication date: November 13, 2008
    Applicant: Computer Associates Think, Inc.
    Inventor: Paul A. Gassoway