Patents Assigned to Computer Associated Think, Inc.
  • Patent number: 7249125
    Abstract: A method for automatically determining at least one modal value of non-numeric data includes selecting a data subset of a dataset, the data subset comprising at least a portion of the dataset and including at least one non-numeric value. At least one modal value is determined based on the selected data subset.
    Type: Grant
    Filed: October 9, 2003
    Date of Patent: July 24, 2007
    Assignee: Computer Associates Think, Inc.
    Inventors: Michael K. Singman-Aste, Seán Thrower
  • Publication number: 20070153023
    Abstract: A system and method for temporally anti-aliasing a display of a set of frames rendered from scene information without significantly increasing an amount of processing power used in rendering the frames. In some embodiments of the invention, a view used to render the frames from the scene information may be modulated between renderings of successive frames. This modulation of the view may temporally blend pixel colors displayed in pixels at or near color transitions in the frames by causing the pixel colors of these pixels to fluctuate between frames, thereby reducing aliasing present at these transitions as the human eye observing the display of the frames innately averages the fluctuating pixel colors.
    Type: Application
    Filed: January 4, 2006
    Publication date: July 5, 2007
    Applicant: Computer Associates Think, Inc.
    Inventor: Brett Chladny
  • Patent number: 7237138
    Abstract: A network management system (10) includes a fault diagnosis system (12) connectable to a communications network (20). The fault diagnosis system includes a fault object factory, a path determination module, and a fault diagnosis engine. The fault object factory is constructed and arranged to receive fault data and create fault objects. The path determination module is constructed to determine, in a communications network, a path related to the fault data. The fault diagnosis engine is constructed to perform, using the determined path, a fault analysis on the fault data to diagnose a fault related to the communications network. The network management may also include a help desk system (18), a topology mapper (14) or an impact analyzer (16).
    Type: Grant
    Filed: May 7, 2001
    Date of Patent: June 26, 2007
    Assignee: Computer Associates Think, Inc.
    Inventors: Joseph Greenwald, Scott Ball, Christopher Buia, Jonathan P. Caron, David K. Taylor
  • Patent number: 7234080
    Abstract: Potential sources of memory leaks are identified by tracking the size of groups of stored items and determining based on the growth pattern of the groups whether the groups of stored items are potential sources of memory leaks. An example of a group of stored items is an instance of a Java collection. If the growth pattern of a particular group of stored items indicates that it may be the source of a memory leak, that group is reported to a user and will continue to be tracked.
    Type: Grant
    Filed: December 12, 2002
    Date of Patent: June 19, 2007
    Assignee: Computer Associates Think, Inc.
    Inventors: Lewis K. Cirne, John B. Bley, Daryl L. Puryear, David Latham
  • Patent number: 7234164
    Abstract: A method of preventing execution of malicious code included in program code executable by a computer system may include reading program code from a storage medium, identifying at least a section of malicious code in the program code, providing blocking code which prevents execution of the section of malicious code and attaching the blocking code to the malicious code so that the malicious code is prevented from being executed. The blocking code may instruct the computer system to skip over, rename or delete the section of malicious code, for example.
    Type: Grant
    Filed: December 2, 2002
    Date of Patent: June 19, 2007
    Assignee: Computer Associates Think, Inc.
    Inventor: Itshak Carmona
  • Patent number: 7234072
    Abstract: A method and system for making an application highly available within a clustered environment includes detecting a cluster on an installation node, verifying whether at least one application component can be installed on the detected cluster, installing the at least one application component on the detected cluster, modifying the at least one application component, and putting the at least one application component online.
    Type: Grant
    Filed: April 17, 2003
    Date of Patent: June 19, 2007
    Assignee: Computer Associates Think, Inc.
    Inventor: Kouros H. Esfahany
  • Patent number: 7231667
    Abstract: A computer virus detection method includes compiling a list of heuristic events and a chronological order in which they occur, comparing the list of heuristic events and the chronological order with a defined list of heuristic events occurring in a defined chronological order and determining whether a computer virus is present based on a result of the comparing.
    Type: Grant
    Filed: May 29, 2003
    Date of Patent: June 12, 2007
    Assignee: Computer Associates Think, Inc.
    Inventor: Myles Jordan
  • Publication number: 20070130366
    Abstract: A virtual host computer is presented that includes a virtualization software platform, at least one virtual machine executed by the virtualization software platform, a private network segment configured to prevent communications with at least one external computer, a public network segment configured to facilitate communications with the at least one external computer, and a virtual routing module that is executed as a virtual image by the virtualization software platform. The virtual routing module is configured to communicate with the at least one virtual machine via the private network segment, communicate with the public network segment, and execute a tunneling layer to form a private virtual network segment between the at least one virtual machine and the at least one external computer.
    Type: Application
    Filed: November 21, 2006
    Publication date: June 7, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Martin O'Connell, Anand Kameswaran
  • Patent number: 7225206
    Abstract: A method for reorganizing data is described. The method includes the steps of reading each record of a source file and writing each record to a destination file. The method also includes the step of creating a log file containing selected log records. Each log record is associated with a change to be made to the destination file. The method further includes the steps of reading each log record of the log file and processing each record of the log file, thereby effecting the associated change to the destination file. The method still further includes the step of replacing the source file with the destination file. An apparatus and article of manufacture are also disclosed for implementing the steps of the method.
    Type: Grant
    Filed: April 9, 2001
    Date of Patent: May 29, 2007
    Assignee: Computer Associates Think, Inc.
    Inventor: Amando B. Isip, Jr.
  • Publication number: 20070118632
    Abstract: A system and method are provided for efficiently evaluating directory service operations in a directory service network. The directory service network may comprise a plurality of directory servers. Each of the directory servers may maintain information about the other servers in the network. The directory servers may share information received in a directory service update using a mutual updating process. Additionally, a new directory server joining a directory service network may be initialized with the directory data stored at one or more of the other network servers.
    Type: Application
    Filed: November 9, 2005
    Publication date: May 24, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Richard Harvey, Benjamin Gardiner
  • Publication number: 20070109983
    Abstract: According to one embodiment of the invention, a method for managing access to a wireless network includes defining access criteria for a plurality of endpoint devices in the wireless network. The access criteria includes a group of access policies controlling access to specific access points in the wireless network. The group of access policies are associated with respective access points and an identifier associated with a user. The method further includes configuring at least one endpoint device of the group of endpoint devices in the wireless network with the access criteria.
    Type: Application
    Filed: August 28, 2006
    Publication date: May 17, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Rohit Shankar, Bharat Nadimpalli, Muralidhar Swarangi, Srinivas Gudipudi, Kartik Singh, Sumit Deshpande
  • Publication number: 20070112677
    Abstract: The present invention is directed to a method and system for intercepting transactions for encryption. In accordance with a particular embodiment of the present invention, an application for a storage device is monitored. A transaction for the storage device is intercepted. An encryption request within the transaction is identified. Performance of the transaction is emulated by performing the encryption request in a predetermined exit point of the application.
    Type: Application
    Filed: November 9, 2006
    Publication date: May 17, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Russell Witt, Timothy Bruce, David Helsley, Osvaldo Ridner, John Casey
  • Publication number: 20070113080
    Abstract: According to one embodiment of the invention, a method for generating an advisory message for an endpoint device includes determining a threat level for the endpoint device by identifying a connection type between the endpoint device and the wireless network. The method also includes determining a second threat level for the endpoint device by identifying a security policy of the endpoint device. The method further includes generating an advisory message for the endpoint device based on the threat levels. The advisory message indicates vulnerability of the endpoint device.
    Type: Application
    Filed: August 22, 2006
    Publication date: May 17, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Rohit Shankar, Sumit Deshpande, Ravi Pore, Srinivas Gudipudi, Abhilash Purushothaman, Yidong Zhu, Theodore Short
  • Publication number: 20070109982
    Abstract: According to one embodiment of the invention, a method for managing ad-hoc connections in a wireless network includes receiving, at an endpoint device, a connection policy from a managing device over the wireless network. The connection policy indicates network security settings for the endpoint device. The method also includes detecting at the endpoint device an ad-hoc connection. The method further includes responding to the ad-hoc connection based on the connection policy.
    Type: Application
    Filed: August 22, 2006
    Publication date: May 17, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Srinivas Gudipudi, Rohit Shankar, Abhilash Purushothaman, Ravi Pore, Sumit Deshpande, Yidong Zhu, Theodore Short, Tuna Djemil
  • Patent number: 7218252
    Abstract: A system and method for converting character sets are provided. In one embodiment, the method includes populating a conversion character array based on a character string and a conversion character string, with the character string represented in a first character set and the conversion character string comprising the character string represented in a second character set. A conversion status array is populated for the character string at least partially based on the conversion character array. A dataset is then selected and the dataset is represented in the first character set. The dataset is converted into the second character set based, at least in part, on the conversion character array and the conversion status array.
    Type: Grant
    Filed: June 4, 2004
    Date of Patent: May 15, 2007
    Assignee: Computer Associates Think, Inc.
    Inventor: Scott A. Fauque
  • Publication number: 20070106691
    Abstract: A system and method are provided for processing directory service operations. The system includes a client device communicatively coupled to one or more directory servers. Each directory server includes a communications interface, a storage mechanism, and an evaluation module. According to an exemplary embodiment, the storage mechanism is a non-persistent storage mechanism which increases read and write performance. When a directory server receives a directory service operation, it determines whether it is capable of processing the operation, and if so, processes it with respect to its non-persistent storage mechanism.
    Type: Application
    Filed: November 9, 2005
    Publication date: May 10, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Richard Harvey, Benjamin Gardiner
  • Publication number: 20070106815
    Abstract: A system and method are provided for routing directory service operations in a directory service network. A router may be included in a directory service network. The router may include a server knowledge list that maintains information about one or more directory servers in the directory service network. Directory service operations may be received by the router and may be routed to an appropriate directory server based on availability one or more of the directory servers.
    Type: Application
    Filed: November 9, 2005
    Publication date: May 10, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Richard Harvey, Ronald Ramsay
  • Patent number: 7210040
    Abstract: Methods and apparatus for detecting computer viruses that attempt to gain access to restricted computer system resources are provided. The apparatus comprises an emulator component, a monitor component and a detector component. The emulator emulates computer executable code in a subject file. The monitor component monitors emulation of the computer executable code and monitoring a memory state of the computer system for modifications caused by the emulated instructions in the computer executable code. Based on information supplied by the monitor component regarding the emulated code and any modifications of the memory state, the detector component detects an attempt by the emulated code to access one or more of the restricted computer system resources.
    Type: Grant
    Filed: July 14, 2001
    Date of Patent: April 24, 2007
    Assignee: Computer Associates Think, Inc.
    Inventor: Myles Jordan
  • Publication number: 20070078888
    Abstract: According to one embodiment of the invention, a method for managing an index arrangement for a directory includes storing a plurality of data values from the directory in an alternate evaluator. The alternate evaluator includes a processor operable to process a directory operation. The method also includes generating a first index corresponding to the plurality of data values, the first index comprising at least one page having a variable size. The method further includes storing a first value in the at least one page and a corresponding pointer to each occurrence of the respective data value stored in the alternate evaluator.
    Type: Application
    Filed: September 28, 2006
    Publication date: April 5, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Richard Harvey, Ronald Ramsay
  • Publication number: 20070078887
    Abstract: According to one embodiment of the invention, a method for creating an index arrangement for a directory includes configuring control variables. The control variables include criteria for data to be stored and indexed in an alternate evaluator. The method also includes retrieving data values from the directory in accordance with the control variables. The method further includes storing the retrieved data values. The method further includes generating an index in the alternate evaluator for the stored data values based on the control variables.
    Type: Application
    Filed: September 28, 2006
    Publication date: April 5, 2007
    Applicant: Computer Associates Think, Inc.
    Inventors: Richard Harvey, Ronald Ramsay