Abstract: A method for blocking the execution of prohibited files, includes requesting execution of a file to be executed, identifying the file to be executed, comparing the identified file to be executed to a list of files that are prohibited and executing the identified file to be executed when the identified file to be executed does not match a file listed in the list of files that are prohibited.
Abstract: In one embodiment, a method includes receiving a request to perform a task using a special character. The method further includes receiving from a user an indication specifying an interpretation of the special character and storing the indication. The method further includes interpreting the special character using the indication, and performing the task using the interpreted special character.
Abstract: According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method may also include authenticating the user by the authentication server in response to a request from the user to use the one-time password. The method may further include authorizing the use of the one-time password for the transaction in response to authenticating the user by the authentication server. The method may moreover include using the one-time password in combination with an account number to settle the transaction between the user and the merchant. The method may additionally include sending a message to the authentication server originating from the merchant, wherein the message comprises the one-time password, and wherein the message requests a determination whether the one-time password is authorized for use in the transaction.
Abstract: Various embodiments include one or more of systems, methods, and software to provide a status of a logical entity between entity models in network management systems, such as for fault isolation, in an efficient manner. Some embodiments, when receiving requests for a status of a logical entity while already in the process of determining the status in response to a previously received request, include adding an identifier of the subsequent requestor to a status requestor list and not responding to or taking any further action with regard to the request from the subsequent requestor until the status in response to the first received status request is determined.
Abstract: Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify and resolve violations of system and process performance measuring metrics. Following identification of such a violation, some embodiments may identify and cause a solution to be implemented. Following implementation of a solution, the violated metrics are again applied and the results evaluated to verify resolution of the metric violation. Some embodiments may repeat this process until the metric violation or violations are resolved.
Type:
Application
Filed:
April 28, 2010
Publication date:
November 3, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
Eitan Hadar, Kieron John James Connelly, Olga Lagunova, Mitchell Edward Engel, Peter Anthony Lazzaro
Abstract: Synthetic transactions for a network system are generated based on monitoring of the network system. One or more network system monitoring systems receive network system traffic, traffic monitoring data and/or application runtime data during a monitoring process. The traffic monitoring data may be derived from network system traffic and the application runtime data may be data associated with application transactions. The traffic, traffic monitoring data and application runtime data may contain information regarding the scope and frequency of the functionality tested by the actual traffic received by the network system. Synthetic transactions may be generated and transmitted to test the network system based on the scope and frequency of the functionality tested by actual traffic.
Abstract: A system includes a receiving module to receive a purchase inquiry for a cloud computing service from a consumer in a first currency. A pricing module is used to price-out the cloud computing service from a provider where the cloud computing service is provided in a second currency. A reconciliation module reconciles the purchase of the cloud computing service in the consumer's geographical location and currency with the provider's location and currency.
Abstract: A system, in a cloud computing environment (“CCE”) includes a data processor. One or more cloud computing auditing components are configured to monitor the CCE in accordance with a predefined insurance level agreement (“ILA”) and to create a log of one or more CCE events indicated by the ILA. A neutral data warehouse is configured to store the log. A reporting module generates one or more reports for a party indicated by the ILA from the log in the neutral data warehouse in accordance with the ILA.
Abstract: Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify, use, or share patterns and anti-patterns. Embodiments that include pattern and anti-pattern identification operate to identify candidate patterns and anti-patterns within a deployed system and to confirm or receive confirmation that the identified candidates are indeed patterns or anti-patterns. Embodiments that use patterns and anti-patterns operate to consume the identified patterns and anti-patterns to improve system performance. The embodiments that share patterns and anti-patterns include mechanisms whereby patterns and anti-patterns can be sent to and received from other systems.
Type:
Application
Filed:
April 26, 2010
Publication date:
October 27, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
Eitan Hadar, Kieron John James Connelly, Olga Lagunova, Peter Anthony Lazzaro
Abstract: This disclosure provides a system and method for normalizing job properties. In one embodiment, a job manager is operable to identify a property of a job, with the job being associated with an operating environment. The job manager is further operable to normalize the property of the job and present the normalized property of the job to a user.
Type:
Application
Filed:
July 8, 2011
Publication date:
October 27, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
An V. Ly, Arun Padmanabhan, Edward F. Chen
Abstract: A flexible, platform-independent integration infrastructure is provided. The integration infrastructure may include an integration bridge and at least one plug-in, where the at least one plug-in may include translation rules, mapping rules, and other information associated with a component coupled to the plug-in. The translation rules, mapping rules, and other information may be used by the integration bridge during a mapping process to control communication between components. Based on the rules and information, a mapping translator of the integration bridge converts data received from component into a form readable by another component.
Type:
Application
Filed:
June 24, 2011
Publication date:
October 20, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
Dushan Fernando, Anthony Candappa, Koustubh Pawar, Nitin Maheshwari
Abstract: A method for combating malicious programs including monitoring network traffic from one or more devices, analyzing the network traffic to determine the presence of a malicious program in the one or more devices and disabling transmission of the network traffic for those of the one or more devices determined to have the malicious program present.
Abstract: A system for managing electronic information in a distributed system includes a shared central database for which a plurality of servers transmits data for storage. The shared central database is configured to store central schema information used for accessing the one or more data stores of the central database. Local databases each reference at least a portion of the central schema information for accessing the central database. Upon receiving a request for information, a local database directs the request to the central database based on the referenced schema information. The central database processes the request and transmits the data to the local database from which data was requested.
Type:
Application
Filed:
April 9, 2010
Publication date:
October 13, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
Will C. Lauer, David J. Soares, Benjamin J. Tracy
Abstract: A database system for storing information technology (IT) management operational data and a method and apparatus for managing IT data are provided. The database utilizes an integrated database schema. IT operational data is stored into the database using the integrated database schema and the database is accessed by plural applications and/or products using the integrated database schema.
Abstract: An energy efficient scheduling system and method is disclosed. In some embodiments, a method includes receiving, with a processor, a request for execution of an application. The method also includes receiving, based on the request, a scheduling policy. Additionally, the method includes for each of a plurality of datacenters, determining one or more datacenter attributes associated with each respective datacenter. The method also includes selecting one of the plurality of datacenters to execute the application based, at least in part, on the request, the scheduling policy, and the datacenter attributes and executing the application at the selected datacenter.
Type:
Application
Filed:
April 1, 2010
Publication date:
October 6, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
Kiran Prakash Diwakar, Rahul Golash, Stephen B. Boston
Abstract: In certain embodiments, facilitating software acquisition includes accessing a memory storing software programs. A selected software program is identified. One or more product requirements of the selected software program and one or more target parameters of a target environment for the selected software program are determined. One or more commands to install the selected software program at the target environment according to the product requirements and the target parameters are determined.
Type:
Application
Filed:
March 31, 2010
Publication date:
October 6, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
Scott A. Fagen, Petr Plavjanik, Lubomir Slivka
Abstract: In a system for managing data, voice, application and video networks and associated systems and services that comprise multiple, interconnected network technologies, a management system suited for a particular networking technology manages each separate technology domain. Multiple management systems thus manage multiple domains with respect to fault, configuration, accounting, performance, and security management. The management systems that manage the individual networking technology domains are then themselves managed by a higher-level system, called an inter-domain management system, which performs cross-domain management. The individual management systems of the invention collect data from their respective technology domains and provide it to an intra-domain data collection function.
Abstract: Programmatic root cause analysis of application performance problems is provided in accordance with various embodiments. Transactions having multiple components can be monitored to determine if they are exceeding a threshold for their execution time. Monitoring the transactions can include instrumenting one or more applications to gather component level information. For transactions exceeding a threshold, the data collected for the individual components can be analyzed to automatically diagnose the potential cause of the performance problem. Time-series analytical techniques are employed to determine normal values for transaction and component execution times. The values can be dynamic or static. Deviations from these normal values can be detected and reported as a possible cause. Other filters in addition to or in place of execution times for transactions and components can also be used.
Abstract: A system and method for high-performance profiling of web-enabled application events are provided. In one embodiment, the method includes registering a profiler as a provider to an event tracer. Information associated with an event is captured using the profiler, the event is associated with a web-enabled application. A function token is associated with the captured information, which is communicated to the event tracer.
Abstract: A suite of network-based services, such as the services corresponding to Microsoft® SharePoint™, are provided to users with high availability. The suite of network-based services may include browser-based collaboration functions, process management functions, index and search functions, document-management functions, and/or other functions. In particular, the indexing service associated with the suite of network-based services may be provided with high availability.
Type:
Application
Filed:
March 23, 2010
Publication date:
September 29, 2011
Applicant:
Computer Associates Think, Inc.
Inventors:
Hailin PENG, Zhenghua XU, Xiaowei YUAN, Dongzhu SHI