Abstract: A method of merging a list of newly found network elements and a list of previously known network elements includes arranging the newly found network elements in a hierarchical structure, and determining one or more device matches between each network device in the list of newly found network elements and one or more network devices in the list of previously known network elements. The method further includes, for each of the one or more device matches, determining one or more network element matches between the newly found network element and the corresponding previously stored network device. The method also includes updating the previously found network device corresponding to each of the one or more device matches with the corresponding newly found network device.
Type:
Grant
Filed:
June 23, 2004
Date of Patent:
January 4, 2011
Assignee:
Computer Associates Think, Inc.
Inventors:
David L. Shepard, Bradley S. Carey, Lawrence A. Stabile
Abstract: In a system for managing data, voice, application and video networks and associated systems and services that comprise multiple, interconnected network technologies, a management system suited for a particular networking technology manages each separate technology domain. Multiple management systems thus manage multiple domains with respect to fault, configuration, accounting, performance, and security management. The management systems that manage the individual networking technology domains are then themselves managed by a higher-level system, called an inter-domain management system, which performs cross-domain management. The individual management systems of the invention collect data from their respective technology domains and provide it to an intra-domain data collection function.
Abstract: Various embodiments include one or more of systems, methods, and software for self-governance of network entity timeout periods in network management. Some embodiments include sending at least one message to a network entity, receiving a response, and measuring a period between the sending and receiving. Some such embodiments further include calculating a timeout period for the network entity as a function of the measured period between the sending and the receiving and storing the calculated timeout period for the network entity. The timeout period for the network entity is a period after the passage of which a network management system declares contact has been lost with the network entity.
Abstract: According to one embodiment, a binary code modification system includes a code modifier configured to access a binary software code. The code modifier generates a modified software code by inserting one or more executable instructions into the binary software code. The one or more executable instructions is operable to provide identity and access management (IAM) functionality or governance functionality to the modified software code.
Type:
Application
Filed:
June 30, 2009
Publication date:
December 30, 2010
Applicant:
Computer Associates Think, Inc.
Inventors:
Yakov I. Sverdlov, Milan Shah, Ramesh Natarajan, Franklin J. Russell, JR., Herbert P. Mehlhorn, Timothy G. Brown, Gregory M. Gotta, J. Matthew Gardiner
Abstract: Two or more interrelated hierarchies within a set of performance data may be integrated into a single hierarchy. The single hierarchy may be provided in a single user interface to allow a user to navigate the single hierarchy. By navigating through the single hierarchy, a user may view relationships between application elements, cumulative performance data for categories and elements, and other information. A single integrated hierarchy includes a sequence of node types. The node types for an integrated hierarchy may include categories, relationships and elements. The node types may repeat as a sequence within the hierarchy, and more than one node type may be combined into a single level of the hierarchy. Aggregated metrics such as response time may be displayed with the integrated hierarchy.
Abstract: Methods and apparatuses for supporting multiple versions of web services standards are provided. A data handler receives a data entry in a version of a web services standard older than a most current version of the web services standard. A converter converts the data entry in the older version received by the data handler to conform to the most current version of the web services standard. The data entry converted by the converter to conform to the most current version of the web services standard is stored as a data object in a repository.
Abstract: A system and method for assembling and deploying program units to application servers uses cluster deployment flow (CDF) architecture to allow users to automatically deploy to a cluster of application servers. The method in one aspect includes assembling one or more program units for deploying to a cluster of networked servers. The method also includes retrieving information related to the cluster of networked servers, generating deployment descriptors from the information, and deploying the one or more program units to the cluster using at least the deployment descriptor.
Type:
Grant
Filed:
February 20, 2004
Date of Patent:
December 28, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Sreedhara Narayanaswamy, Gerald L. Boyd
Abstract: A method of generating keys for object(s) in a Web Services arrangement, includes determining if an object has a defined first key and if the object has a defined first key, providing that defined first key for the object and if the object does not have a defined first key, providing a second key for the object.
Abstract: A method for constructing a software distribution image includes modifying zero or more to-be-compiled components of the software distribution image using pre-processing instructions to delineate modifications for inclusion or exclusion from a final compiled version of the to-be-compiled components. Modifying one or more not-to-be-compiled components of the software distribution image using pre-processing instructions to delineate modifications for inclusion or exclusion from a final ready-to-run version of the not-to-be compiled components. Preprocessing each of the zero or more to-be-compiled components to either include or exclude each of the delineated modifications of the to-be-compiled components based on desired characteristics of the software distribution image.
Abstract: In general, the techniques of this invention are directed to determining whether a component failure in a distributed computing system is genuine. In particular, embodiments of this invention analyze monitoring data from other application nodes in a distributed computing system to determine whether the component failure is genuine. If the component failure is not genuine, the embodiments may adjust a fault tolerance parameter that caused the component failure to be perceived.
Type:
Application
Filed:
August 26, 2010
Publication date:
December 23, 2010
Applicant:
Computer Associates Think, Inc.
Inventors:
Donald M. Allen, Mark W. Emeis, James D. Engquist, Jerry R. Jackson, Randall L. Murrish
Abstract: A system and method for automatically deploying a network design is provided. Design deployment may be automated by a system that receives a machine-readable network design as an input, validates design topology requirements, and automatically deploys the design over actual hardware elements without manual intervention. Thus, the system and method provided may eliminate errors and streamline network design deployment, which may be particularly useful in a network characterized by a complex design, which may be difficult and tedious to configure manually.
Abstract: An inventive indexing scheme to index phrases and sub-phrases for advanced leveraging for translation is presented. The scheme provides ways to match at various levels, and allows approximate matches. The system and method comprises an index structure comprising at least one phrasal marker and/or at least one sub-phrasal marker, the index structure performing advanced leveraging for translation by matching to previously stored index structures. The index structure can be a tree structure. The markers can contain constituent names, values, and a level number. Each marker can be obtained by parsing a target string, so that the parsing identifies the constituents and levels in the target string.
Abstract: A database management system managing one or more databases to suspend access to at least one selected database by one or more processes or applications (e.g., message processing programs, batch messaging programs, etc.). In some instances, the one or more databases may include one or more IMS databases. Access to the at least one selected database may be suspended to enable one or more operations to be performed on the at least one selected database by the database management system and/or an outside entity (e.g., a user, an external application, etc.). For example, the one or more operations may include an imaging operation, a loading operation, an unloading operation, a start operation, a stop operation, and/or other operations. In some instances, access to the at least one selected database may be suspended without canceling transactions being executed by the one or more processes or applications on the selected at least one database.
Abstract: A system and method for providing wireless network services using three-dimensional access zones is provided. One or more sensors may determine signal strength information, distance, or other positional information for wireless devices. An agent may provide information relating to fixed wireless reference points, and may control underlying operating systems for the reference points based on policies defined by a manager. For example, the manager may be coupled to the sensors and to the agent, and may define a three-dimensional coordinate system for a managed environment. By collecting information from the sensors and the agent, the manager may triangulate three-dimensional locations of the wireless devices, and may enforce three-dimensional access zone policies for the wireless network via the agent.
Abstract: A system configured to manage IT assets associated with an entity (e.g., a company, an institution, etc.), in accordance with one or more embodiments of the invention. The IT assets may include hardware assets, software assets, telecommunications assets, and/or other IT assets. The system enables substantially all of the information relevant to the individual IT assets to be organized within a single repository throughout the life cycle of the IT assets (e.g., from order to disposal). By organizing the relevant information within a single repository, automation and dynamic system interaction may be leveraged during the life cycle of a given IT asset to track and/or monitor the given IT asset with an enhanced efficiency. In some embodiments, the system may include a common database, and an asset implementation manager, an asset ownership manager, an asset process manager, a service manager in operative communication with the common database.
Abstract: A method for building a rulebase includes receiving a plurality of rulebase components. The method also includes merging the rulebase components to create a consolidated rulebase.
Type:
Grant
Filed:
April 7, 2008
Date of Patent:
December 7, 2010
Assignee:
Computer Associates Think, Inc.
Inventors:
Peter J. Herrera, Ronald Cass, Kirk D. Wilson, It-Beng Tan
Abstract: This disclosure provides a system and method for generating a .NET web control in a Windows development environment. In one embodiment, an example method for generating a .NET web control in a Windows development environment includes initializing a design engine for Windows-based graphical user interface (GUI) forms, with the design engine operable to present a plurality of Windows controls to a user and one of the plurality of Windows controls comprising a web control host. A web control host object is instantiated based on the web control host at least partially in response to a request by the user. The web control host object is operable to present a plurality of web controls through the design engine. At least partially in response to a selection by the user of one of the web controls, a web control object is created via the web control host object. A Windows-based GUI form is generated using the design engine, with the GUI form comprising at least the web control object.
Abstract: In accordance with one embodiment of the present disclosure, a system for caching network traffic includes an interface configured to receive traffic from a plurality of nodes communicating in a network, a processor coupled to the interface and configured to identify each of the plurality of nodes communicating in the network, and a database. The database includes a node object dimension table that includes an entry for each identified node. Each entry in the node object dimension table includes a node identification and an address for locating the node in the network. The database also includes a communication fact table that includes an entry for each communication in the network. Each entry in the communication fact table includes a source node identification that includes the node identification for the source node, a communication identification, and a destination node identification that includes the node identification for the destination node.
Abstract: Various embodiments include one or more of systems, methods, and software to provide a status of a logical entity between entity models in network management systems, such as for fault isolation, in an efficient manner. Some embodiments, when receiving requests for a status of a logical entity while already in the process of determining the status in response to a previously received request, include adding an identifier of the subsequent requestor to a status requestor list and not responding to or taking any further action with regard to the request from the subsequent requestor until the status in response to the first received status request is determined.
Abstract: Various embodiments include at least one of systems, methods, software, and data structures for communicating security credentials between CICS regions in a container of a Customer Information Control System (CICS) channel data structure. Some embodiments include receiving a dataset from a first CICS application executing within a first CICS region, the dataset received from the first CICS application for transmission to a second CICS application in a second CICS region. When the dataset includes a channel, populating a container of the channel with credential data to authenticate the dataset within the second CICS region and forwarding the dataset to a CICS transformer process of the first CICS region to transform and communicate the dataset to the second application in the second CICS region.