Patents Assigned to Computer Associates Think, Inc.
  • Publication number: 20130061219
    Abstract: According to one embodiment of the present disclosure, a method includes receiving a request to instantiate a virtual machine image in a virtualization environment. The method also includes sending a request for verification of the virtualization environment. The method further includes receiving information from the enforcement module in response to the request for verification of the virtualization environment. The method further includes determining whether the virtualization environment is verified based on the information received.
    Type: Application
    Filed: September 1, 2011
    Publication date: March 7, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Amir Jerbi, Michael Kletskin, Eitan Hadar
  • Publication number: 20130060824
    Abstract: A system includes a toolbar configured to receive a knowledge nugget relating to a software architecture. The knowledge nugget includes information relating to the software architecture, an identification of the creator of the knowledge nugget, a link to information relating to the knowledge nugget, a blog relating to the knowledge nugget, a tag to enable search and retrieval of the knowledge nugget, and a point of contact for discussion relating to the knowledge nugget. The toolbar is further configured to analyze the knowledge nugget, and to store the knowledge nugget in a transient database or a permanent database as a function of the analysis.
    Type: Application
    Filed: September 1, 2011
    Publication date: March 7, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Eitan Hadar, Meira Levy, Irit Hadar
  • Publication number: 20130054781
    Abstract: A system is configured to provide a suite of network-based services to users with high availability. The suite of network-based services may include browser-based collaboration functions, process management functions, index functions, search functions, help search functions, document-management functions, and/or other functions. The suite of network-based services may correspond to services provided by a server application such as Microsoft® SharePoint™ being executed on one or more processors of one or more servers. As used herein, the term “high availability” may refer a system design protocol that ensures a certain degree of operational continuity during a given measurement period.
    Type: Application
    Filed: August 26, 2011
    Publication date: February 28, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Min YAN, Zhenghua Xu
  • Publication number: 20130054909
    Abstract: In accordance with one embodiment of the present disclosure, a method includes receiving second information about second data stored on a second device. The method also includes determining that the second data is associated with first data stored on a first device. The method further includes, based on the determination about the second data, associating the second data with a policy for backing up a particular type of data. The method further includes initiating a transfer of one or more copies of the second data to a second one or more storage medias defined by the policy.
    Type: Application
    Filed: August 23, 2011
    Publication date: February 28, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Hui Li, Paul P. Ignatius, Sarad Thapa
  • Publication number: 20130054529
    Abstract: Systems and methods for generating a bookmark for a snapshot of one or more volumes of a production server include initiating a snapshot process to capture a shadow copy of a snapshot-volume set, which includes one or more volumes of the production server. The snapshot process (e.g., Volume Shadow Copy Service of Windows™ operating system) may include (a) temporarily freezing operations on a file system of the production server, and (b) releasing a freeze of operations on the file system of the production server. A bookmark for the shadow copy (representing a consistent state of the associated volumes) may be generated such that the bookmark corresponds to a completion of the temporarily freezing or releasing a freeze of the operations. The bookmark may include a point in time of the completion of the temporarily freezing or releasing the freeze of the operations.
    Type: Application
    Filed: August 24, 2011
    Publication date: February 28, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Xiaopin Wang, Haiyang Zhang, Shaorong Li
  • Publication number: 20130047169
    Abstract: A technique for monitoring software which efficiently communicates transaction trace data, including static and dynamic data, from an agent to a manager. Corresponding tree data structures are maintained by the agent and manager which describe sequences of invoked components of a monitored application. The start and end of each component are each represented by a node in a branch of the tree data structure. To identify a transaction from a transaction trace, the agent can identify a matching branch, and communicate a unique identifier of the branch, such as an identifier of its last node, to a manager, with dynamic data such as start and end times of components. The manager looks up the sequences of invoked of components based on the identifier, and provides a display of the transaction trace. The trace can be annotated with static data indexed to the matching branch.
    Type: Application
    Filed: August 16, 2011
    Publication date: February 21, 2013
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Marco Gagliardi, Anand Krishnamurthy
  • Publication number: 20130046798
    Abstract: A system and method for visualization of an infrastructure is presented. The system comprises a non-relational graph data store caching data from one or more of a relational or non-relational data store, a graph visualization software operable to perform the visualization of the infrastructure using the cached data in the non-relational graph data store, and a graph database operable to implement analytic queries available to the graph visualization software through an exposed Application Program Interface. In one aspect, the graph database collects the cached data from the one or more relational or non-relational graph data stores. In one aspect, the cached data comprises nodes representing elements of the infrastructure, and links representing relationships among the nodes. In one aspect, the infrastructure is an IT infrastructure.
    Type: Application
    Filed: August 16, 2011
    Publication date: February 21, 2013
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Serguei Mankovskii, Maria Velez-Rojas
  • Publication number: 20130046739
    Abstract: The system and method described herein may be used to reconcile duplicate configuration items in a configuration management database. In particular, corresponding properties that represent relationships with a trial configuration item and an existing configuration item may be compared to reconcile whether the trial configuration item corresponds to the existing configuration item and should therefore be combined with the existing configuration item, or alternatively whether the trial configuration item represents a new configuration item that can be added to the configuration management database. If comparing the properties associated with the trial configuration item and the existing configuration item results in an indeterminate outcome, a reconciliation engine may inspect a table stored directly on the trial configuration item and/or the existing configuration item to reconcile whether the trial configuration item and the existing configuration item are indeed different or identical.
    Type: Application
    Filed: August 18, 2011
    Publication date: February 21, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Marvin Waschke, Steven Greenspan
  • Patent number: 8381266
    Abstract: A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated.
    Type: Grant
    Filed: October 25, 2010
    Date of Patent: February 19, 2013
    Assignee: Computer Associates Think, Inc.
    Inventors: Venkata Babji Sama, Suril Rajul Desai, Rammohan Varadarajan
  • Publication number: 20130041987
    Abstract: According to one embodiment of the present disclosure, a method for deploying a virtual network address translation (NAT) appliance includes receiving a request to generate a virtual machine environment. The method also includes generating the virtual machine environment from an environment template, the virtual machine environment comprising a first virtual machine. The method further includes configuring a hostname for a virtual NAT appliance instance, and configuring one or more private network settings for the virtual NAT appliance instance. The method also includes generating the virtual NAT appliance instance from the NAT appliance template, the NAT appliance instance comprising a public network interface and a private network interface.
    Type: Application
    Filed: August 11, 2011
    Publication date: February 14, 2013
    Applicant: Computer Associates Think, Inc.
    Inventor: Keith Richard Warno
  • Publication number: 20130042222
    Abstract: A computer implemented method and system including techniques for developing and executing automated test cases are described herein. In one embodiment, a test case automation tool provides functionality for defining an automated test set and associated test cases within a testing user interface without the use of scripting languages or compiled programming. The definition of each test case may occur within a testing user interface, including displaying and receiving user selection of available methods for testing; displaying user parameter fields and receiving user parameter values in response for testing; abstracting parameter types in the user parameter values; and generating XML-format definitions of the test case. The test case automation tool may then execute the selected methods of the software application using parameters provided in the XML-format definitions, and return testing results of the test case execution.
    Type: Application
    Filed: August 8, 2011
    Publication date: February 14, 2013
    Applicant: Computer Associates Think, Inc.
    Inventor: Hari Kiran Maddela
  • Publication number: 20130024481
    Abstract: Systems and methods are provided for storage platform-independent storage provisioning. The systems and methods may include receiving a storage provisioning request from a user interface, processing the storage provisioning request to determine one or more of a plurality of storage resources utilized to complete the storage provisioning request, generating an instruction to provision a data storage space among the one or more of the plurality of storage resources, and provisioning the data storage space based on the instruction. Each of the plurality of storage resources may include an interface configuration, and at least two interface configurations are different from one another. Each of the plurality of storage resources may be accessible and operational in accordance with the interface configuration thereof.
    Type: Application
    Filed: July 20, 2011
    Publication date: January 24, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Richard Joseph Bolesta, Michael Ralph Chiaramonte, Shiva Mirzadeh, Kevin Charles Kocher
  • Publication number: 20130024425
    Abstract: A system and method include initiating a backup of system files on a computer system. A user selected priority is checked for each file. Files having a higher user selected priority are backed up prior to attempting to back up files having a lower user selected priority, wherein the files are backed up to a storage device as a function of storage space available on the storage device.
    Type: Application
    Filed: July 18, 2011
    Publication date: January 24, 2013
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Ai Huang, Chong Wang
  • Patent number: 8359493
    Abstract: A system and method is provided for providing assured recovery for a distributed application. Replica servers associated with the distributed application may be coordinated to perform integrity testing together for the whole distributed application. The replica servers connect to each other in a manner similar to the connection between master servers associated with the distributed application, thereby preventing the replica servers from accessing and/or changing application data on the master servers during integrity testing.
    Type: Grant
    Filed: July 29, 2010
    Date of Patent: January 22, 2013
    Assignee: Computer Associates Think, Inc.
    Inventors: Hailin Peng, Zhenghua Xu, Victor Liu
  • Patent number: 8340984
    Abstract: A system, in a cloud computing environment (“CCE”) includes a data processor. One or more cloud computing auditing components are configured to monitor the CCE in accordance with a predefined insurance level agreement (“ILA”) and to create a log of one or more CCE events indicated by the ILA. A neutral data warehouse is configured to store the log. A reporting module generates one or more reports for a party indicated by the ILA from the log in the neutral data warehouse in accordance with the ILA.
    Type: Grant
    Filed: April 26, 2010
    Date of Patent: December 25, 2012
    Assignee: Computer Associates Think, Inc.
    Inventors: Debra Jean Danielson, Eitan Hadar
  • Publication number: 20120323976
    Abstract: A system and method for routing and managing documents based on document content comprises obtain a document, determine a classification for the document based on the document content, determine a storage location for the document based on the document classification, determine whether the document is stored in the determined storage location, when the document is stored in the determined storage location, update the document in the determined storage location, when the document is not stored in the determined storage location, determine whether the document is stored in another storage location, when the document is stored in another storage location, add the document in the determined storage location and delete the document from the other storage location, and when the document is not stored in the other storage location, add the document to the determined storage location.
    Type: Application
    Filed: June 14, 2011
    Publication date: December 20, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Paul Stidworthy, Jamie Peter Bowen, Andrew Beattie
  • Publication number: 20120324280
    Abstract: A system includes a production computer machine that includes an operating system and a driver stack. The driver stack includes a file system layer, a recovery driver, a storage layer, a driver layer, a bus driver layer, and a storage device. The system also includes a backup computer processor coupled to the production computer machine via the recovery driver. The recovery driver is configured to commence a recovery of data from the backup computer processor, receive a disk access request from the file system layer, determine if the disk access request accesses data that has not yet been recovered from the backup computer processor, and initiate an on-demand recovery request from the backup computer processor when the data has not been recovered from the backup computer processor.
    Type: Application
    Filed: June 14, 2011
    Publication date: December 20, 2012
    Applicant: Computer Associates Think, Inc.
    Inventor: Zhiye Wang
  • Publication number: 20120320074
    Abstract: A method for layered overview visualization of an IT environment having nodes and links related to the nodes, comprising initializing the layered overview visualization by establishing a number of hierarchical levels, combining the nodes and the links related to the nodes into a plurality of elements based on one of function and type, for each hierarchical level, assigning one or more of the plurality of elements to the level in accordance with one of the function and the type and determining overlap of the assigned elements. The method further comprises navigating the layered overview visualization by selecting a view, selecting a level of the hierarchical levels within the selected view, choosing the overlap of one or more of the assigned elements in the selected level and highlighting the chosen elements, and displaying on a screen the selected level and the highlighted chosen elements in the selected level.
    Type: Application
    Filed: June 15, 2011
    Publication date: December 20, 2012
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Serguei Mankovski, Maria Velez-Rojas, Michael C. Roberts, Esin Kiris
  • Publication number: 20120310957
    Abstract: In certain embodiments, a parser parses a formula to yield one or more functions, at least one function comprising a dependent value of a dependent object. One or more macro handlers configured to execute the functions are determined. At least one macro handler is instructed to register with one or more dominant objects on behalf of the dependent object, where the dominant objects are used to evaluate the dependent value.
    Type: Application
    Filed: May 31, 2011
    Publication date: December 6, 2012
    Applicant: Computer Associates Think, Inc.
    Inventor: Tad A. Deffler
  • Publication number: 20120290110
    Abstract: According to one embodiment of the present disclosure, a method for evaluating composite applications through graphical modeling may be provided. The method may include displaying one or more characteristic objects that are graphically associated with a first entity object. An indication of a score calculation methodology of the first entity object and an indication of a score calculation methodology of each characteristic object may be received. A score of each characteristic object may be determined. Each score may be based on at least one or more measurements of a measured object that is graphically associated with the first entity object and the score calculation methodology of the respective characteristic object. A score of the first entity object may be determined and displayed, the determination based on at least each score of the one or more characteristic objects and the score calculation methodology of the first entity object.
    Type: Application
    Filed: May 13, 2011
    Publication date: November 15, 2012
    Applicant: Computer Associates Think, Inc.
    Inventors: Eitan Hadar, Donald F. Ferguson, Vincent R. Re, John P. Kane, Brian J. Hughes