Patents Assigned to Computer Associates Think, Inc.
-
Publication number: 20120110318Abstract: The system and method for controlling state tokens described herein may secure sensitive application state tokens, link one application state token to other state tokens that represent certain identities or communication sessions, and maintain application state tokens to integrate various different systems or applications. In particular, the system and method described herein may provide a mechanism to override scheme that applications use to manage state information and thereby enforce policies that provide fine-grained control over any semantics the applications otherwise use to manage state information.Type: ApplicationFiled: November 2, 2010Publication date: May 3, 2012Applicant: COMPUTER ASSOCIATES THINK, INC.Inventor: Justin T. Stone
-
Patent number: 8170903Abstract: A system and method for generating a business critical impact analysis report includes steps of: inserting a rank value field in each configuration item relationship type definition; inserting a rank value field in each single relationship between configuration items; determining default rank values for the rank value fields; assigning the default rank values to the single relationships and the relationship type definitions; receiving a user request to generate the business critical impact analysis report at a selected rank level of configuration items; and presenting the business critical impact analysis report to the user, displaying the configuration items and their relationships corresponding to the selected level.Type: GrantFiled: April 10, 2008Date of Patent: May 1, 2012Assignee: Computer Associates Think, Inc.Inventor: Brian Poissant
-
Publication number: 20120102361Abstract: A system and method using statistical analysis for the process of analyzing and generating organizational policies is presented. This inventive method comprises, for one or more tests, using a test to calculate a test result for the policy based on current violator entities and potential violator entities, and determining a policy ranking for the policy based on the test result of the test, and evaluating the policy based on the policy rankings determined from the tests. The method can also comprise creating a repository comprising the policy rankings for the plurality of policies. The repository can be used to trend, benchmark, alert and improve the policies. The method can also comprise creating a rule profile for the one policy comprising the one policy, the current violator entities of the policy, the potential violator entities of the policy, the test results and the policy rankings from the tests.Type: ApplicationFiled: October 25, 2010Publication date: April 26, 2012Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Rami Sass, Ehud Amiri
-
Patent number: 8166147Abstract: A computer implemented method includes collecting information from multiple network devices regarding utilization over a predetermined period of time. Unused device resources are identified, along with device resources that may be consolidated. Such identifications are provided to a user for use in consolidating the network to reduce power consumption.Type: GrantFiled: October 28, 2008Date of Patent: April 24, 2012Assignee: Computer Associates Think, Inc.Inventor: Timothy J. Pirozzi
-
Publication number: 20120096432Abstract: New code is added to existing object code in order to add new functionality. For example, a call to start a profiler function can be added at the beginning of a Java method and a call to stop the profiler function can be added at the exits of the Java method. A method may have many different exits. To insure that the profiler process is stopped regardless of which exit is performed, the byte code and exception table are modified.Type: ApplicationFiled: December 22, 2011Publication date: April 19, 2012Applicant: COMPUTER ASSOCIATES THINK, INC.Inventor: Jeffrey R. Cobb
-
Publication number: 20120096398Abstract: A method of notifying a person using a computer includes providing a computer system including at least one sensory cueing component. The method includes defining a subliminal and a supraliminal range of at least one human sense. A cue may be defined and includes a variable attribute, and the cue is directed to the at least one human sense. An alert level may be associated with the message and the alert level may be classified as being in the subliminal or supraliminal range. The method may include a presentation methodology of the cue and the message. The cue may be initiated and presented in either the subliminal range or the supraliminal range and directed to the at least one human sense in the user's sensory environment. The user acknowledges the cue and the message in either the subliminal or supraliminal range, before the cue is removed from the user's sensory environment.Type: ApplicationFiled: October 14, 2010Publication date: April 19, 2012Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Steven Greenspan, Gabriel Silberman
-
Publication number: 20120095967Abstract: A method for capturing an image of a machine having one or more disks is presented. The method comprises creating a snapshot of the machine, the snapshot including full machine encapsulation, querying the one or more disks on the machine to obtain information stored thereon, creating metadata able to access one or more files, one or more folders, and the application on the machine, and capturing the snapshot, the obtained information and the metadata in the image. The method may also comprise migrating the captured image and/or extracting one or more files and/or folders from the captured image on another machine. The migration can be between physical and physical, physical and virtual, physical and cloud, etc. The method may comprise capturing another image comprising the snapshot, the metadata and changed information different from the obtained information.Type: ApplicationFiled: October 18, 2010Publication date: April 19, 2012Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Prashant Parikh, Don Kleinschnitz
-
Patent number: 8161233Abstract: A computer system and process restores files on multiple disk drives from a plurality of backup files on a plurality of media types and at a plurality of locations. The system receives at a processor a restore command, and partitions the restore command into two or more sub-jobs. The system determines a location for each of the plurality of media types, and matches each sub-job with a different media type at a different location. The system then restores the files from each different media type at a different location to the multiple disk drives in parallel.Type: GrantFiled: May 13, 2009Date of Patent: April 17, 2012Assignee: Computer Associates Think, Inc.Inventor: Hao Wang
-
Publication number: 20120089966Abstract: A two-pass technique for instrumenting an application is disclosed. One pass may be performed statically by analyzing the application and inserting probes while the application is not running. Another pass may be performed dynamically by analyzing data collected by the probes while the application runs to derive metrics for the probes. One or more metrics for each probe may be analyzed to determine whether to dynamically modify the probe. By dynamically modifying the probe, the application does not need to be shut down. Dynamically modifying the probe could include removing the probe from the application or moving the probe to another component (e.g., method) in the application, as examples. For example, the probe might be moved to a component that is either up or down the call graph from the component that the probe is presently in.Type: ApplicationFiled: October 12, 2010Publication date: April 12, 2012Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: David Brooke Martin, Marco Gagliardi, Mark Jacob Addleman
-
Patent number: 8156222Abstract: In general, this disclosure describes techniques of managing resources in a service-oriented distributed computing system. As described in this disclosure, one or more control nodes provide for the efficient and automated allocation and management of resources within the distributed computing system. In order to provide automated allocation and management of computing functions and resources, a control node uses a set of governors. This set of governors includes a set of service governors to govern services used in the distributed computing system. The set of governors also includes a set of resource governors that govern individual resources of the services in the distributed computing system. The service governors and the resource governors may be implemented using finite state machines.Type: GrantFiled: February 21, 2011Date of Patent: April 10, 2012Assignee: Computer Associates Think, Inc.Inventors: Robert A. Gingell, Jr., James D. Engquist, David A. Henseler, Jerry R. Jackson, Michael John Lamb, Sanjay Radia
-
Patent number: 8156489Abstract: Distributed installation configuration system and method are provided. The system and method in one aspect collects information about all products and components being installed from a centralized user interface, before the actual installation is performed, regardless of the target machine locations. The collected information is then stored centrally. Thereafter, subsequent installations, whether on the same or different machine locations, access this information for the subsequent installation procedure.Type: GrantFiled: May 21, 2004Date of Patent: April 10, 2012Assignee: Computer Associates Think, Inc.Inventor: Travis David Kane
-
Publication number: 20120084258Abstract: A computer implemented method includes monitoring blocks of data on a storage device that are changing as the computer operates. On detecting a computer shut down event, a copy of changes to the monitored blocks are saved. Upon startup of the computer, a backup of the changed blocks of data is performed.Type: ApplicationFiled: October 4, 2010Publication date: April 5, 2012Applicant: Computer Associates Think, Inc.Inventors: Pratap Karonde, Prashant Parikh
-
Patent number: 8150797Abstract: A method for enhancing directory service performance includes determining one or more data types to be loaded. Retrieving data objects that includes the determined data types from storage. Preloading object name and determined data type data into a directory service alternate evaluator for each data object retrieved from storage.Type: GrantFiled: May 20, 2005Date of Patent: April 3, 2012Assignee: Computer Associates Think, Inc.Inventors: Richard H. Harvey, Damon N. Groenveld, Ronald W. Ramsay
-
Patent number: 8149723Abstract: A method for discovering computers connected to a computer network, including receiving a packet containing address information of a computer connected to the computer network that sent the packet, extracting the address information from the packet, and adding the address information to a database of discovered computers connected to the computer network.Type: GrantFiled: May 20, 2005Date of Patent: April 3, 2012Assignee: Computer Associates Think, Inc.Inventor: Paul Gassoway
-
Patent number: 8151245Abstract: A distributed processing system is described that employs “application-based” specialization. In particular, the distributed processing system is constructed as a collection of computing nodes in which each computing node performs a particular processing role within the operation of the overall distributed processing system. Each of the computing nodes includes an operating system, such as the Linux operating system, and includes a plug-in software module to provide a distributed memory operating system that employs the role-based computing techniques. An administration node maintains a database that defines a plurality of application roles. Each role is associated with a software application, and specifies a set of software components necessary for execution of the software application. The administration node deploys the software components to the application nodes in accordance with the application roles associates with each of the application nodes.Type: GrantFiled: December 16, 2005Date of Patent: April 3, 2012Assignee: Computer Associates Think, Inc.Inventors: Steven M. Oberlin, David W. McAllister
-
Publication number: 20120079567Abstract: The disclosure provides a wireless manager operable to receive a request from a mobile device to wirelessly communicate with a network, wherein the request may include information to dynamically identify a location associated with the mobile device. The wireless manager may be further operable to automatically associate the mobile device with an access zone comprising one or more physical or logical characteristics, compare the location associated with the mobile device to the access zone, and authorize the mobile device to wirelessly communicate with the network if the location associated with the mobile device indicates that the mobile device does not violate the access zone.Type: ApplicationFiled: December 7, 2011Publication date: March 29, 2012Applicant: Computer Associates Think, Inc.Inventor: Joannes G. VAN DE GROENENDAAL
-
Patent number: 8145939Abstract: Various embodiments herein include at least one of systems, methods, and software to detect and reduce messages from network entity management clients that are not utilized by a network management system. Once identified, the network management system may send a command to the network entity management clients to no longer send particular message types to the network management system. The network management system may also, or alternatively configured to take no action when such messages are subsequently received.Type: GrantFiled: December 10, 2009Date of Patent: March 27, 2012Assignee: Computer Associates Think, Inc.Inventors: Timothy J. Pirozzi, Jerome S. Simms, Jonathan Caron
-
Publication number: 20120072551Abstract: Systems and methods for measuring and managing ambiguity among a plurality of configuration items residing in a configuration management database include determining for at least a first configuration item, at least a second configuration item such that a first set of attributes associated with the first configuration item and a second set of attributes associated with the second configuration item have at least one attribute with an identical value. As an indicator for the ambiguity, an ambiguity index for the first configuration item may be measured. One of the first configuration item and the second configuration item may be identified as an ambiguous configuration item. Upon identification, an operational state of the ambiguous configuration item or a set of one or more attributes associated with the ambiguous configuration item may be modified. The ambiguity for configuration item transactions may likewise be measured and managed to locate and resolve transaction ambiguity.Type: ApplicationFiled: September 17, 2010Publication date: March 22, 2012Applicant: Computer Associates Think, Inc.Inventors: Abed Ali, Peter McKay, John Michael Tomaszewski
-
Publication number: 20120072395Abstract: A system for logging database transactions comprises a memory (comprising a direct access storage device) operable to store a database, a database log, and a plurality of log buffers associated with the database log. Each log buffer is operable to store at least one log record associated with a database transaction. The system further comprises a processor operable to log a first record of a first database transaction using the database log and write the database log to the storage device. The processor is further operable to log a second record of a second database transaction in a first of the plurality of log buffers substantially concurrently to the database log being written to the storage device.Type: ApplicationFiled: November 30, 2011Publication date: March 22, 2012Applicant: Computer Associates Think, Inc.Inventor: Joseph B. LYNN
-
Publication number: 20120072887Abstract: Disclosed herein are techniques for generating data that describes dependencies between software components as transactions are processed, as well as displaying dependency maps based on the data. The data may be collected by agents that monitor or trace transactions being processed by the software components. The collected data may be aggregated to form a directed graph that describes the dependencies between the software components. A dependency map may be displayed based on the directed graph. The dependency map may show dependencies between software components as the transactions are processed. The dependency map may also show dependencies between applications that include the software components. The dependency map(s) may allow a user to easily and quickly ascertain where a problem is occurring. For example, the user might be able to quickly determine that a problem is at a backend database, as opposed to an application server at a frontend.Type: ApplicationFiled: September 17, 2010Publication date: March 22, 2012Applicant: COMPUTER ASSOCIATES THINK, INC.Inventor: Indranil Basak