Patents Assigned to Think, Inc.
-
Publication number: 20110283261Abstract: A system and method for testing software systems having a plurality of linguistic versions is presented. The method comprises creating an initial test script in one linguistic version of the plurality of linguistic versions, executing and modifying this test script, and executing the modified initial test script in additional linguistic versions. Executing the initial test script can comprise performing test steps, and storing a result of each test step as log data in a log file, each test step usually having Windows controls to test. Modifying the initial test script can comprise recognizing the test step controls using the log data, performing the test step, and replacing the test step control text with another text. Alternatively, modifying the initial test script can comprise entering into a test step having a control text, recognizing the control based on the control attributes, performing the test step, and replacing the test step control text.Type: ApplicationFiled: May 12, 2010Publication date: November 17, 2011Applicant: COMPUTER ASSOCIATES THINK, INC.Inventor: Gilly Yun
-
Publication number: 20110283265Abstract: A failsafe mechanism for installing and removing temporary instrumentation during a runtime of an application. Initially, an application is configured with a baseline set of instrumented components such as methods. Additional instrumentation is then deployed in the application, such as to diagnose a performance problem. The failsafe mechanism ensures that the additional instrumentation is automatically removed, even when there is an interruption in a communication link to the application, a computing device failure, a software failure, or some other type of failure, which renders it impossible to manually roll back the instrumentation from a remote user interface. The failsafe mechanism can be provided using callbacks between the computing devices which detect when a connection is unexpectedly lost or closed. Termination of one callback can cascade to one or more other callbacks. The instrumentation rollback can involve reloading un-instrumented byte code of the application.Type: ApplicationFiled: May 11, 2010Publication date: November 17, 2011Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Marco Gagliardi, Yitao Sun
-
Publication number: 20110283264Abstract: A technique for analyzing software in which un-instrumented components can be discovered and dynamically instrumented during a runtime of the software. Initially, an application configured with a baseline set of instrumented components such as methods. As the application runs, performance data is gathered from the instrumentation, and it may be learned that the performance of some methods is an issue. To analyze the problem, any methods which are callable from a method at issue are discovered by inspecting the byte code of loaded classes in a JAVA Virtual Machine (JVM). Byte code of the class is parsed to identify opcodes which invoke byte code to call other methods. An index to an entry in a constants pool table is identified based on an opcode. A decision can then be made to instrument and/or report the discovered methods.Type: ApplicationFiled: May 11, 2010Publication date: November 17, 2011Applicant: COMPUTER ASSOCIATES THINK, INC.Inventor: Marco Gagliardi
-
Publication number: 20110283019Abstract: According to one embodiment, a data sources interface of a mainframe receives a transaction request from a user terminal communicating through a network. The transaction request is formatted in a web-based format. A data sources function is called to instruct a mainframe application to perform the requested transaction, and the instruction to the mainframe is formatted in the native format of the mainframe. A transaction result formatted in the native format of the mainframe is received from the mainframe application. The transaction result is modified according to the web-based format to yield a data source, and the data source is sent to the user terminal.Type: ApplicationFiled: May 13, 2010Publication date: November 17, 2011Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Robert P. Bennett, Vincent R. Re
-
Patent number: 8059126Abstract: In one embodiment, a method includes receiving a request to perform a task using a special character. The method further includes receiving from a user an indication specifying an interpretation of the special character and storing the indication. The method further includes interpreting the special character using the indication, and performing the task using the interpreted special character.Type: GrantFiled: March 30, 2007Date of Patent: November 15, 2011Assignee: Computer Associates Think, Inc.Inventor: Wayne Joseph Barbarek
-
Patent number: 8060867Abstract: A method for blocking the execution of prohibited files, includes requesting execution of a file to be executed, identifying the file to be executed, comparing the identified file to be executed to a list of files that are prohibited and executing the identified file to be executed when the identified file to be executed does not match a file listed in the list of files that are prohibited.Type: GrantFiled: May 18, 2005Date of Patent: November 15, 2011Assignee: Computer Associates Think, Inc.Inventor: Paul Gassoway
-
Publication number: 20110276573Abstract: Journal event consolidation extracts events occurring between two predetermined point in time on data volume, categorizes the events into categories of events, and consolidates the events in the categories of events.Type: ApplicationFiled: May 6, 2010Publication date: November 10, 2011Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Xiaopin (Hector) Wang, Haiyang Zhang, Shaorong Li
-
Publication number: 20110276495Abstract: According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method may also include authenticating the user by the authentication server in response to a request from the user to use the one-time password. The method may further include authorizing the use of the one-time password for the transaction in response to authenticating the user by the authentication server. The method may moreover include using the one-time password in combination with an account number to settle the transaction between the user and the merchant. The method may additionally include sending a message to the authentication server originating from the merchant, wherein the message comprises the one-time password, and wherein the message requests a determination whether the one-time password is authorized for use in the transaction.Type: ApplicationFiled: May 9, 2011Publication date: November 10, 2011Applicant: Computer Associates Think, Inc.Inventors: Rammohan Varadarajan, Ambarish Malpani
-
Publication number: 20110271147Abstract: Various embodiments include one or more of systems, methods, and software to provide a status of a logical entity between entity models in network management systems, such as for fault isolation, in an efficient manner. Some embodiments, when receiving requests for a status of a logical entity while already in the process of determining the status in response to a previously received request, include adding an identifier of the subsequent requestor to a status requestor list and not responding to or taking any further action with regard to the request from the subsequent requestor until the status in response to the first received status request is determined.Type: ApplicationFiled: July 14, 2011Publication date: November 3, 2011Applicant: Computer Associates Think, Inc.Inventors: Timothy J. Pirozzi, Christopher Burke
-
Publication number: 20110270804Abstract: Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify and resolve violations of system and process performance measuring metrics. Following identification of such a violation, some embodiments may identify and cause a solution to be implemented. Following implementation of a solution, the violated metrics are again applied and the results evaluated to verify resolution of the metric violation. Some embodiments may repeat this process until the metric violation or violations are resolved.Type: ApplicationFiled: April 28, 2010Publication date: November 3, 2011Applicant: Computer Associates Think, Inc.Inventors: Eitan Hadar, Kieron John James Connelly, Olga Lagunova, Mitchell Edward Engel, Peter Anthony Lazzaro
-
Patent number: 8051163Abstract: Synthetic transactions for a network system are generated based on monitoring of the network system. One or more network system monitoring systems receive network system traffic, traffic monitoring data and/or application runtime data during a monitoring process. The traffic monitoring data may be derived from network system traffic and the application runtime data may be data associated with application transactions. The traffic, traffic monitoring data and application runtime data may contain information regarding the scope and frequency of the functionality tested by the actual traffic received by the network system. Synthetic transactions may be generated and transmitted to test the network system based on the scope and frequency of the functionality tested by actual traffic.Type: GrantFiled: November 30, 2006Date of Patent: November 1, 2011Assignee: Computer Associates Think, Inc.Inventors: Jon Ruiz, Ling Thio, Brian Zuzga
-
Publication number: 20110264571Abstract: A system includes a receiving module to receive a purchase inquiry for a cloud computing service from a consumer in a first currency. A pricing module is used to price-out the cloud computing service from a provider where the cloud computing service is provided in a second currency. A reconciliation module reconciles the purchase of the cloud computing service in the consumer's geographical location and currency with the provider's location and currency.Type: ApplicationFiled: April 26, 2010Publication date: October 27, 2011Applicant: Computer Associates Think, Inc.Inventors: Eitan Hadar, Debra Jean Danielson
-
Publication number: 20110264471Abstract: A system, in a cloud computing environment (“CCE”) includes a data processor. One or more cloud computing auditing components are configured to monitor the CCE in accordance with a predefined insurance level agreement (“ILA”) and to create a log of one or more CCE events indicated by the ILA. A neutral data warehouse is configured to store the log. A reporting module generates one or more reports for a party indicated by the ILA from the log in the neutral data warehouse in accordance with the ILA.Type: ApplicationFiled: April 26, 2010Publication date: October 27, 2011Applicant: Computer Associates Think, Inc.Inventors: Debra Jean Danielson, Eitan Hadar
-
Publication number: 20110265064Abstract: Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify, use, or share patterns and anti-patterns. Embodiments that include pattern and anti-pattern identification operate to identify candidate patterns and anti-patterns within a deployed system and to confirm or receive confirmation that the identified candidates are indeed patterns or anti-patterns. Embodiments that use patterns and anti-patterns operate to consume the identified patterns and anti-patterns to improve system performance. The embodiments that share patterns and anti-patterns include mechanisms whereby patterns and anti-patterns can be sent to and received from other systems.Type: ApplicationFiled: April 26, 2010Publication date: October 27, 2011Applicant: Computer Associates Think, Inc.Inventors: Eitan Hadar, Kieron John James Connelly, Olga Lagunova, Peter Anthony Lazzaro
-
Publication number: 20110265076Abstract: A system and method for updating an offline virtual machine are disclosed. The method comprises mounting an image of an offline virtual machine on a host operating system. The method further comprises generating drive-mapping information for the mounted virtual machine image and loading registry information of the mounted virtual machine image onto the host operating system using the drive-mapping information. An update to be applied to the offline virtual machine is determined based on the registry information and a patch bundle is retrieved based on the determination, wherein the patch bundle comprises registry update instructions, file system update instructions, and a patch file. The patch bundle is executed on the host operating system to update the offline virtual machine.Type: ApplicationFiled: April 21, 2010Publication date: October 27, 2011Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Nishant Shivajirao Thorat, Bharti Gupta
-
Publication number: 20110265091Abstract: This disclosure provides a system and method for normalizing job properties. In one embodiment, a job manager is operable to identify a property of a job, with the job being associated with an operating environment. The job manager is further operable to normalize the property of the job and present the normalized property of the job to a user.Type: ApplicationFiled: July 8, 2011Publication date: October 27, 2011Applicant: Computer Associates Think, Inc.Inventors: An V. Ly, Arun Padmanabhan, Edward F. Chen
-
Publication number: 20110258598Abstract: A flexible, platform-independent integration infrastructure is provided. The integration infrastructure may include an integration bridge and at least one plug-in, where the at least one plug-in may include translation rules, mapping rules, and other information associated with a component coupled to the plug-in. The translation rules, mapping rules, and other information may be used by the integration bridge during a mapping process to control communication between components. Based on the rules and information, a mapping translator of the integration bridge converts data received from component into a form readable by another component.Type: ApplicationFiled: June 24, 2011Publication date: October 20, 2011Applicant: Computer Associates Think, Inc.Inventors: Dushan Fernando, Anthony Candappa, Koustubh Pawar, Nitin Maheshwari
-
Publication number: 20110258209Abstract: Efficiently identifying transactions processed by a software application, such as a server application is disclosed. In one embodiment, transactions are identified by applying a set of rules to communications between a client and server to determine whether certain patterns are in the communications. For example, the rules may look for some combination of parameters in the transactions. As a particular example, the rules may be used to look for parameters in HTTP requests. The rules are organized in a way that allows efficient processing. For example, the rules may be organized based on the frequency with which the parameters are expected to occur in the transactions and the frequency with which each transaction is expected to occur. The rules may be updated if the expected frequencies deviate from actual frequencies, such that the rules can be organized for more efficient processing.Type: ApplicationFiled: April 15, 2010Publication date: October 20, 2011Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Marco Gagliardi, Neil Desai
-
Patent number: 8042180Abstract: A method for combating malicious programs including monitoring network traffic from one or more devices, analyzing the network traffic to determine the presence of a malicious program in the one or more devices and disabling transmission of the network traffic for those of the one or more devices determined to have the malicious program present.Type: GrantFiled: May 20, 2005Date of Patent: October 18, 2011Assignee: Computer Associates Think, Inc.Inventor: Paul Gassoway
-
Publication number: 20110252087Abstract: Network performance is monitored using timing information retrieved from a client device, server in communication with the client, or both. Client side timing information is retrieved using performance monitoring code provided by the server. The code may be provided to the client as part of a content response. Once content in the provided content response is loaded, the code sends the timing information to the server. The server may then process the timing information to calculate response time and other time information metrics.Type: ApplicationFiled: June 23, 2011Publication date: October 13, 2011Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Brian Zuzga, John B. Bley, Mark Jacob Addleman, Krates Ng