Patents Assigned to Think, Inc.
  • Publication number: 20110283261
    Abstract: A system and method for testing software systems having a plurality of linguistic versions is presented. The method comprises creating an initial test script in one linguistic version of the plurality of linguistic versions, executing and modifying this test script, and executing the modified initial test script in additional linguistic versions. Executing the initial test script can comprise performing test steps, and storing a result of each test step as log data in a log file, each test step usually having Windows controls to test. Modifying the initial test script can comprise recognizing the test step controls using the log data, performing the test step, and replacing the test step control text with another text. Alternatively, modifying the initial test script can comprise entering into a test step having a control text, recognizing the control based on the control attributes, performing the test step, and replacing the test step control text.
    Type: Application
    Filed: May 12, 2010
    Publication date: November 17, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventor: Gilly Yun
  • Publication number: 20110283265
    Abstract: A failsafe mechanism for installing and removing temporary instrumentation during a runtime of an application. Initially, an application is configured with a baseline set of instrumented components such as methods. Additional instrumentation is then deployed in the application, such as to diagnose a performance problem. The failsafe mechanism ensures that the additional instrumentation is automatically removed, even when there is an interruption in a communication link to the application, a computing device failure, a software failure, or some other type of failure, which renders it impossible to manually roll back the instrumentation from a remote user interface. The failsafe mechanism can be provided using callbacks between the computing devices which detect when a connection is unexpectedly lost or closed. Termination of one callback can cascade to one or more other callbacks. The instrumentation rollback can involve reloading un-instrumented byte code of the application.
    Type: Application
    Filed: May 11, 2010
    Publication date: November 17, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Marco Gagliardi, Yitao Sun
  • Publication number: 20110283264
    Abstract: A technique for analyzing software in which un-instrumented components can be discovered and dynamically instrumented during a runtime of the software. Initially, an application configured with a baseline set of instrumented components such as methods. As the application runs, performance data is gathered from the instrumentation, and it may be learned that the performance of some methods is an issue. To analyze the problem, any methods which are callable from a method at issue are discovered by inspecting the byte code of loaded classes in a JAVA Virtual Machine (JVM). Byte code of the class is parsed to identify opcodes which invoke byte code to call other methods. An index to an entry in a constants pool table is identified based on an opcode. A decision can then be made to instrument and/or report the discovered methods.
    Type: Application
    Filed: May 11, 2010
    Publication date: November 17, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventor: Marco Gagliardi
  • Publication number: 20110283019
    Abstract: According to one embodiment, a data sources interface of a mainframe receives a transaction request from a user terminal communicating through a network. The transaction request is formatted in a web-based format. A data sources function is called to instruct a mainframe application to perform the requested transaction, and the instruction to the mainframe is formatted in the native format of the mainframe. A transaction result formatted in the native format of the mainframe is received from the mainframe application. The transaction result is modified according to the web-based format to yield a data source, and the data source is sent to the user terminal.
    Type: Application
    Filed: May 13, 2010
    Publication date: November 17, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Robert P. Bennett, Vincent R. Re
  • Patent number: 8059126
    Abstract: In one embodiment, a method includes receiving a request to perform a task using a special character. The method further includes receiving from a user an indication specifying an interpretation of the special character and storing the indication. The method further includes interpreting the special character using the indication, and performing the task using the interpreted special character.
    Type: Grant
    Filed: March 30, 2007
    Date of Patent: November 15, 2011
    Assignee: Computer Associates Think, Inc.
    Inventor: Wayne Joseph Barbarek
  • Patent number: 8060867
    Abstract: A method for blocking the execution of prohibited files, includes requesting execution of a file to be executed, identifying the file to be executed, comparing the identified file to be executed to a list of files that are prohibited and executing the identified file to be executed when the identified file to be executed does not match a file listed in the list of files that are prohibited.
    Type: Grant
    Filed: May 18, 2005
    Date of Patent: November 15, 2011
    Assignee: Computer Associates Think, Inc.
    Inventor: Paul Gassoway
  • Publication number: 20110276573
    Abstract: Journal event consolidation extracts events occurring between two predetermined point in time on data volume, categorizes the events into categories of events, and consolidates the events in the categories of events.
    Type: Application
    Filed: May 6, 2010
    Publication date: November 10, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Xiaopin (Hector) Wang, Haiyang Zhang, Shaorong Li
  • Publication number: 20110276495
    Abstract: According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method may also include authenticating the user by the authentication server in response to a request from the user to use the one-time password. The method may further include authorizing the use of the one-time password for the transaction in response to authenticating the user by the authentication server. The method may moreover include using the one-time password in combination with an account number to settle the transaction between the user and the merchant. The method may additionally include sending a message to the authentication server originating from the merchant, wherein the message comprises the one-time password, and wherein the message requests a determination whether the one-time password is authorized for use in the transaction.
    Type: Application
    Filed: May 9, 2011
    Publication date: November 10, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Rammohan Varadarajan, Ambarish Malpani
  • Publication number: 20110271147
    Abstract: Various embodiments include one or more of systems, methods, and software to provide a status of a logical entity between entity models in network management systems, such as for fault isolation, in an efficient manner. Some embodiments, when receiving requests for a status of a logical entity while already in the process of determining the status in response to a previously received request, include adding an identifier of the subsequent requestor to a status requestor list and not responding to or taking any further action with regard to the request from the subsequent requestor until the status in response to the first received status request is determined.
    Type: Application
    Filed: July 14, 2011
    Publication date: November 3, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Timothy J. Pirozzi, Christopher Burke
  • Publication number: 20110270804
    Abstract: Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify and resolve violations of system and process performance measuring metrics. Following identification of such a violation, some embodiments may identify and cause a solution to be implemented. Following implementation of a solution, the violated metrics are again applied and the results evaluated to verify resolution of the metric violation. Some embodiments may repeat this process until the metric violation or violations are resolved.
    Type: Application
    Filed: April 28, 2010
    Publication date: November 3, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Eitan Hadar, Kieron John James Connelly, Olga Lagunova, Mitchell Edward Engel, Peter Anthony Lazzaro
  • Patent number: 8051163
    Abstract: Synthetic transactions for a network system are generated based on monitoring of the network system. One or more network system monitoring systems receive network system traffic, traffic monitoring data and/or application runtime data during a monitoring process. The traffic monitoring data may be derived from network system traffic and the application runtime data may be data associated with application transactions. The traffic, traffic monitoring data and application runtime data may contain information regarding the scope and frequency of the functionality tested by the actual traffic received by the network system. Synthetic transactions may be generated and transmitted to test the network system based on the scope and frequency of the functionality tested by actual traffic.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: November 1, 2011
    Assignee: Computer Associates Think, Inc.
    Inventors: Jon Ruiz, Ling Thio, Brian Zuzga
  • Publication number: 20110264571
    Abstract: A system includes a receiving module to receive a purchase inquiry for a cloud computing service from a consumer in a first currency. A pricing module is used to price-out the cloud computing service from a provider where the cloud computing service is provided in a second currency. A reconciliation module reconciles the purchase of the cloud computing service in the consumer's geographical location and currency with the provider's location and currency.
    Type: Application
    Filed: April 26, 2010
    Publication date: October 27, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Eitan Hadar, Debra Jean Danielson
  • Publication number: 20110264471
    Abstract: A system, in a cloud computing environment (“CCE”) includes a data processor. One or more cloud computing auditing components are configured to monitor the CCE in accordance with a predefined insurance level agreement (“ILA”) and to create a log of one or more CCE events indicated by the ILA. A neutral data warehouse is configured to store the log. A reporting module generates one or more reports for a party indicated by the ILA from the log in the neutral data warehouse in accordance with the ILA.
    Type: Application
    Filed: April 26, 2010
    Publication date: October 27, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Debra Jean Danielson, Eitan Hadar
  • Publication number: 20110265064
    Abstract: Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify, use, or share patterns and anti-patterns. Embodiments that include pattern and anti-pattern identification operate to identify candidate patterns and anti-patterns within a deployed system and to confirm or receive confirmation that the identified candidates are indeed patterns or anti-patterns. Embodiments that use patterns and anti-patterns operate to consume the identified patterns and anti-patterns to improve system performance. The embodiments that share patterns and anti-patterns include mechanisms whereby patterns and anti-patterns can be sent to and received from other systems.
    Type: Application
    Filed: April 26, 2010
    Publication date: October 27, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Eitan Hadar, Kieron John James Connelly, Olga Lagunova, Peter Anthony Lazzaro
  • Publication number: 20110265076
    Abstract: A system and method for updating an offline virtual machine are disclosed. The method comprises mounting an image of an offline virtual machine on a host operating system. The method further comprises generating drive-mapping information for the mounted virtual machine image and loading registry information of the mounted virtual machine image onto the host operating system using the drive-mapping information. An update to be applied to the offline virtual machine is determined based on the registry information and a patch bundle is retrieved based on the determination, wherein the patch bundle comprises registry update instructions, file system update instructions, and a patch file. The patch bundle is executed on the host operating system to update the offline virtual machine.
    Type: Application
    Filed: April 21, 2010
    Publication date: October 27, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Nishant Shivajirao Thorat, Bharti Gupta
  • Publication number: 20110265091
    Abstract: This disclosure provides a system and method for normalizing job properties. In one embodiment, a job manager is operable to identify a property of a job, with the job being associated with an operating environment. The job manager is further operable to normalize the property of the job and present the normalized property of the job to a user.
    Type: Application
    Filed: July 8, 2011
    Publication date: October 27, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: An V. Ly, Arun Padmanabhan, Edward F. Chen
  • Publication number: 20110258598
    Abstract: A flexible, platform-independent integration infrastructure is provided. The integration infrastructure may include an integration bridge and at least one plug-in, where the at least one plug-in may include translation rules, mapping rules, and other information associated with a component coupled to the plug-in. The translation rules, mapping rules, and other information may be used by the integration bridge during a mapping process to control communication between components. Based on the rules and information, a mapping translator of the integration bridge converts data received from component into a form readable by another component.
    Type: Application
    Filed: June 24, 2011
    Publication date: October 20, 2011
    Applicant: Computer Associates Think, Inc.
    Inventors: Dushan Fernando, Anthony Candappa, Koustubh Pawar, Nitin Maheshwari
  • Publication number: 20110258209
    Abstract: Efficiently identifying transactions processed by a software application, such as a server application is disclosed. In one embodiment, transactions are identified by applying a set of rules to communications between a client and server to determine whether certain patterns are in the communications. For example, the rules may look for some combination of parameters in the transactions. As a particular example, the rules may be used to look for parameters in HTTP requests. The rules are organized in a way that allows efficient processing. For example, the rules may be organized based on the frequency with which the parameters are expected to occur in the transactions and the frequency with which each transaction is expected to occur. The rules may be updated if the expected frequencies deviate from actual frequencies, such that the rules can be organized for more efficient processing.
    Type: Application
    Filed: April 15, 2010
    Publication date: October 20, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Marco Gagliardi, Neil Desai
  • Patent number: 8042180
    Abstract: A method for combating malicious programs including monitoring network traffic from one or more devices, analyzing the network traffic to determine the presence of a malicious program in the one or more devices and disabling transmission of the network traffic for those of the one or more devices determined to have the malicious program present.
    Type: Grant
    Filed: May 20, 2005
    Date of Patent: October 18, 2011
    Assignee: Computer Associates Think, Inc.
    Inventor: Paul Gassoway
  • Publication number: 20110252087
    Abstract: Network performance is monitored using timing information retrieved from a client device, server in communication with the client, or both. Client side timing information is retrieved using performance monitoring code provided by the server. The code may be provided to the client as part of a content response. Once content in the provided content response is loaded, the code sends the timing information to the server. The server may then process the timing information to calculate response time and other time information metrics.
    Type: Application
    Filed: June 23, 2011
    Publication date: October 13, 2011
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Brian Zuzga, John B. Bley, Mark Jacob Addleman, Krates Ng