Abstract: A method for computer security, includes intercepting an incoming communication, placing the communication into a quarantine queue, selecting a communication from the quarantine queue, determining whether the selected communication contains undesirable code, determining whether a quarantine time for the selected communication has lapsed if the selected communication does not contain undesirable code and placing the selected communication back in the quarantine queue if the quarantine time has not elapsed.
Abstract: A digital signature system includes a database holding access control rules that identify documents authorized users are allowed to have electronically signed and a signing system capable of receiving signature requests from a plurality of authorized users, each signature request including a document to be signed, wherein the signing system parses the document to be signed and compares information obtained thereby to the access control rules stored in the database to determine whether the authorized user is authorized to have the document signed, and wherein if it is determined that the authorized user is authorized to have the document signed, the signing system signs the document using authentication information unique to the signing system.
Abstract: According to one embodiment, a method for managing one or more virtual machines includes generating a request for at least one performance characteristic for at least one virtual machine, the at least one virtual machine being associated with a processing group, the processing group including one or more processing modules; receiving a response to the generated request for at least one performance characteristic for the at least one virtual machine; automatically determining whether an increase in the number of processing modules included in the processing group is required, by analyzing the received response to the generated request; and, in response to a determination that an increase in the number of processing modules included in the processing group is required, automatically adding at least one processing module to the processing group.
Type:
Grant
Filed:
September 30, 2005
Date of Patent:
January 24, 2012
Assignee:
Computer Associates Think, Inc.
Inventors:
Michael R. Chiaramonte, Kouros H. Esfahany, Karthik V. Narayanan
Abstract: Various embodiments include one or more of systems, methods, software, and data structures for dynamic categorization of rules and collections of rules within a rule base, such as a rule base of an expert system. One embodiment provides a computerized method that includes receiving a selection of one or more identifiers of rules in an expert system rule base and receiving a profile definition, the profile definition including metadata, which when processed, yields classification data that classifies the rules in the expert system rule base of the one or more selected rule identifiers. This computerized method further includes storing the profile definition with an association to the one or more selected rule identifiers of rules in the expert system rule base.
Abstract: New code is added to existing object code in order to add new functionality. For example, a call to start a profiler function can be added at the beginning of a Java method and a call to stop the profiler function can be added at the exits of the Java method. A method may have many different exits. To insure that the profiler process is stopped regardless of which exit is performed, the byte code and exception table are modified.
Abstract: A system and method include creating a full backup copy of selected data from a storage device. A series of incremental backups are created over time following the creation of the full backup copy. The oldest incremental backup is merged into the full backup at a desired time.
Abstract: Synthetic transactions for a network system are generated based on monitoring of the network system to determine whether the network system may be blind to traffic. A process determines whether an application within an application server in a network system is processing traffic received by the application server, and whether a web server within the network system and in communication with the application server is receiving traffic that requires processing by the application. The process determines that the network system may be blind to the traffic, and, in response, generates a synthetic transaction instruction and a corresponding synthetic transaction to test whether the network system is blind to the traffic. Based on a response of the network system to the synthetic transaction, the process determines whether there is a malfunction of the application server or a period of low traffic activity of the application server.
Abstract: A method and system for consistent format preserving encryption (C-FPE) are provided to protect sensitive data while the sensitive data is in a domain while allowing encrypted sensitive data to be treated inside the domain as if it were the unencrypted sensitive data. The method includes inserting a transparent coupling into a data flow at a perimeter of the domain, and translating a sensitive data element from an unprotected data element to a protected data element using the transparent coupling such that the sensitive data element is a protected data element within the domain.
Abstract: In accordance with a particular embodiment of the present disclosure, configuration items are received. The configuration items include configuration data for at least one service. Key indicators are received. The key indicators include metrics for the performance of the service. At least one association is identified between the configuration items and the key indicators. A unified service model is generated based on the association. The unified service model includes at least a graphical representation of the service and service requirements.
Type:
Grant
Filed:
April 15, 2008
Date of Patent:
January 17, 2012
Assignee:
Computer Associates Think, Inc.
Inventors:
Greg S. Goodman, Donald E. LeClair, Maurice H. Donegan, III
Abstract: A method and system self-supportable devices and applications are provided. The method and system in one embodiment allows devices and applications to automatically communicate and service themselves, for example, by checking knowledgebase services and other services for instructions on how to handle an exception. In another embodiment, the devices and applications automatically initiate actions needed to handle the exception.
Type:
Grant
Filed:
February 9, 2004
Date of Patent:
January 17, 2012
Assignee:
Computer Associates Think, Inc.
Inventors:
Jacob Lamm, Marvin Waschke, Yaakov Shapiro
Abstract: Apparatuses and methods for system management in a heterogeneous environment are provided. For example, relational query from a software application requesting management information from a specified information source is received and translated to native protocol messages according to an access protocol associated with the information source. The native protocol messages are handled as a transaction with the information source and a result of the transaction is returned to the software application.
Type:
Grant
Filed:
February 24, 2004
Date of Patent:
January 17, 2012
Assignee:
Computer Associates Think, Inc.
Inventors:
Johan van de Groenendaal, Amitava Chakraborty
Abstract: A system for efficiently storing application data which allows a practically infinite number of physically separate storage devices to be used as archival storage means by one or more application programs. Application data is organized among the devices such that files with a similar expiry date (that is the date beyond which the files are no longer required to be archived) are grouped together on the same physical device, such that after the expiry date the device used for such files may be erased and re-used. Optionally, files with particular content-types may be grouped on the same physical device, or among physical devices of the same type.
Abstract: Facilitating performance of an operation in an information life-cycle management system comprising management elements organized levels includes generating a mobile agent operable to perform the operation. The mobile agent is embodied in executable code and is operable to move through at least a portion of the information life-cycle management system. The operation is performed using the mobile agent.
Abstract: In a method embodiment, a method includes periodically polling data sent to an output. The output is operable to render the data into a human-perceptible form. The method further includes determining if at least one partition of a first plurality of discrete partitions of the perdiodically polled data is substantially identical to a combination of respective portions of at least two partitions of a second plurality of discrete partitions of data recorded within a computer-readable storage.
Abstract: According to one embodiment of the present invention, a method for integrating client and server deduplication systems may be provided. In this method, a first hash set of a previous backup session may be received from a server. The first hash set may comprise a plurality of cryptographic values generated using a plurality of data blocks of a first data set of a client. A second hash set may be generated using a plurality of data blocks of a second data set of the client. A deduplicated data set may be generated by the client according to the first hash set and the second hash set and may comprise a plurality of non-redundant data blocks of the second data set. The second hash set and the deduplicated data set may be transmitted to the server.
Type:
Application
Filed:
July 12, 2010
Publication date:
January 12, 2012
Applicant:
COMPUTER ASSOCIATES THINK, INC.
Inventors:
Zhenqiu Fang, Taiwen Zhang, Kai Zhang, Ming Yan, Liqiu Song
Abstract: The disclosure provides a wireless manager operable to receive a request from a mobile device to wirelessly communicate with an enterprise network, with the request including information operable to dynamically identify a location of the mobile device. The wireless manager is further operable to automatically associate an access zone with the mobile device with the access zone comprising at least one logical characteristic, compare the location information to the associated access zone, and, if the location information indicates that the mobile device does not violate the access zone, authorize wireless communications with the enterprise network.
Abstract: Programmatic root cause analysis of application performance problems is provided in accordance with various embodiments. Transactions having multiple components can be monitored to determine if they are exceeding a threshold for their execution time. Monitoring the transactions can include instrumenting one or more applications to gather component level information. For transactions exceeding a threshold, the data collected for the individual components can be analyzed to automatically diagnose the potential cause of the performance problem. Time-series analytical techniques are employed to determine normal values for transaction and component execution times. The values can be dynamic or static. Deviations from these normal values can be detected and reported as a possible cause. Other filters in addition to or in place of execution times for transactions and components can also be used.
Abstract: A method for managing and displaying related information in a graphical user interface includes storing each of a plurality of related datasets in a discrete file. A compound file is stored linking the discrete data files to each other. A common window for the combined file is displayed in the graphical user interface. A discrete window for each discrete file is displayed within the common window.
Abstract: A system for logging database transactions comprises a memory (comprising a direct access storage device) operable to store a database, a database log, and a plurality of log buffers associated with the database log. Each log buffer is operable to store at least one log record associated with a database transaction. The system further comprises a processor operable to log a first record of a first database transaction using the database log and write the database log to the storage device. The processor is further operable to log a second record of a second database transaction in a first of the plurality of log buffers substantially concurrently to the database log being written to the storage device.
Abstract: According to one embodiment of the present invention, a method for abstract internationalization of web applications may be provided. In this method, a first set of object files may be generated according to a locale of a plurality of locales and one or more properties files. Each properties file may be associated with a web application of a plurality of web applications. A localization module operable to facilitate abstract internationalization of a web application may be stored. A request to use the web application may be received from a client. The request may indicate a locale of the client. A second set of one or more object files may be selected according to the web application and the locale of the client. A response comprising markup language that describes the web application, the second set of object files, and the localization module may be generated and transmitted to a client.