Patents by Inventor Philippe Dubost
Philippe Dubost has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200082004Abstract: In one embodiment, a database object stored in a database is identified, and a transaction history associated with the database object is accessed. A criticality level associated with the database object is determined based on the transaction history, and one or more database maintenance tasks associated with the database object are configured based on the criticality level.Type: ApplicationFiled: September 6, 2018Publication date: March 12, 2020Inventors: Philippe Dubost, Jakub Hofman, Vikas Sinha
-
Patent number: 10521407Abstract: A computing device analyzes the transaction entries in a transaction log to identify related commands associated with performing a set of data operations. Commands are considered to be potentially related if the commands are executed within a predetermined timespan. Sets of potentially related commands are then grouped together into corresponding candidate patterns, and further analyzed in view of additional information to determine a probability that the potentially related commands of a candidate pattern are actually related. A confidence value indicating that probability is also determined. Application management tasks, such as database optimization and recovery tasks, for example, may then be performed based on the candidate patterns that meet or exceed a predetermined threshold.Type: GrantFiled: March 31, 2015Date of Patent: December 31, 2019Assignee: CA, Inc.Inventors: Philippe Dubost, Shweta Tiwari, Brian Hughes, Preetdeep Kumar
-
Publication number: 20190294706Abstract: Embodiments of the present disclosure relate to reducing online impact when unloading a database. Initially, a command to unload a database is received. If a last unload file for the database exists, it is detected if data corresponding to the database has been updated since a time corresponding to a last unload timestamp for the last unload file. Based on the detecting, an unload corresponding to the unload command is skipped for the database and machine resources are preserved. If the last unload file for the database has not been altered since the last unload timestamp, an alias is created that points to the last unload file of the database. If the last unload file has been altered or data corresponding to the database has been updated since the last unload timestamp, the database can be unloaded from the last full image copy. In each case, the database remains online.Type: ApplicationFiled: March 22, 2018Publication date: September 26, 2019Inventor: Philippe Dubost
-
Patent number: 10108655Abstract: A computing device analyzes the transaction entries of a recovery log, generates graphical representations of the analysis, and displays the graphical representations in an interactive visual display for a user. The analysis is conducted over a predetermined time period, as defined by a user, and in light of user-defined filter information. The graphs are also categorized into respective groups that are defined by the user. Selecting a point along one of the graphs identifies the commands and objects that were involved in executing those commands.Type: GrantFiled: May 19, 2015Date of Patent: October 23, 2018Assignee: CA, Inc.Inventors: Philippe Dubost, Jan Marek
-
Patent number: 10102122Abstract: A personal computer executes a productivity application that communicates with a mainframe computer via a communications network. The productivity application configures the personal computer to retrieve datasets formatted according to a format associated with the mainframe and convert the data in the datasets to a second format native to the productivity application. While in the second format, a user may modify the data. If so, the productivity application configures the personal computer to convert the data back to the first format, update control fields in the data set, and send the modified dataset back to the mainframe.Type: GrantFiled: September 25, 2015Date of Patent: October 16, 2018Assignee: CA, Inc.Inventors: Maryna Pavlienova, Corinne Destefano, Philippe Dubost
-
Publication number: 20180287967Abstract: According to a computer-implemented method, a scheduling request is received to schedule a user in a shared calendar system as a participant in a meeting to occur on a specified date. Based on a predefined meeting policy, a determination is made of a maximum permissible quantity of meetings for the user to participate in during a predefined time period that includes the specified date. A quantity of meetings in the shared calendar system that are already scheduled for the user to occur within the predefined time period is compared to the maximum permissible quantity of meetings for the user. Based on the comparing indicating that the quantity of meetings already scheduled is greater than or equal to the maximum permissible quantity of meetings, a notification is transmitted to the user to indicate that that approval of the scheduling request would violate the predefined meeting policy.Type: ApplicationFiled: June 4, 2018Publication date: October 4, 2018Inventor: Philippe Dubost
-
Patent number: 10089334Abstract: A computing device analyzes the transaction entries in a transaction log to identify related commands associated with performing a set of data operations. Commands are considered to be potentially related if the commands are executed within a predetermined timespan. Sets of potentially related commands are then grouped together into corresponding candidate patterns, and further analyzed in view of additional information to determine a probability that the potentially related commands of a candidate pattern are actually related. A confidence value indicating that probability is also determined. Application management tasks, such as database optimization and recovery tasks, for example, may then be performed based on the candidate patterns that meet or exceed a predetermined threshold.Type: GrantFiled: March 26, 2015Date of Patent: October 2, 2018Assignee: CA, Inc.Inventors: Philippe Dubost, Shweta Tiwari, Brian Hughes, Preetdeep Kumar
-
Patent number: 10075448Abstract: A technique is disclosed to manage password setup such as may be integrated within a login authentication setup process. In response to an initiated password setup process associated with an active client account, a password manager determines whether at least two functional keyboard layouts are associated with the active client account. If at least two functional keyboard layouts are associated with the active client account, the password manager retrieves character position mappings for the at least two functional keyboard layouts. The password manager identifies character position inconsistencies among the at least two functional keyboard layouts based, at least in part, on the retrieved character position mappings. The password manager restricts utilization during password setup of at least one keyboard character based, at least in part, on the identified character position inconsistencies.Type: GrantFiled: June 6, 2016Date of Patent: September 11, 2018Assignee: CA, Inc.Inventor: Philippe Dubost
-
Patent number: 10073868Abstract: A pair of system tables are created in a system tablespace of a database and store free-form data that is defined by, and provided by, an end user. The information in a first system table determines whether a user table in a user tablespace of the database is capable of being annotated with the free-form data. The second system table stores the free-form data that is used to annotate that user table. So maintained, third parties can access the free-form data for analysis.Type: GrantFiled: December 4, 2013Date of Patent: September 11, 2018Assignee: CA, Inc.Inventor: Philippe Dubost
-
Patent number: 9992138Abstract: According to a computer-implemented method, a scheduling request is received to schedule a user in a shared calendar system as a participant in a meeting to occur on a specified date. Based on a predefined meeting policy, a determination is made of a maximum permissible quantity of meetings for the user to participate in during a predefined time period that includes the specified date. A quantity of meetings in the shared calendar system that are already scheduled for the user to occur within the predefined time period is compared to the maximum permissible quantity of meetings for the user. Based on the comparing indicating that the quantity of meetings already scheduled is greater than or equal to the maximum permissible quantity of meetings, a notification is transmitted to the user to indicate that that approval of the scheduling request would violate the predefined meeting policy.Type: GrantFiled: July 26, 2013Date of Patent: June 5, 2018Assignee: CA, Inc.Inventor: Philippe Dubost
-
Publication number: 20170353470Abstract: A technique is disclosed to manage password setup such as may be integrated within a login authentication setup process. In response to an initiated password setup process associated with an active client account, a password manager determines whether at least two functional keyboard layouts are associated with the active client account. If at least two functional keyboard layouts are associated with the active client account, the password manager retrieves character position mappings for the at least two functional keyboard layouts. The password manager identifies character position inconsistencies among the at least two functional keyboard layouts based, at least in part, on the retrieved character position mappings. The password manager restricts utilization during password setup of at least one keyboard character based, at least in part, on the identified character position inconsistencies.Type: ApplicationFiled: June 6, 2016Publication date: December 7, 2017Inventor: Philippe Dubost
-
Publication number: 20170242876Abstract: A computing device managing a database receives a database command comprising first and second identifiers identifying first and second datasets, respectively, in the database. The database command further comprises a key translation indicator identifying a key value translation function. Responsive to receiving the database command, the computing device generates a translated key value from a primary key value of a first record in the first dataset using the key value translation function, and generates a second record in the second dataset. The second record comprises the translated key value. Subsequently, the computing device selects the first and second records from the first and second datasets, respectively. To select the first and second records, the computing device applies the key value translation function to one of the primary or translated key value to determine the other of the primary or translated key value.Type: ApplicationFiled: February 22, 2016Publication date: August 24, 2017Inventor: Philippe Dubost
-
Patent number: 9684687Abstract: Each row of data in a first database table is associated with a plurality of time thresholds that indicate, respectively, when a given row of data in the first table is current, stale, or expired. When a given row of data expires, that row is moved from the first table to a second database table that stores expired data. One of the time thresholds indicates a predetermined amount of time that the expired data will be maintained in the second table. Once that threshold expires, that row of data is deleted from the second table. Until then, however, a user may issue queries to access the expired data along with the current data and the stale data.Type: GrantFiled: March 10, 2014Date of Patent: June 20, 2017Assignee: CA, Inc.Inventor: Philippe Dubost
-
Publication number: 20170094028Abstract: A personal computer executes a productivity application that communicates with a mainframe computer via a communications network. The productivity application configures the personal computer to retrieve datasets formatted according to a format associated with the mainframe and convert the data in the datasets to a second format native to the productivity application. While in the second format, a user may modify the data. If so, the productivity application configures the personal computer to convert the data back to the first format, update control fields in the data set, and send the modified dataset back to the mainframe.Type: ApplicationFiled: September 25, 2015Publication date: March 30, 2017Inventors: Maryna Pavlienova, Corinne Destefano, Philippe Dubost
-
Publication number: 20160342656Abstract: A computing device analyzes the transaction entries of a recovery log, generates graphical representations of the analysis, and displays the graphical representations in an interactive visual display for a user. The analysis is conducted over a predetermined time period, as defined by a user, and in light of user-defined filter information. The graphs are also categorized into respective groups that are defined by the user. Selecting a point along one of the graphs identifies the commands and objects that were involved in executing those commands.Type: ApplicationFiled: May 19, 2015Publication date: November 24, 2016Inventors: Philippe Dubost, Jan Marek
-
Publication number: 20160283529Abstract: A computing device analyzes the transaction entries in a transaction log to identify related commands associated with performing a set of data operations. Commands are considered to be potentially related if the commands are executed within a predetermined timespan. Sets of potentially related commands are then grouped together into corresponding candidate patterns, and further analyzed in view of additional information to determine a probability that the potentially related commands of a candidate pattern are actually related. A confidence value indicating that probability is also determined. Application management tasks, such as database optimization and recovery tasks, for example, may then be performed based on the candidate patterns that meet or exceed a predetermined threshold.Type: ApplicationFiled: March 26, 2015Publication date: September 29, 2016Inventors: Philippe Dubost, Shweta Tiwari, Brian Hughes, Preetdeep Kumar
-
Publication number: 20160283584Abstract: A computing device analyzes the transaction entries in a transaction log to identify related commands associated with performing a set of data operations. Commands are considered to be potentially related if the commands are executed within a predetermined timespan. Sets of potentially related commands are then grouped together into corresponding candidate patterns, and further analyzed in view of additional information to determine a probability that the potentially related commands of a candidate pattern are actually related. A confidence value indicating that probability is also determined. Application management tasks, such as database optimization and recovery tasks, for example, may then be performed based on the candidate patterns that meet or exceed a predetermined threshold.Type: ApplicationFiled: March 31, 2015Publication date: September 29, 2016Inventors: Philippe Dubost, Shweta Tiwari, Brian Hughes, Preetdeep Kumar
-
Patent number: 9111037Abstract: A computer-implemented method is disclosed in which locations of a plurality of Job Control Language (JCL) tests are obtained from a primary database supporting a software testing management platform. The locations the locations of the plurality of JCL tests are transmitted to a mainframe computing system (MCS) to initiate execution of the JCL tests. Based on transmitting the JCL test locations, execution IDs are retrieved for each of the plurality of JCL tests from the MCS. For each JCL test, the execution ID and an initial status of the JCL test are stored in the primary database. A query is transmitted to the MCS to determine an execution status of a given one of the JCL tests. Based on transmitting the query, a status update is received from the MCS for the JCL test, and the initial status of the JCL test in the primary database is selectively updated.Type: GrantFiled: August 21, 2013Date of Patent: August 18, 2015Assignee: CA, Inc.Inventors: Srdjan Nalis, Philippe Dubost
-
Patent number: 8966325Abstract: A method receiving a first alert indicating a fault associated with a first node of a plurality of nodes. The method further includes determining a first value indicating a measure of reliability for the first node based on an amount of first node downtime associated with the first alert and a severity of the first alert.Type: GrantFiled: September 6, 2012Date of Patent: February 24, 2015Assignee: CA, Inc.Inventors: Robin L. K. Hopper, Philippe Dubost
-
Publication number: 20140068329Abstract: A method receiving a first alert indicating a fault associated with a first node of a plurality of nodes. The method further includes determining a first value indicating a measure of reliability for the first node based on an amount of first node downtime associated with the first alert and a severity of the first alert.Type: ApplicationFiled: September 6, 2012Publication date: March 6, 2014Applicant: Computer Associates Think, Inc.Inventors: Robin L.K. Hopper, Philippe Dubost