Computer Associates Think, Inc. Patent applications |
Patent application number | Title | Published |
20140068329 | Identifying Unreliable Parts in an IT Infrastructure - A method receiving a first alert indicating a fault associated with a first node of a plurality of nodes. The method further includes determining a first value indicating a measure of reliability for the first node based on an amount of first node downtime associated with the first alert and a severity of the first alert. | 03-06-2014 |
20140040629 | OTP GENERATION USING A CAMOUFLAGED KEY - A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP. | 02-06-2014 |
20130305046 | System and Method for Virtual Machine Data Protection in a Public Cloud - According to one embodiment of the present disclosure, a method includes partitioning a disk image file into a plurality of segments. The method also includes generating a unique key for each segment, storing the unique keys in an image mapping file, and transmitting the image mapping file to a particular one of a plurality of nodes on a network. The method further includes transmitting a first segment and a second segment of the plurality of segments to different nodes of the plurality of nodes. | 11-14-2013 |
20130275541 | REPARSE POINT REPLICATION - Systems and methods for replicating data from a master server to a replica or backup server include capturing a read event associated with a retrieved file at the master server. The retrieved file may be generated by updating a reference file with remotely stored data. Attributes associated with the retrieved file may be checked to determine if they include attributes associated with the reference file, and if they do not, at least a portion of data and one or more attributes of the retrieved file may be copied or replicated to the replica server. The captured read event may be generated when an application attempts to access or read the retrieved file. An event associated with generation of the reference file may also be captured at the master server, and copies to the replica server. | 10-17-2013 |
20130275367 | System and Method for Automated Online Reorganization of Sequential Access Databases - Various systems, non-transitory computer readable media, and methods for reorganizing data records of a database are provided. For example, a system may use an efficiency parameter that indicates a satisfactory level of organizational efficiency of at least a portion of a database table having a group of rows stored using a plurality of data blocks. The system may determine an efficiency of the group of rows based on a number of data block changes that occur during a sequential access of the group of rows. When the determined efficiency is less than the efficiency indicated by the efficiency parameter, the server may generate a control card to reorganize the group of rows when the efficiency is not satisfactory. The control card is used by an online reorganization process that reorganizes the group of rows. | 10-17-2013 |
20130254875 | System and Method for Risk Assessment of Login Transactions Through Password Analysis - A system and method is provided for determining a risk associated with a login transaction. A password received during the login attempt and determination is made regarding whether the received password is derived form user information. A risk is determined based on a determination that the received password is derived from the user information. | 09-26-2013 |
20130254858 | Encoding an Authentication Session in a QR Code - A system and method is provided for authenticating logins. An authentication server may receive a request for an authentication code from a requesting site, wherein the request is associated with a login session being performed via the requesting site and a first device associated with a user. The authentication server may generate the authentication code, wherein the authentication code comprises a universally unique identifier and an identifier that identifies the authentication server. The authentication server may communicate the generated authentication code to the requesting site. The authentication server may receive the universally unique identifier from a second device associated with the user, wherein the universally unique identifier is retrieved by decoding an optically captured representation of the authentication code at the second device. The authentication server may determine whether the login session is authenticated based on the universally unique identifier. | 09-26-2013 |
20130232206 | SELF-MANAGEMENT OF GROUP EMAIL RECEPTION - A method for self-managing group membership is disclosed. The method has a portion operating on a client terminal. The client-side portion includes determining if an email received at an email address is an intra-organizational email from a mailbox of a group. Additionally, the method provides a graphical interface element when the received email is determined to be an intra-organizational email from a mailbox of a group. The graphical interface element is configured to selectablely transmit a remove instruction to the group. Moreover, the method has a portion operating on a server. The server-side portion includes receiving the remove instruction; identifying a sender of the remove instruction; locating the sender in the group member list; and unsubscribing the sender from the group member list. | 09-05-2013 |
20130232109 | METHODS AND SYSTEMS FOR PERFORMING THREE-WAY MERGE OF MODELS - A method for implementing data model management at a first client application including: receiving a data model from a repository; generating a first delta from changes made to the data model; detecting whether a second delta, which is generated by a second client application from changes made to the data model at the second client application, is stored in the repository; and sending the generated first delta to the repository when the second delta is not stored in the repository. When the second delta is stored in the repository, the method includes steps of requesting the second delta generated by the second client application from the repository; generating a merged delta by merging the first delta with the second delta; and sending the merged delta to the repository. A system for implementing the data model management method. | 09-05-2013 |
20130227710 | SYSTEM AND METHOD FOR SECURING LEASED IMAGES IN A CLOUD ENVIRONMENT - Provided is a system, method, and computer-readable storage medium having one or more computer-readable instructions thereon for providing leased images in cloud computing environments. The method includes monitoring a usage of a leased image provided by a cloud vendor, by a client computing device. A threshold period of time associated with the usage is determined. Whether an access to the leased image should be terminated based upon an expiry of the threshold period of time or based upon a request received from the client computing device is determined. The image is locked based upon whether the access to the leased image should be terminated. An access request received for the locked image is monitored; and access to the locked image is enabled when it is determined that the access request is valid. | 08-29-2013 |
20130227699 | SYSTEM AND METHOD FOR VIRTUAL IMAGE SECURITY IN A CLOUD ENVIRONMENT - Provided herein are systems and method enabling secure virtual image access in a virtual or cloud computing environment. The systems and methods include assigning a status to indicator to guest virtual machines (virtual images) that provide applications and other services to cloud consumers in the cloud environment. A virtual appliance machine in the cloud environment maintains the status of the guest virtual machines and makes decisions based on the status as to whether to allow access to the guest virtual machines. These decisions are transmitted to local elements on the guest virtual machines, which enforce access control on a local level. In this manner, unauthorized virtual image access is prevented providing increased security and data integrity. | 08-29-2013 |
20130227550 | SYSTEM AND METHOD FOR ISOLATED VIRTUAL IMAGE AND APPLIANCE COMMUNICATION WITHIN A CLOUD ENVIRONMENT - Provided herein are systems and methods for providing isolated virtual image communication in a virtual computing environment. Initially, a guest virtual machine that is activated in a virtual computing environment may be isolated into a private network. A service request may then be formulated at the guest virtual machine and addressed to a predetermined non-existent address. The request is then ostensibly sent to the predetermined address, whereupon the service request is actually transmitted to a shared resource with a security appliance machine in the virtual computing environment. The request is then forwarded to the security appliance machine and a reply formulated. The reply is sent back to the guest virtual machine via the shared resource. | 08-29-2013 |
20130219069 | SYSTEM AND METHOD FOR MANAGING VIRTUAL HARD DISKS IN CLOUD ENVIRONMENTS - A system, method, and computer-readable storage medium for managing virtual hard disks in a cloud computing/storage environment are provided. The method includes associating, using a virtual hard disk (VHD) management system of a server device, a plurality of data blocks of a virtual hard disk stored at a cloud vendor to a corresponding plurality of cloud objects. A plurality of cloud object identifiers associated with the plurality of cloud objects in a first cloud allocation table are stored. Changes to one or more data blocks are determined. Corresponding new cloud allocation tables for every data block in the plurality of data blocks that has changed are formed, the new cloud allocation tables having corresponding new cloud object identifiers. The first and the new cloud allocation tables are downloaded and merged to form an updated cloud allocation table. The updated cloud allocation table is uploaded to the cloud vendor. | 08-22-2013 |
20130214043 | ENCODED PICTURE IDENTIFICATION - An identification device includes a computer readable code. The computer readable code includes data relating to one or more pictures of a person and identity data for the person. The computer readable code is readable by a device reader, and the device reader is configured to interpret the computer readable code and to display the picture of the person using the computer readable code data relating to the picture of the person. | 08-22-2013 |
20130212122 | System and Method for Controlling Access to a Database Object - According to one embodiment of the present disclosure, a method includes receiving a query from a user, the query requesting access to a database object in a first database table, the database object comprising a first column and a second column. The method also includes determining whether the user is authorized to access the database object based on the first column, and determining whether the user is authorized to access the database object based on the second column. The method further includes allowing the user to access to database object in response to determining the user is authorized to access the database object based on the first column or the second column. | 08-15-2013 |
20130212117 | Discovery of Asset Information Through Scanning of Communication Tags Associated with Assets - In some embodiments, a mobile device includes an interface configured to scan information from a communication tag associated with an asset, a memory operable to store the information, and a processor communicatively coupled to the memory. The information comprises a header describing the information, business application data, and asset identification data uniquely identifying the asset. The processor is configured to extract the business application data from the information scanned from the communication tag and extract the asset identification data from the information scanned from the communication tag. | 08-15-2013 |
20130204992 | Effective Visualization of an Information Technology Environment Through Social Scoring - According to one embodiment, a method may include providing a representation of each of a plurality of nodes of an information technology (IT) environment to a plurality of administrators responsible for maintaining the IT environment. A plurality of scores for each of two or more of the plurality of nodes may be received. Each score may provide an assessment of a respective node of the plurality of nodes. One or more display characteristics may be determined for each node for which one or more scores was received. The display characteristics may comprise a size of a respective node that is based on the scores received for the respective node. The display characteristics may be provided to at least one administrator of the plurality of administrators responsible for maintaining the IT environment. | 08-08-2013 |
20130185716 | SYSTEM AND METHOD FOR PROVIDING A VIRTUALIZED REPLICATION AND HIGH AVAILABILITY ENVIRONMENT - The system and method described herein may provide a virtualized replication and high availability environment. In particular, a virtualized production server may run one or more virtual machines in one or more child partitions and have a replication and high availability engine installed in a parent partition. The replication and high availability engine may automatically discover the virtual machines running in the child partitions and automatically synchronize all files associated with the virtual machines to a virtualized replica server. Furthermore, the replication and high availability engine may continuously replicate subsequent changes to the files associated with the virtual machines running in the child partitions to the virtualized replica server, which may then create on-demand virtual machines from the synchronized and replicated files to handle switchover, failover, switchback, and failback events associated with the virtualized production server or the virtual machines running in the child partitions associated therewith. | 07-18-2013 |
20130173789 | METHOD AND SYSTEM FOR MACHINE IDENTIFICATION - A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated. | 07-04-2013 |
20130152194 | SYSTEM, METHOD AND SOFTWARE FOR CONTROLLING ACCESS TO VIRTUAL MACHINE CONSOLES - A system and method for controlling access to virtual machine consoles. The system includes a console access controller configured to register an owner to a virtual machine to open a defined limit of consoles and capture the defined limit of consoles. An image console control is configured to receive a request to check-out one or more of the captured consoles in one of an exclusive mode and a shared mode and determine whether the check-out request was made by the owner. The console access controller is further configured to open the one or more captured consoles in the exclusive mode to the owner if the check-out request is made by the owner and recapturing the one ore more consoles in response to a check-in request from the owner. | 06-13-2013 |
20130152064 | Classloader/Instrumentation Approach For Invoking Non-Bound Libraries - An agent object can invoke one or more methods of an application object using a helper object. The application object passes a reference to itself to the agent object. The agent object identifies a class loader of the application from the reference. The agent object obtains byte code of a helper class and uses the byte code of the helper class to creating a helper class loader. A parent of the helper class loader is set as the class loader of the application. The helper class loader is used to load the helper class and define an instance of the helper object. Using the helper object, the one or more methods of the application object are invoked by the agent using casting, without having a direct class loader connection with the class loader of the application. | 06-13-2013 |
20130145349 | Metadata Merging In Agent Configuration Files - A technique for updating agent software which controls an agent, including how the agent adds instrumentation to an application and how the agent process data from the instrumentation. A current configuration file and an updated configuration file are evaluated in view of rules, to create a merged configuration file. The files include metadata entries. The rules can include: delete a current configuration file, not merge a current configuration file with an updated configuration file, overwrite a current configuration file with an updated configuration file, delete a metadata entry, prefer an entry in the configuration file over a corresponding entry in the updated configuration file, and prefer an entry in the updated configuration file over the corresponding entry in the configuration file. Customized entries in the current configuration file can be maintained if appropriate. Entries which are not maintained are kept in the merged configuration file as inline comments for documentation. | 06-06-2013 |
20130139179 | METHOD AND SYSTEM FOR TIME-BASED CORRELATION OF EVENTS - A method includes receiving event information corresponding to an event associated with the operation of a system. The method also includes identifying related event information corresponding to a plurality of events that occurred before the event, wherein the event is related to the plurality of events. The method also includes storing the event information and the related event information as a group of events. The method further includes determining whether the group of events occurred within a first specified amount of time by identifying a time window ending at the occurrence of the event and beginning the first specified amount of time before the occurrence of the event and determining whether each event of the group of events occurred during the identified time window. The method further includes identifying an incident associated with the group of events upon determining that the group of events occurred within the first specified amount of time. | 05-30-2013 |
20130138681 | METHOD AND SYSTEM FOR METADATA DRIVEN PROCESSING OF FEDERATED DATA - A method includes identifying a first set of metadata associated with a database and retrieving the first set of metadata from one or more first memory locations. The method also includes identifying, based on the first set of metadata, a second set of metadata associated with the database and retrieving the second set of metadata from one or more second memory locations. The method further includes combining the first set of metadata and the second set of metadata into a set of combined metadata. | 05-30-2013 |
20130133066 | TRANSACTION-BASED INTRUSION DETECTION - Systems and methods are provided for intrusion detection. The systems and methods may include receiving transaction information related to one or more current transactions between a client entity and a resource server, accessing a database storing a plurality of transaction groups, analyzing the received transaction information with respect to information related to at least one of the plurality of transaction groups, and based on said analyzing, determining a possibility of an occurrence of an intrusion act at the resource server. The transaction groups may be formed based on a plurality of past transactions between a plurality of client entities and the resource server. Identity information of a user associated with the one or more current transactions may also be received along with the transaction information. The user may be associated with at least one of the plurality of transaction groups. | 05-23-2013 |
20130132457 | SYSTEM AND METHOD FOR HAND-OFFS IN CLOUD ENVIRONMENTS - A system, method, and computer-readable storage medium for handling hand-offs in a cloud computing environment is provided. The method includes identifying, at a cloud governance module of a server device, a plurality of applications executing on a plurality of servers belonging to a plurality of cloud computing service providers. The method includes determining based upon information in a policy module, to hand-off an execution of at least one identified application executing on a first cloud computing service provider platform to a second cloud computing service provider, determining whether the second cloud computing service provider satisfies one or more governance policies associated with the at least one identified application, and handing-off the execution of the at least one identified application to a second cloud computing provider platform based upon the second cloud computing provider being compliant with the one or more governance policies associated with the at least one identified application. | 05-23-2013 |
20130129161 | System and Method for Using Fingerprint Sequences for Secured Identity Verification - According to one embodiment of the present disclosure, a method includes receiving session information including first fingerprint data corresponding to each of one or more fingers presented by an individual in a sequence on a sensor. The method also includes comparing the session information to stored information associated with the individual. The method further includes determining whether the identity of the individual is verified based on the session information and the sequence. | 05-23-2013 |
20130111504 | DIALOG TO SERVICE CONVERSION METHOD AND SYSTEM | 05-02-2013 |
20130104125 | System and Method for License Management of Virtual Machines at a Virtual Machine Manager - According to one embodiment of the present disclosure, a method includes receiving an event notification from a virtual machine manager operable to control the execution of one or more virtual machines, the event notification corresponding to a first virtual machine and indicating an event type associated with the first virtual machine. The method also includes updating an inventory indicating a number of active instances of one or more applications based on the event notification. The method further includes determining compliance or non-compliance with one or more license policies based on the inventory, each license policy corresponding to at least one of the one or more applications. | 04-25-2013 |
20130103990 | CHANGE MANAGEMENT SYSTEM AND METHOD - A method is provided for managing changes to a computer system. The method includes generating a database configured with fields identifying one or more component changes and potential problems associated with each one or more component changes; populating the fields of the database with information as a change is made to a computer system; monitoring the computer system for issuance of error alerts; comparing issued error alerts against entries of potential problems in the database; and identifying a set of at least one of the component changes as a potential cause of the issued error alert based on the result of the comparing step. The method executes a corrective process in response to the identification of the potential cause of the issued error and updates the database entry of the set of at least one of the component changes to reflect the issued error as a confirmed error thereof. | 04-25-2013 |
20130090915 | SYSTEM AND METHOD FOR MIXED-LANGUAGE SUPPORT FOR APPLICATIONS - Provided are systems and methods for providing multilingual support for users in a computing environment. The systems and methods may receive and store communications from a user in a first language. If the first language does not match a standard language of the environment, the communication may be translated to the standard language. If a subsequent access request for the stored communication is received, it may be determined whether a language associated with the request matches the standard or first language. If there is a match, the stored original user communication or the stored standard language version maybe returned. If the access request language does not match either language, the user communication may be translated to a language associated with the request directly from the stored original user communication. | 04-11-2013 |
20130089850 | Method and Tool to Assess the Vitality of Technical Communities of Practice - A system and method is provided for assessing a technical community. A plurality of characteristics that each describe an aspect of the technical community may be retrieved. An interface that displays the plurality of characteristics as queries to be answered by a member of the technical community may be generated. An input for each characteristic may be received, wherein each input comprises a quantitative input that provides a qualitative opinion of the member of the technical community for a corresponding characteristic. A score based on at least one input may be generated. The score may provide the assessment of the technical community. | 04-11-2013 |
20130073714 | System and Method for Data Set Synchronization and Replication - According to one embodiment of the present disclosure, a method for synchronizing data sets includes receiving a request to synchronize a first data set associated with a first server and a second data set associated with a second server. The method also includes determining, with reference to one or more replication constraints, whether to begin synchronization. The method further includes applying one or more resource control actions in response to determining to begin synchronization. | 03-21-2013 |
20130066854 | UPPER LAYER STATEFUL NETWORK JOURNALING - A system includes a computer processor that is configured to implement an upper layer stateful application network journaling process. The process includes recording and managing individual client actions on each server in a network. The recording and managing of the individual client actions executes at an application layer of a network protocol stack of the network. The process also includes recording and managing a server status snapshot on a per client basis. The recording and managing of the server status snapshot executes at the application layer of the network protocol stack of the network. | 03-14-2013 |
20130064475 | SYSTEM AND METHOD PROVIDING A PLUGGABLE ARCHITECTURE FOR TASK MANAGEMENT ON COMPUTERS - A system and method retrieve an image using a first computer processor, and transmit the image from the first computer processor to a second remote computer processor. The first computer processor and the second remote computer processor are coupled via a network connection. The image is received at the network connection, and the image is a lightweight operating system that is configured to be stored in and execute in a virtual memory coupled to the second remote computer processor. The second remote computer processor is not equipped with additional hardware or an agent to receive or execute the image. | 03-14-2013 |
20130061219 | System and Method for Self-Aware Virtual Machine Image Deployment Enforcement - According to one embodiment of the present disclosure, a method includes receiving a request to instantiate a virtual machine image in a virtualization environment. The method also includes sending a request for verification of the virtualization environment. The method further includes receiving information from the enforcement module in response to the request for verification of the virtualization environment. The method further includes determining whether the virtualization environment is verified based on the information received. | 03-07-2013 |
20130060824 | SYSTEM FOR EMBEDDED KNOWLEDGE MANAGEMENT - A system includes a toolbar configured to receive a knowledge nugget relating to a software architecture. The knowledge nugget includes information relating to the software architecture, an identification of the creator of the knowledge nugget, a link to information relating to the knowledge nugget, a blog relating to the knowledge nugget, a tag to enable search and retrieval of the knowledge nugget, and a point of contact for discussion relating to the knowledge nugget. The toolbar is further configured to analyze the knowledge nugget, and to store the knowledge nugget in a transient database or a permanent database as a function of the analysis. | 03-07-2013 |
20130054909 | System and Method for Backing Up Data - In accordance with one embodiment of the present disclosure, a method includes receiving second information about second data stored on a second device. The method also includes determining that the second data is associated with first data stored on a first device. The method further includes, based on the determination about the second data, associating the second data with a policy for backing up a particular type of data. The method further includes initiating a transfer of one or more copies of the second data to a second one or more storage medias defined by the policy. | 02-28-2013 |
20130054781 | SYSTEM AND METHOD FOR ENHANCING EFFICIENCY AND/OR EFFICACY OF SWITCHOVER AND/OR FAILOVER IN PROVIDING NETWORK BASED SERVICES WITH HIGH AVAILABILITY - A system is configured to provide a suite of network-based services to users with high availability. The suite of network-based services may include browser-based collaboration functions, process management functions, index functions, search functions, help search functions, document-management functions, and/or other functions. The suite of network-based services may correspond to services provided by a server application such as Microsoft® SharePoint™ being executed on one or more processors of one or more servers. As used herein, the term “high availability” may refer a system design protocol that ensures a certain degree of operational continuity during a given measurement period. | 02-28-2013 |
20130054529 | SHADOW COPY BOOKMARK GENERATION - Systems and methods for generating a bookmark for a snapshot of one or more volumes of a production server include initiating a snapshot process to capture a shadow copy of a snapshot-volume set, which includes one or more volumes of the production server. The snapshot process (e.g., Volume Shadow Copy Service of Windows™ operating system) may include (a) temporarily freezing operations on a file system of the production server, and (b) releasing a freeze of operations on the file system of the production server. A bookmark for the shadow copy (representing a consistent state of the associated volumes) may be generated such that the bookmark corresponds to a completion of the temporarily freezing or releasing a freeze of the operations. The bookmark may include a point in time of the completion of the temporarily freezing or releasing the freeze of the operations. | 02-28-2013 |
20130047169 | Efficient Data Structure To Gather And Distribute Transaction Events - A technique for monitoring software which efficiently communicates transaction trace data, including static and dynamic data, from an agent to a manager. Corresponding tree data structures are maintained by the agent and manager which describe sequences of invoked components of a monitored application. The start and end of each component are each represented by a node in a branch of the tree data structure. To identify a transaction from a transaction trace, the agent can identify a matching branch, and communicate a unique identifier of the branch, such as an identifier of its last node, to a manager, with dynamic data such as start and end times of components. The manager looks up the sequences of invoked of components based on the identifier, and provides a display of the transaction trace. The trace can be annotated with static data indexed to the matching branch. | 02-21-2013 |
20130046798 | METHOD AND APPARATUS FOR VISUALIZATION OF INFRASTRUCTURE USING A NON-RELATIONAL GRAPH DATA STORE - A system and method for visualization of an infrastructure is presented. The system comprises a non-relational graph data store caching data from one or more of a relational or non-relational data store, a graph visualization software operable to perform the visualization of the infrastructure using the cached data in the non-relational graph data store, and a graph database operable to implement analytic queries available to the graph visualization software through an exposed Application Program Interface. In one aspect, the graph database collects the cached data from the one or more relational or non-relational graph data stores. In one aspect, the cached data comprises nodes representing elements of the infrastructure, and links representing relationships among the nodes. In one aspect, the infrastructure is an IT infrastructure. | 02-21-2013 |
20130046739 | SYSTEM AND METHOD FOR RECONCILING DUPLICATE CONFIGURATION ITEMS IN A CONFIGURATION MANAGEMENT DATABASE - The system and method described herein may be used to reconcile duplicate configuration items in a configuration management database. In particular, corresponding properties that represent relationships with a trial configuration item and an existing configuration item may be compared to reconcile whether the trial configuration item corresponds to the existing configuration item and should therefore be combined with the existing configuration item, or alternatively whether the trial configuration item represents a new configuration item that can be added to the configuration management database. If comparing the properties associated with the trial configuration item and the existing configuration item results in an indeterminate outcome, a reconciliation engine may inspect a table stored directly on the trial configuration item and/or the existing configuration item to reconcile whether the trial configuration item and the existing configuration item are indeed different or identical. | 02-21-2013 |
20130042222 | AUTOMATING FUNCTIONALITY TEST CASES - A computer implemented method and system including techniques for developing and executing automated test cases are described herein. In one embodiment, a test case automation tool provides functionality for defining an automated test set and associated test cases within a testing user interface without the use of scripting languages or compiled programming. The definition of each test case may occur within a testing user interface, including displaying and receiving user selection of available methods for testing; displaying user parameter fields and receiving user parameter values in response for testing; abstracting parameter types in the user parameter values; and generating XML-format definitions of the test case. The test case automation tool may then execute the selected methods of the software application using parameters provided in the XML-format definitions, and return testing results of the test case execution. | 02-14-2013 |
20130041987 | System and Method for Deploying a Dynamic Virtual Network Address Translation Appliance - According to one embodiment of the present disclosure, a method for deploying a virtual network address translation (NAT) appliance includes receiving a request to generate a virtual machine environment. The method also includes generating the virtual machine environment from an environment template, the virtual machine environment comprising a first virtual machine. The method further includes configuring a hostname for a virtual NAT appliance instance, and configuring one or more private network settings for the virtual NAT appliance instance. The method also includes generating the virtual NAT appliance instance from the NAT appliance template, the NAT appliance instance comprising a public network interface and a private network interface. | 02-14-2013 |
20130024481 | UNIFIED-INTERFACE FOR STORAGE PROVISIONING - Systems and methods are provided for storage platform-independent storage provisioning. The systems and methods may include receiving a storage provisioning request from a user interface, processing the storage provisioning request to determine one or more of a plurality of storage resources utilized to complete the storage provisioning request, generating an instruction to provision a data storage space among the one or more of the plurality of storage resources, and provisioning the data storage space based on the instruction. Each of the plurality of storage resources may include an interface configuration, and at least two interface configurations are different from one another. Each of the plurality of storage resources may be accessible and operational in accordance with the interface configuration thereof. The processing of a storage provisioning request may include determining at least one of a nature of the storage provisioning request, or an application associated with the storage provisioning request. | 01-24-2013 |
20130024425 | BACKUP FILE PRIORITY SYSTEM AND METHOD - A system and method include initiating a backup of system files on a computer system. A user selected priority is checked for each file. Files having a higher user selected priority are backed up prior to attempting to back up files having a lower user selected priority, wherein the files are backed up to a storage device as a function of storage space available on the storage device. | 01-24-2013 |
20130013651 | System and Method for Analyzing Sequential Data Access Efficiency - A system and method is provided for determining a sequential access efficiency for a database table. A number of data block changes that occur during a sequential access of a plurality of rows in a database table may be determined. The sequential access efficiency may be determined based on the determined number of data block changes. | 01-10-2013 |
20120324280 | SYSTEM AND METHOD FOR DATA DISASTER RECOVERY - A system includes a production computer machine that includes an operating system and a driver stack. The driver stack includes a file system layer, a recovery driver, a storage layer, a driver layer, a bus driver layer, and a storage device. The system also includes a backup computer processor coupled to the production computer machine via the recovery driver. The recovery driver is configured to commence a recovery of data from the backup computer processor, receive a disk access request from the file system layer, determine if the disk access request accesses data that has not yet been recovered from the backup computer processor, and initiate an on-demand recovery request from the backup computer processor when the data has not been recovered from the backup computer processor. | 12-20-2012 |
20120323976 | SYSTEM AND METHOD FOR AUTOMATICALLY ROUTING AND MANAGING STORED DOCUMENTS BASED ON DOCUMENT CONTENT - A system and method for routing and managing documents based on document content comprises obtain a document, determine a classification for the document based on the document content, determine a storage location for the document based on the document classification, determine whether the document is stored in the determined storage location, when the document is stored in the determined storage location, update the document in the determined storage location, when the document is not stored in the determined storage location, determine whether the document is stored in another storage location, when the document is stored in another storage location, add the document in the determined storage location and delete the document from the other storage location, and when the document is not stored in the other storage location, add the document to the determined storage location. | 12-20-2012 |
20120320074 | METHOD AND APPARATUS FOR LAYERED OVERVIEW IN VISUALIZATION OF LARGE ENTERPRISE IT ENVIRONMENT - A method for layered overview visualization of an IT environment having nodes and links related to the nodes, comprising initializing the layered overview visualization by establishing a number of hierarchical levels, combining the nodes and the links related to the nodes into a plurality of elements based on one of function and type, for each hierarchical level, assigning one or more of the plurality of elements to the level in accordance with one of the function and the type and determining overlap of the assigned elements. The method further comprises navigating the layered overview visualization by selecting a view, selecting a level of the hierarchical levels within the selected view, choosing the overlap of one or more of the assigned elements in the selected level and highlighting the chosen elements, and displaying on a screen the selected level and the highlighted chosen elements in the selected level. | 12-20-2012 |
20120310957 | Determining Dependencies During Macro Expansion - In certain embodiments, a parser parses a formula to yield one or more functions, at least one function comprising a dependent value of a dependent object. One or more macro handlers configured to execute the functions are determined. At least one macro handler is instructed to register with one or more dominant objects on behalf of the dependent object, where the dominant objects are used to evaluate the dependent value. | 12-06-2012 |
20120290110 | Evaluating Composite Applications Through Graphical Modeling - According to one embodiment of the present disclosure, a method for evaluating composite applications through graphical modeling may be provided. The method may include displaying one or more characteristic objects that are graphically associated with a first entity object. An indication of a score calculation methodology of the first entity object and an indication of a score calculation methodology of each characteristic object may be received. A score of each characteristic object may be determined. Each score may be based on at least one or more measurements of a measured object that is graphically associated with the first entity object and the score calculation methodology of the respective characteristic object. A score of the first entity object may be determined and displayed, the determination based on at least each score of the one or more characteristic objects and the score calculation methodology of the first entity object. | 11-15-2012 |
20120260236 | Visualization Of JVM And Cross-JVM Call Stacks - A method for diagnosing problems in a computer system by visualizing flows through applications and other subsystems in a directed graph on a user interface. The user interface represents multiple instances of each application or other subsystem by a respective node, and edges indicate which nodes depend on one another. Aggregate metrics which are based on the multiple instances, and associated alerts, can be provided for the nodes and edges. An aging process can indicate which nodes have not been recently invoked. The user interface can also indicate which nodes and edges are associated with a given business transaction. In a summary view, a node hides the identity of invoked components such as servlets of the application, while in a detailed view these details are provided. | 10-11-2012 |
20120260135 | Visualizing Relationships Between A Transaction Trace Graph And A Map Of Logical Subsystems - A method for diagnosing problems in a computer system by providing a user interface for visualizing flows through subsystems of the computer system, and allowing a user to explore relationships between a triage map which graphically depicts subsystems, and a transaction trace graph, which depicts a time sequence of invoked components of the subsystems. In one aspect, in response to a user selecting a portion of the transaction trace graph which depicts an invoked component, the user interface visually distinguishes one of the subsystems which invokes the invoked component. In another aspect, the transaction trace can be played back so that subsystems in the triage map are highlighted in turn, in a time sequence, as components of different subsystems are invoked. A time marker can skip to selected time points which result in updating of the triage map. | 10-11-2012 |
20120260133 | Visualizing Transaction Traces As Flows Through A Map Of Logical Subsystems - A method for diagnosing problems in a computer system by visualizing flows through subsystems of the computer system. Diagnostic tools include a user interface which includes a triage map which graphically depicts subsystems, such as applications, through which a Business Transaction flows, and the calling relationship between the subsystems. The subsystems can be depicted by nodes which include alerts and performance information. The user can run a command to find transactions of a specific Business Transaction and/or front end subsystem which meet filter criterion such as response time and user identifier. Each captured transaction can be listed with information such as response time and reporting agent. Details of a particular transaction instance, such as its invoked components, can also be viewed in a transaction trace. | 10-11-2012 |
20120259793 | Transaction Model With Structural And Behavioral Description Of Complex Transactions - A model is used to provide a user interface to track flows through at least one application of a computer system. The model relates the structural aspects of the at least one application to a behavioral model such as a business transaction hierarchy. The structural part of the model includes linked Vertex and Edge records. Vertex records for different instances of a component can be aggregated to provide a single vertex or node for display in a user interface. A Vertex record is linked to an Agent record and a Metric Path record. The Edge records identify tail and head components of a call. A set of Edge records can be associated with a Transaction record in the behavioral part of the model. A Transaction record can be associated with a Business Transaction Record, and a Business Transaction record can be associated with a Business Service Record. | 10-11-2012 |
20120254214 | DISTRIBUTED SYSTEM HAVING A SHARED CENTRAL DATABASE - A method for converting a distributed system includes providing a central database in communication with a database, in which the central database includes central schema information for accessing data stored in the central database. The method further includes transferring content data and schema information from the database to the central database for storage. The method further includes connecting schema information stored in the database to the central schema information such that each database is configured to receive a request for information, redirect the request from the database to the central database based on the referenced schema information, and receive, from the central database, the requested information. | 10-04-2012 |
20120239977 | System and Method for Self-Supporting Applications - A method and system self-supportable devices and applications are provided. The method and system in one embodiment allows devices and applications to automatically communicate and service themselves, for example, by checking knowledgebase services and other services for instructions on how to handle an exception. In another embodiment, the devices and applications automatically initiate actions needed to handle the exception. | 09-20-2012 |
20120233675 | AUTHENTICATION WITH MASSIVELY PRE-GENERATED ONE-TIME PASSWORDS - Embodiments of the invention provide systems and methods for the storage of One-Time Passwords (OTPs) on a device (principal) that needs to authenticate from time to time. It utilizes recent availability of data storage capacity not previously exploited in this arena. Also disclosed is the means to initialize and modify the system (all principals) in a secure manner, and the means to store the OTP production means on a device in a secure manner, even if the device has no built-in protected storage. | 09-13-2012 |
20120233123 | SYSTEM AND METHOD FOR PROVIDING ASSURED RECOVERY AND REPLICATION - The system and method for providing assured recovery and replication described herein may recover a master data source from a replica data source without impacting the master data source or the replica data source, and without having to install a standby version of an application associated with the master data source. In particular, a master snapshot may be created to copy application data stored in the master data source, wherein a replication server confirms that the replica data source can recover the master data source if the master snapshot and the replica data source are consistent. The replication server may create a replica snapshot to copy the replica data source and assign an identity associated with the master data source to the replica data source to recover the master data source. As such, replication may be resumed on a virtual machine disk file associated with the replica snapshot. | 09-13-2012 |
20120226717 | CONFIGURATION MANAGEMENT VISUALIZATION - Embodiments herein include systems, methods, software, and data structures to generate and render visualizations of configuration items (CIs) represented in a Configuration Management Database (CMDB). One embodiment includes receiving a request for a CI graph from a client including a focus CI identifier represented in a CMDB. The focus CI may be used to retrieve data of related CIs, the data including CI identifiers. A process is then executed for each retrieved CI identifier to retrieve CI data as a function of the received CI identifier and to build a node XML and an edge XML representation of relations between the CIs. This method also includes aggregating the node and edge XML representations into a single XML document and then translating the document into a markup language document capable of being rendered in a graphical user interface. The markup language document is then transmitted to the requestor. | 09-06-2012 |
20120221802 | Multiplex Restore Using Next Relative Addressing - According to one embodiment of the present disclosure, a method for multiplex restore using next relative address may be provided. The method may include identifying an address of a first data chunk of a file stored on a storage device. The first data chunk may be read by accessing the storage device at the address of the first data chunk. A next relative address appended to the first data chunk may be identified. The next relative address may indicate a position of a next chunk. The next chunk may comprise a next data chunk of the file or an empty chunk associated with the file. The method may further include reading the next chunk by accessing the storage device at the position indicated by the next relative address. | 08-30-2012 |
20120221527 | Multiplex Backup Using Next Relative Addressing - According to one embodiment of the present disclosure, a method for multiplex backup using next relative addresses may be provided. The method may include receiving a first chunk and a second chunk that are each associated with a first file. A next relative address may be appended to the first chunk. The next relative address may indicate a position in a storage device. The first chunk with the next relative address may be written to the storage device at a first address. The method may further include writing the second chunk to the storage device at the position indicated by the next relative address of the first chunk. | 08-30-2012 |
20120221526 | SYSTEM AND METHOD FOR PROVIDING SERVER APPLICATION SERVICES WITH HIGH AVAILABILITY AND A MANY-TO-ONE HARDWARE CONFIGURATION - A suite of network-based services, such as the services corresponding to the server application distributed by Microsoft® SharePoint™, may be provided to users with high availability. The suite of network-based services may include browser-based collaboration functions, process management functions, index and search functions, document-management functions, help and help search functions, and/or other functions. A plurality of computing devices functioning as servers may be backed up by a single computing device. | 08-30-2012 |
20120216071 | Avoiding Failover Identifier Conflicts - In certain embodiments, a service provided by a production server is facilitated. The production server is associated with a backup server configured to take over if the production server fails. The production server assigned a first identifier. A failover with a potential identity conflict is determined to have occurred. In the failover, the backup server has taken over for the production server and has been assigned the first identifier. A second identifier is assigned to the production server to replace the first identifier that was assigned to the production server in order to avoid the identity conflict. | 08-23-2012 |
20120210428 | FLOW DATA FOR SECURITY INTRUSION DETECTION - Disclosed herein are techniques for detecting possible security intrusions in a computer network. The security intrusion detection may be based on analyzing patterns of how transactions flow through one or more software applications. For example, patterns of transaction flows are determined for an initial time period to establish a baseline of normal flow patterns. These normal flow patterns may be compared with patterns for transaction flows for a later time period. Deviations in the patterns of transaction flow may indicate a possible security intrusion. | 08-16-2012 |
20120210237 | Recording A Trail Of Webpages - According to certain embodiments, recording a trail of webpages includes repeating the following to yield steps of a trail: saving content of a webpage as historical content of the webpage in a step, and saving one or more parameters of the webpage in the step. The parameters comprise a location parameter of the webpage. Display of a trail overview comprising step selectors is initiated. Each step selector corresponds to a step and is configured to initiate display of the historical content of the webpage of the step corresponding to the step selector. | 08-16-2012 |
20120198439 | Distributed Installation Configuration System and Method - Distributed installation configuration system and method are provided. The system and method in one aspect collects information about all products and components being installed from a centralized user interface, before the actual installation is performed, regardless of the target machine locations. The collected information is then stored centrally. Thereafter, subsequent installations, whether on the same or different machine locations, access this information for the subsequent installation procedure. | 08-02-2012 |
20120197846 | DYNAMIC RECOVERY OF SERVER APPLICATIONS - A continuously running application may be dynamically recovered. A database replica server may be directed to temporarily spool data changes in a database master server that stores application data associated with an application running on a web front-end master server. A specified rewind point may be obtained from among a plurality of existing rewind points of the application data stored in the database replica server. The database replica server may be directed to rewind the application data to a specified rewind point. An indication of data to be recovered in the rewound application data may be obtained. The web front-end master server may be directed to restore the data corresponding to the indication. The database replica server may be directed to resume replication of data changes in the database master server. | 08-02-2012 |
20120197844 | BLOCK LEVEL DATA REPLICATION - Systems and methods for replicating data from a production server to a backup server include identifying one or more data blocks of a file that were modified after a first time instant and before a second time instant. The file may be associated with a protected directory of the production server. An representative data block (e.g., including a hash value) for at least one of the identified data blocks may be computed using a cryptography algorithm, e.g., MD | 08-02-2012 |
20120192152 | Application-Based Specialization For Computing Nodes Within A Distributed Processing System - A distributed processing system is described that employs “application-based” specialization. In particular, the distributed processing system is constructed as a collection of computing nodes in which each computing node performs a particular processing role within the operation of the overall distributed processing system. Each of the computing nodes includes an operating system, such as the Linux operating system, and includes a plug-in software module to provide a distributed memory operating system that employs the role-based computing techniques. An administration node maintains a database that defines a plurality of application roles. Each role is associated with a software application, and specifies a set of software components necessary for execution of the software application. The administration node deploys the software components to the application nodes in accordance with the application roles associates with each of the application nodes. | 07-26-2012 |
20120191845 | Methods and Systems for Executing Applications on Personal Digital Assistant Terminals - Methods, systems, non-transitory media comprising computer-readable instructions, and logic for obtaining information related to an application may include receiving, at a terminal device, data exchange information, including data transfer speed information, that is related to a data exchange between the terminal device and a web service. The method further may include storing, at the terminal device, at least a portion of the data exchange information received at the terminal device. | 07-26-2012 |
20120173913 | SYSTEM AND METHOD TO AVOID RESYNCHRONIZATION WHEN PROTECTING MULTIPLE SERVERS - In a computer system, a standby master processor is configured to serve as a backup processor for an active master processor. A third party replica processor is configured to monitor and record changes on the active master processor when the active master processor is executing, and is further configured to synchronize itself with the standby master processor when the standby master processor takes over execution from the active master processor. Logs of changes are maintained. A negotiation occurs between the standby master processor and the third party replica processor to determine the status of the logs of the standby master processor and the third party replica processor, and logs are applied or paused relating to one or more of the standby master processor and the third party replica processor to synchronize the standby master processor and the third party replica processor. | 07-05-2012 |
20120151283 | DETECTION AND REDUCTION OF EXCESSIVE SNMP TRAFFIC - Various embodiments herein include at least one of systems, methods, and software to detect and reduce messages from network entity management clients that are not utilized by a network management system. Once identified, the network management system may send a command to the network entity management clients to no longer send particular message types to the network management system. The network management system may also, or alternatively, be configured to take no action when such messages are subsequently received. | 06-14-2012 |
20120150809 | DISASTER RECOVERY SERVICES - A system and method for server recovery and migration is presented. The method comprises backing up data and device drivers on a server to a central location, logging-in to the central location, obtaining the backed up data and device drivers from the central location, copying the obtained data to a computer medium and booting the server using the computer medium. In one aspect, the method can further comprise determining whether recovery is needed and performing logging-in, obtaining, copying, and booting when the recovery is needed. In one aspect, the method can further comprise determining whether the server has new device drivers and backing up the device drivers when the server has new device drivers. In one aspect, the backing up is performed periodically. In one aspect, the computer medium is a CD. In one aspect, the obtained backed up data is an ISO file. | 06-14-2012 |
20120144236 | SYSTEM AND METHOD FOR DIAGNOSING INFORMATION TECHNOLOGY SYSTEMS IN MULTIPLE VIRTUAL PARALLEL UNIVERSES - The system and method for diagnosing information technology systems in multiple virtual parallel universes described herein may create virtualized parallel universes that represent a problematic information technology system. The virtualized parallel universes may then be diagnosed to identify potential solutions to a problem experienced in the problematic information technology system (i.e., the parallel universes may be diagnosed without disrupting the live problematic system). For example, the problematic information technology system may be cloned in response to a diagnostic request associated therewith to create various virtualized parallel universes representing the problematic information technology system. The parallel universes may then conduct various problem resolution steps to identify a potential solution to the problem, which may then be applied to the problematic information technology system to resolve the problem associated therewith. | 06-07-2012 |
20120136834 | REDUCING DATA DUPLICATION IN CLOUD STORAGE - Data duplication may be reduced in cloud storage. First snapshots of one or more remote volumes may be received via a network. The first snapshots may be copies of the one or more remote volumes at a first instant in time. Responsive to and/or based on the first snapshots, unique clusters and duplicate clusters may be identified among the valid clusters of the remote volumes. The unique clusters and single instances of the duplicate clusters may be stored in a backup file, such that the backup file is devoid of duplicate clusters. Second snapshots of the one or more remote volumes may be received via the network. The second snapshots may be copies of the one or more remote volumes at a second instant in time, wherein the second instant in time is after the first instant in time. Responsive to the second snapshots, the clusters in the backup file that are no longer valid may be utilized to store the valid clusters in the one or more remote volumes not yet stored in the backup file. | 05-31-2012 |
20120136831 | SYSTEM AND METHOD FOR MINIMIZING DATA RECOVERY WINDOW - A computer-based system includes a backup server, a production server, a recovery agent that executes on the production server, a database on the production server, a backup database on the backup server, and a meta data file on the backup server. The meta data file includes file names, a file directory, and file attributes. The system is configured to copy the metadata file from the backup server to a production server. When the copying of the metadata file from the backup server to the production server is complete, and before or during a time period in which backup data is copied from the backup server to the production server, the system is configured to receive a request from the production server to restore a file from the backup server with a higher priority than other files on the backup server. | 05-31-2012 |
20120136827 | PERIODIC DATA REPLICATION - Systems and methods for replicating data from a production server to a backup server include recording at least one operation on one or more data items stored in a volume of a production server. The operation may be recorded as at least one journal event in a memory. A determination may then be made regarding whether a system malfunction incident has occurred in the production server and if so, a first set of journal events may be transferred from the memory to an auxiliary storage at a first time instant. At a second time instant, a second set of journal events recorded in the memory between the first and second time instants may be transferred to the auxiliary storage. At one journal event stored in the auxiliary storage unit may then be sent for replication to a backup server. | 05-31-2012 |
20120131569 | AUTOMATED SOLARIS CONTAINER CREATION - The inventive method comprises obtaining predetermined parameters, associating these parameters with a creation script file, executing the script file to install the complete runtime environment according to the predetermined parameters, and publishing notification of the installation of the complete runtime environment on the machine. In one aspect, executing the script is performing an autoboot. In one aspect, obtaining predetermined parameters is performed using a GUI. In one aspect, the complete runtime environment is a Solaris container. In one aspect, the predetermined parameters comprise at least one of zone name, IP address, Solaris version, number of CPUs, amount of memory and number of processors. The method can also comprise determining whether the runtime environment exists on the machine and if the runtime environment exists, reinstalling the runtime environment on the machine. The method can also comprise notifying a system operator if the runtime environment exists on the machine. | 05-24-2012 |
20120130955 | BACKUP AND RESTORE DATA FROM A CLOUD COMPUTING ENVIRONMENT - A system and method for backing up data computed using an application in a cloud computing environment, comprising creating the application, modifying the application to register a servlet, publishing the application to the cloud computing environment, during execution of the application, using the servlet for: detecting annotated entities in the application, finding out properties and property types of the annotated entities, generating one or more structured query language (SQL) statements to query out data to be backed up in accordance with the annotated entities, and publishing the backed up data. Modifying may comprise inserting archiving-type files into the application. An annotation processor may be added to the application may occur. A user interface displaying one or more of the SQL statements performed during the execution of the application may be generated. The user may confirm the displayed SQL statements. A library may be added to the application. | 05-24-2012 |
20120124576 | Managing Virtual Machines Based on Business Priority - According to one embodiment, a method for managing one or more virtual machines includes generating a request for at least one performance characteristic for at least one virtual machine, the at least one virtual machine being associated with a processing group, the processing group including one or more processing modules; receiving a response to the generated request for at least one performance characteristic for the at least one virtual machine; automatically determining whether an increase in the number of processing modules included in the processing group is required, by analyzing the received response to the generated request; and, in response to a determination that an increase in the number of processing modules included in the processing group is required, automatically adding at least one processing module to the processing group. | 05-17-2012 |
20120124213 | Evaluation Of Current Capacity Levels Of Resources In A Distributed Computing System - In general, this disclosure describes techniques of managing resources in a service-oriented distributed computing system. As described in this disclosure, a control node automatically manages the system such that the system has sufficient capacity to satisfy an agreement to provide a given level of a service. In order to automatically manage the system, the control node evaluates the current capacity levels of resources in the system. The current capacity levels are indicative the capacity of resources to perform certain acts. The capacity of the resources to perform these acts may be indicative of whether the system is able to provide the given level of the service. Because capacities provided by the resources change as the resources start, the control node uses a predicted pending capacity function to evaluate whether resources that are currently starting will be sufficient to satisfy the level of the service when completely started. | 05-17-2012 |
20120117342 | RESTORE FROM BLOCK LEVEL BACKUP - A computer implemented method includes creating a child disk for a machine. A configuration of a backed up disk drive is derived from a storage container that includes a block level backup copy of the disk drive. The child disk is populated with selected data from blocks of data corresponding to selected files desired to be used on the machine. Drivers may be injected and registries modified to start with booting of the virtual. | 05-10-2012 |
20120116831 | Using Cloud Brokering Services for an Opportunistic Cloud Offering - In accordance with one embodiment of the present disclosure, a method comprises publishing descriptions available from a plurality of publishing parties. The descriptions describe a plurality of published services available for a requesting party to request. The method receives requests to broker a transaction from the requesting party, associates a requested service to one of the published services, and facilitates a transaction for the one of the published services. | 05-10-2012 |
20120116747 | Recommending Alternatives For Providing A Service - In certain embodiments, one or more current service elements that can provide a service for a client are monitored. An event associated with a current service element is detected. One or more candidate service elements are analyzed with respect to the one or more current service elements operating for the client. The one or more candidate service elements operate in a client scenario corresponding to the client. A recommendation is provided in response to the analysis. | 05-10-2012 |
20120110318 | SYSTEM AND METHOD FOR CONTROLLING STATE TOKENS - The system and method for controlling state tokens described herein may secure sensitive application state tokens, link one application state token to other state tokens that represent certain identities or communication sessions, and maintain application state tokens to integrate various different systems or applications. In particular, the system and method described herein may provide a mechanism to override scheme that applications use to manage state information and thereby enforce policies that provide fine-grained control over any semantics the applications otherwise use to manage state information. Furthermore, a first application state token may be linked to another state token representing a session or identity to validate whether the session or identity represented therein created the first application state token, and state tokens that represent active communication sessions may be copied from browser processes to various external clients to integrate or otherwise share state information across the various external clients. | 05-03-2012 |
20120102361 | HEURISTIC POLICY ANALYSIS - A system and method using statistical analysis for the process of analyzing and generating organizational policies is presented. This inventive method comprises, for one or more tests, using a test to calculate a test result for the policy based on current violator entities and potential violator entities, and determining a policy ranking for the policy based on the test result of the test, and evaluating the policy based on the policy rankings determined from the tests. The method can also comprise creating a repository comprising the policy rankings for the plurality of policies. The repository can be used to trend, benchmark, alert and improve the policies. The method can also comprise creating a rule profile for the one policy comprising the one policy, the current violator entities of the policy, the potential violator entities of the policy, the test results and the policy rankings from the tests. | 04-26-2012 |
20120096432 | Adding Funtionality To Existing Code At Exits - New code is added to existing object code in order to add new functionality. For example, a call to start a profiler function can be added at the beginning of a Java method and a call to stop the profiler function can be added at the exits of the Java method. A method may have many different exits. To insure that the profiler process is stopped regardless of which exit is performed, the byte code and exception table are modified. | 04-19-2012 |
20120096398 | METHOD AND SYSTEM FOR CONTINUOUS NOTIFICATIONS USING SUBLIMINAL AND SUPRALIMINAL CUES - A method of notifying a person using a computer includes providing a computer system including at least one sensory cueing component. The method includes defining a subliminal and a supraliminal range of at least one human sense. A cue may be defined and includes a variable attribute, and the cue is directed to the at least one human sense. An alert level may be associated with the message and the alert level may be classified as being in the subliminal or supraliminal range. The method may include a presentation methodology of the cue and the message. The cue may be initiated and presented in either the subliminal range or the supraliminal range and directed to the at least one human sense in the user's sensory environment. The user acknowledges the cue and the message in either the subliminal or supraliminal range, before the cue is removed from the user's sensory environment. | 04-19-2012 |
20120095967 | PORTABLE INFRASTRUCTURE OBJECT FOR CAPTURING MACHINE IMAGES - A method for capturing an image of a machine having one or more disks is presented. The method comprises creating a snapshot of the machine, the snapshot including full machine encapsulation, querying the one or more disks on the machine to obtain information stored thereon, creating metadata able to access one or more files, one or more folders, and the application on the machine, and capturing the snapshot, the obtained information and the metadata in the image. The method may also comprise migrating the captured image and/or extracting one or more files and/or folders from the captured image on another machine. The migration can be between physical and physical, physical and virtual, physical and cloud, etc. The method may comprise capturing another image comprising the snapshot, the metadata and changed information different from the obtained information. | 04-19-2012 |
20120089966 | TWO PASS AUTOMATED APPLICATION INSTRUMENTATION - A two-pass technique for instrumenting an application is disclosed. One pass may be performed statically by analyzing the application and inserting probes while the application is not running. Another pass may be performed dynamically by analyzing data collected by the probes while the application runs to derive metrics for the probes. One or more metrics for each probe may be analyzed to determine whether to dynamically modify the probe. By dynamically modifying the probe, the application does not need to be shut down. Dynamically modifying the probe could include removing the probe from the application or moving the probe to another component (e.g., method) in the application, as examples. For example, the probe might be moved to a component that is either up or down the call graph from the component that the probe is presently in. | 04-12-2012 |
20120084258 | CHANGE CAPTURE PRIOR TO SHUTDOWN FOR LATER BACKUP - A computer implemented method includes monitoring blocks of data on a storage device that are changing as the computer operates. On detecting a computer shut down event, a copy of changes to the monitored blocks are saved. Upon startup of the computer, a backup of the changed blocks of data is performed. | 04-05-2012 |
20120079567 | WIRELESS MANAGER AND METHOD FOR CONFIGURING AND SECURING WIRELESS ACCESS TO A NETWORK - The disclosure provides a wireless manager operable to receive a request from a mobile device to wirelessly communicate with a network, wherein the request may include information to dynamically identify a location associated with the mobile device. The wireless manager may be further operable to automatically associate the mobile device with an access zone comprising one or more physical or logical characteristics, compare the location associated with the mobile device to the access zone, and authorize the mobile device to wirelessly communicate with the network if the location associated with the mobile device indicates that the mobile device does not violate the access zone. | 03-29-2012 |
20120072887 | GENERATING DEPENDENCY MAPS FROM DEPENDENCY DATA - Disclosed herein are techniques for generating data that describes dependencies between software components as transactions are processed, as well as displaying dependency maps based on the data. The data may be collected by agents that monitor or trace transactions being processed by the software components. The collected data may be aggregated to form a directed graph that describes the dependencies between the software components. A dependency map may be displayed based on the directed graph. The dependency map may show dependencies between software components as the transactions are processed. The dependency map may also show dependencies between applications that include the software components. The dependency map(s) may allow a user to easily and quickly ascertain where a problem is occurring. For example, the user might be able to quickly determine that a problem is at a backend database, as opposed to an application server at a frontend. | 03-22-2012 |
20120072551 | AMBIGUITY MEASUREMENT AND MANAGEMENT FOR CONFIGURATION ITEMS - Systems and methods for measuring and managing ambiguity among a plurality of configuration items residing in a configuration management database include determining for at least a first configuration item, at least a second configuration item such that a first set of attributes associated with the first configuration item and a second set of attributes associated with the second configuration item have at least one attribute with an identical value. As an indicator for the ambiguity, an ambiguity index for the first configuration item may be measured. One of the first configuration item and the second configuration item may be identified as an ambiguous configuration item. Upon identification, an operational state of the ambiguous configuration item or a set of one or more attributes associated with the ambiguous configuration item may be modified. The ambiguity for configuration item transactions may likewise be measured and managed to locate and resolve transaction ambiguity. | 03-22-2012 |
20120072395 | SYSTEM AND METHOD FOR VARIABLE BLOCK LOGGING WITH LOG-AHEAD BUFFERS - A system for logging database transactions comprises a memory (comprising a direct access storage device) operable to store a database, a database log, and a plurality of log buffers associated with the database log. Each log buffer is operable to store at least one log record associated with a database transaction. The system further comprises a processor operable to log a first record of a first database transaction using the database log and write the database log to the storage device. The processor is further operable to log a second record of a second database transaction in a first of the plurality of log buffers substantially concurrently to the database log being written to the storage device. | 03-22-2012 |
20120066504 | METHODS, APPARATUS AND SYSTEMS FOR SECURING USER-ASSOCIATED PASSWORDS USED FOR IDENTITY AUTHENTICATION - Methods, apparatus and systems for securing user-associated passwords used in transactions are disclosed. The methods include a user computing device receiving a user-associated password such as a PIN from a user, where the user-associated password is operable to authenticate an identity of a user. The user-associated password may be received in response to the user receiving a request for the user-associated password from a third party such as a merchant. The user computing device may generate a temporary password such as a one-time password, dynamic password, or the like, and encrypt the user-associated password using the temporary password. The encrypted user-associated password may then be communicated to the third party in lieu of the user-associated password received by the user. | 03-15-2012 |
20120041858 | SYSTEM AND METHOD FOR SERVICE LEVEL MANAGEMENT - The system and method described herein may provide service level management, wherein business processes may be composed of services. A state of the service may be defined by one or more service parameters, which depend upon performance of network components that support the service (e.g., component parameters). The state of the service may depend, for example, on a collection of service parameter values for availability, reliability, security, integrity, and response time. A service level agreement is a contract between a supplier and a customer that identifies services supported by a network, service parameters for the service, and service levels (e.g., acceptable levels for each service parameter). | 02-16-2012 |
20120036497 | INTEGRITY CHECK WHILE COMMITTING CHANGES FROM AN INTEGRATED DEVELOPMENT ENVIRONMENT TO A SOURCE CODE CONTROL SYSTEM - Integrity check is performed on selected items that are to be committed to storage from an integrated development environment. Integrity check utilizes dependency relationship table to determine implicit changes in items occurring due to explicit changes made to the related items. | 02-09-2012 |
20120036496 | PLUG-IN BASED HIGH AVAILABILITY APPLICATION MANAGEMENT FRAMEWORK (AMF) - A high availability method enabling addition and removal of an application plug-in comprises launching the high availability system using a processor, said high availability system having an application framework (AMF), requesting data obtainable by the application plug-in from the application framework, and when the application plug-in does not exist in the application framework, registering the application plug-in in the application framework. AMF can comprise a list of additional application plug-ins. The list can comprises a unique id, a name, and a path to dynamic load libraries for each application plug-in. AMF can add the application plug-in by adding the application plug-in dynamic load library files to the installation folder and adding application plug-in information to the configuration file. AMF can remove the application plug-in by deleting the application plug-in dynamic load library files from the installation folder and deleting the application plug-in information from the configuration file. | 02-09-2012 |
20120030262 | Method and System for Managing Information Technology Data - Database system for storing information technology (IT) management operational data and a method and apparatus for managing IT data are provided. The database utilizes an integrated database schema. IT operational data is stored into the database using the integrated database schema and the database is accessed by plural applications and/or products using the integrated database schema. | 02-02-2012 |
20120023585 | Method and Systems for Computer Security - A method for computer security, includes intercepting an incoming communication, placing the communication into a quarantine queue, selecting a communication from the quarantine queue, determining whether the selected communication contains undesirable code, determining whether a quarantine time for the selected communication has lapsed if the selected communication does not contain undesirable code and placing the selected communication back in the quarantine queue if the quarantine time has not elapsed. | 01-26-2012 |
20120017078 | PERIMETER ENCRYPTION METHOD AND SYSTEM - A method and system for consistent format preserving encryption (C-FPE) are provided to protect sensitive data while the sensitive data is in a domain while allowing encrypted sensitive data to be treated inside the domain as if it were the unencrypted sensitive data. The method includes inserting a transparent coupling into a data flow at a perimeter of the domain, and translating a sensitive data element from an unprotected data element to a protected data element using the transparent coupling such that the sensitive data element is a protected data element within the domain. | 01-19-2012 |
20120016841 | BLOCK LEVEL INCREMENTAL BACKUP - A system and method include creating a full backup copy of selected data from a storage device. A series of incremental backups are created over time following the creation of the full backup copy. The oldest incremental backup is merged into the full backup at a desired time. | 01-19-2012 |
20120011101 | INTEGRATING CLIENT AND SERVER DEDUPLICATION SYSTEMS - According to one embodiment of the present invention, a method for integrating client and server deduplication systems may be provided. In this method, a first hash set of a previous backup session may be received from a server. The first hash set may comprise a plurality of cryptographic values generated using a plurality of data blocks of a first data set of a client. A second hash set may be generated using a plurality of data blocks of a second data set of the client. A deduplicated data set may be generated by the client according to the first hash set and the second hash set and may comprise a plurality of non-redundant data blocks of the second data set. The second hash set and the deduplicated data set may be transmitted to the server. | 01-12-2012 |
20120005658 | Programmatic Root Cause Analysis For Application Performance Management - Programmatic root cause analysis of application performance problems is provided in accordance with various embodiments. Transactions having multiple components can be monitored to determine if they are exceeding a threshold for their execution time. Monitoring the transactions can include instrumenting one or more applications to gather component level information. For transactions exceeding a threshold, the data collected for the individual components can be analyzed to automatically diagnose the potential cause of the performance problem. Time-series analytical techniques are employed to determine normal values for transaction and component execution times. The values can be dynamic or static. Deviations from these normal values can be detected and reported as a possible cause. Other filters in addition to or in place of execution times for transactions and components can also be used. | 01-05-2012 |
20110314474 | HETEROGENEOUS JOB DASHBOARD - This disclosure provides a system and method for summarizing jobs for a user group. In one embodiment, a job manager is operable to identify a state of a first job, the first job associated with a first job scheduler. A state of a second job is identified. The second job is associated with a second job scheduler. The first job scheduler and the second job scheduler are heterogeneous. A summary of information associated with at least the first job scheduler and the second job scheduler is determined using, at least in part, the first job state and the second job state. The summary is presented to a user though a dashboard. | 12-22-2011 |
20110314082 | SYSTEM AND METHOD FOR SELECTING CLOUD SERVICES - A system and process include receiving information relating to a plurality of cloud services from a plurality of cloud service providers. A determination is made, for each of the plurality of cloud services, one or more of a location of a server that hosts a cloud service, an origin of data used in the cloud service, and a destination of data processed by the cloud service. One or more of the plurality of cloud services are selected based on one or more of the determination of the server location, the origin of data, and the destination of data. | 12-22-2011 |
20110314081 | ABSTRACT INTERNATIONALIZATION OF WEB APPLICATIONS - According to one embodiment of the present invention, a method for abstract internationalization of web applications may be provided. In this method, a first set of object files may be generated according to a locale of a plurality of locales and one or more properties files. Each properties file may be associated with a web application of a plurality of web applications. A localization module operable to facilitate abstract internationalization of a web application may be stored. A request to use the web application may be received from a client. The request may indicate a locale of the client. A second set of one or more object files may be selected according to the web application and the locale of the client. A response comprising markup language that describes the web application, the second set of object files, and the localization module may be generated and transmitted to a client. | 12-22-2011 |
20110313974 | PRIORITIZED DATA BACKUP - A prioritized data backup may be performed. Source data elements may by associated with local properties such as a base priority indicator and a current priority indicator. A base priority indicator associated with a given data element may convey the importance of that data element. The source data elements may be sorted into an order based on current priority indicators associated with individual ones of the source data elements. Source data elements associated with current priority indicators greater than or equal to a priority threshold may be backed up according to the order. Additional source data elements may be backed up according to the order when time remains in a backup window. | 12-22-2011 |
20110307408 | System and Method for Assigning a Business Value Rating to Documents in an Enterprise - A system and method for managing information in an enterprise is disclosed. In one embodiment, the method comprises receiving a document from a component of an enterprise network, determining one or more characteristics associated with the document, assigning a priority score to a user associated with the document, assigning a business value rating to the document, and performing an operation with the document based on the business value rating. In another embodiment, the system includes a processor operable to receive a document, determine one or more characteristics associated with the document, determine a priority score to a user associated with the document, assign a business value rating to the document, and perform an operation with the document based on the business value rating. | 12-15-2011 |
20110295753 | PIN PROTECTION FOR PORTABLE PAYMENT DEVICES - A method and system of encrypting a Personal Identification Number (PIN) using a portable payment device includes a portable payment device in communication with a network and a payment processor, and may be configured to receive a first encryption key from the payment processor, to receive a PIN, to encrypt the PIN using the first key, and to provide the encrypted PIN to the payment processor in a form useable to process a payment authorization message or transaction request. The first key may be protected by cryptographic camouflaging using a password. The password may be received by the device and used to decamouflage the first key, and the decamouflaged first key may be used to encrypt the PIN. In one configuration, the first key may be a symmetric key, such that a PIN encrypted by the first key may be of a standard format usable in existing payment systems. | 12-01-2011 |
20110295609 | ITEMIZING POLLUTANTS OF ACTIVITIES - According to one embodiment of the present invention, a method for itemizing pollutants of activities may be provided. The method may include receiving a first quantity of an activity that indicates an amount of the activity that is performed. The method may further include accessing a list of one or more pollutants that are released when the activity is performed. One or more pollutant factors may be selected. Each pollutant factor may be associated with a pollutant of the one or more pollutants and may indicate an amount of the associated pollutant released when the activity is performed. One or more pollutant quantities of the one or more pollutants may be calculated according to the first quantity of the performed activity and the pollutant factor associated with the pollutant. The method may also include facilitating display of the one or more pollutant quantities. | 12-01-2011 |
20110289584 | SYSTEMS AND METHODS TO SECURE BACKUP IMAGES FROM VIRUSES - A system and method provide for storing virus metadata with a backup image. Upon restoring files or data from the backup image, the virus metadata from the backup image is compared with current virus data. The comparison yields a list of new viruses that have been discovered after the backup image was created. The restore process may cause restored files to be scanned for the new viruses, while excluding previously known viruses from the scan. | 11-24-2011 |
20110289362 | NETWORK FAULT MANAGER - The network fault manager described herein may include one or more processors configured to detect alarms. For example, the one or more processors may periodically sample rates at which similar events that relate to occurrences on a network arrive, compare the periodically sampled rates to a first threshold, and determine whether a preexisting alarm exists. In response to a number of the periodically sampled rates that exceeded the first threshold within a preceding time window exceeding a second threshold and the preexisting alarm not existing, the one or more processors may assert a first alarm. Otherwise, if the number of periodically sampled rates that exceeded the first threshold within the preceding time window exceeds the second threshold but the preexisting alarm does exist, the one or more processors may maintain the preexisting alarm for a predetermined time period. | 11-24-2011 |
20110289057 | SYSTEMS AND METHODS TO DETERMINE SECURITY HOLES OF A BACKUP IMAGE - A system and method provide for backing up and restoring using patch level data for operating system and application files. Patch level data for the files in the backup image may be displayed along with current patch level data. Further, files in a backup image may be replaced based on current patch level data indicating a patched version of the file in the backup image is available. Further, upon a restore, if a patched file is available for a corresponding file in a backup image, the patched file may be retrieved from a patch source and used in place of the file that would have been restored from the backup image. | 11-24-2011 |
20110283265 | FAILSAFE MECHANISM FOR DYNAMIC INSTRUMENTATION OF SOFTWARE USING CALLBACKS - A failsafe mechanism for installing and removing temporary instrumentation during a runtime of an application. Initially, an application is configured with a baseline set of instrumented components such as methods. Additional instrumentation is then deployed in the application, such as to diagnose a performance problem. The failsafe mechanism ensures that the additional instrumentation is automatically removed, even when there is an interruption in a communication link to the application, a computing device failure, a software failure, or some other type of failure, which renders it impossible to manually roll back the instrumentation from a remote user interface. The failsafe mechanism can be provided using callbacks between the computing devices which detect when a connection is unexpectedly lost or closed. Termination of one callback can cascade to one or more other callbacks. The instrumentation rollback can involve reloading un-instrumented byte code of the application. | 11-17-2011 |
20110283264 | DETECTION OF METHOD CALLS TO STREAMLINE DIAGNOSIS OF CUSTOM CODE THROUGH DYNAMIC INSTRUMENTATION - A technique for analyzing software in which un-instrumented components can be discovered and dynamically instrumented during a runtime of the software. Initially, an application configured with a baseline set of instrumented components such as methods. As the application runs, performance data is gathered from the instrumentation, and it may be learned that the performance of some methods is an issue. To analyze the problem, any methods which are callable from a method at issue are discovered by inspecting the byte code of loaded classes in a JAVA Virtual Machine (JVM). Byte code of the class is parsed to identify opcodes which invoke byte code to call other methods. An index to an entry in a constants pool table is identified based on an opcode. A decision can then be made to instrument and/or report the discovered methods. | 11-17-2011 |
20110283263 | CONDITIONAL DYNAMIC INSTRUMENTATION OF SOFTWARE IN A SPECIFIED TRANSACTION CONTEXT - Techniques for analyzing software in which un-instrumented components can be discovered and conditionally instrumented during a runtime of the software. Initially, software such as an application can be configured with a baseline set of instrumented components such as methods. As the application runs, performance data gathered from the instrumentation may indicate that the performance of some methods is below expectations. To analyze this, any methods which are callable from a method at issue are discovered, such as by inspecting the byte code of loaded classes in a JAVA Virtual Machine (JVM). To limit and focus the diagnosis, the instrumentation which is added to the discovered components can be conditional, so that the instrumentation is executed only in a specified context. The context can involve, e.g., a specified sequence of components in which a discovered component is called, and/or transaction data in which a discovered component is called. | 11-17-2011 |
20110283261 | METHOD OF TESTING MULTIPLE LANGUAGE VERSIONS OF A SOFTWARE SYSTEM USING ONE TEST SCRIPT - A system and method for testing software systems having a plurality of linguistic versions is presented. The method comprises creating an initial test script in one linguistic version of the plurality of linguistic versions, executing and modifying this test script, and executing the modified initial test script in additional linguistic versions. Executing the initial test script can comprise performing test steps, and storing a result of each test step as log data in a log file, each test step usually having Windows controls to test. Modifying the initial test script can comprise recognizing the test step controls using the log data, performing the test step, and replacing the test step control text with another text. Alternatively, modifying the initial test script can comprise entering into a test step having a control text, recognizing the control based on the control attributes, performing the test step, and replacing the test step control text. | 11-17-2011 |
20110283019 | WEB-ENABLED MAINFRAME - According to one embodiment, a data sources interface of a mainframe receives a transaction request from a user terminal communicating through a network. The transaction request is formatted in a web-based format. A data sources function is called to instruct a mainframe application to perform the requested transaction, and the instruction to the mainframe is formatted in the native format of the mainframe. A transaction result formatted in the native format of the mainframe is received from the mainframe application. The transaction result is modified according to the web-based format to yield a data source, and the data source is sent to the user terminal. | 11-17-2011 |
20110282843 | METHOD AND SYSTEM FOR DATA BACKUP AND REPLICATION - A work flow is initiated and identified by a scenario identifier. A file system driver is notified to record operations on data associated with the work flow identified by the scenario identifier as raw journals without recording data content associated with the operations. The recorded operations are consolidated with previous operations as each operation is recorded in the raw journals. A system snapshot is initiated to be taken. The file system driver is notified of a point in time the system snapshot is taken. Data content associated with the consolidated recorded operations is retrieved from the system snapshot. A first packet is created from selected recorded operations and sent synchronously. A second packet including rest of the recorded operations along with associated data content are sent asynchronously with the point in time of the system snapshot. | 11-17-2011 |
20110276573 | JOURNAL EVENT CONSOLIDATION - Journal event consolidation extracts events occurring between two predetermined point in time on data volume, categorizes the events into categories of events, and consolidates the events in the categories of events. | 11-10-2011 |
20110276495 | ONE-TIME USE PASSWORD SYSTEMS AND METHODS - According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method may also include authenticating the user by the authentication server in response to a request from the user to use the one-time password. The method may further include authorizing the use of the one-time password for the transaction in response to authenticating the user by the authentication server. The method may moreover include using the one-time password in combination with an account number to settle the transaction between the user and the merchant. The method may additionally include sending a message to the authentication server originating from the merchant, wherein the message comprises the one-time password, and wherein the message requests a determination whether the one-time password is authorized for use in the transaction. The method may also include sending a message to the merchant originating from the authentication server, wherein the message includes a determination whether the transaction should be approved in response to the authentication server determining whether the one-time password is authorized for use in the transaction. | 11-10-2011 |
20110271147 | LOGICAL ENTITY FAULT ISOLATION IN NETWORK SYSTEMS MANAGEMENT - Various embodiments include one or more of systems, methods, and software to provide a status of a logical entity between entity models in network management systems, such as for fault isolation, in an efficient manner. Some embodiments, when receiving requests for a status of a logical entity while already in the process of determining the status in response to a previously received request, include adding an identifier of the subsequent requestor to a status requestor list and not responding to or taking any further action with regard to the request from the subsequent requestor until the status in response to the first received status request is determined. | 11-03-2011 |
20110270804 | AGILE RE-ENGINEERING OF INFORMATION SYSTEMS - Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify and resolve violations of system and process performance measuring metrics. Following identification of such a violation, some embodiments may identify and cause a solution to be implemented. Following implementation of a solution, the violated metrics are again applied and the results evaluated to verify resolution of the metric violation. Some embodiments may repeat this process until the metric violation or violations are resolved. | 11-03-2011 |
20110265091 | SYSTEM AND METHOD FOR NORMALIZING JOB PROPERTIES - This disclosure provides a system and method for normalizing job properties. In one embodiment, a job manager is operable to identify a property of a job, with the job being associated with an operating environment. The job manager is further operable to normalize the property of the job and present the normalized property of the job to a user. | 10-27-2011 |
20110265076 | System and Method for Updating an Offline Virtual Machine - A system and method for updating an offline virtual machine are disclosed. The method comprises mounting an image of an offline virtual machine on a host operating system. The method further comprises generating drive-mapping information for the mounted virtual machine image and loading registry information of the mounted virtual machine image onto the host operating system using the drive-mapping information. An update to be applied to the offline virtual machine is determined based on the registry information and a patch bundle is retrieved based on the determination, wherein the patch bundle comprises registry update instructions, file system update instructions, and a patch file. The patch bundle is executed on the host operating system to update the offline virtual machine. | 10-27-2011 |
20110265064 | DETECTING, USING, AND SHARING IT DESIGN PATTERNS AND ANTI-PATTERNS - Various embodiments described and illustrated herein include at least one of systems, methods, and software to identify, use, or share patterns and anti-patterns. Embodiments that include pattern and anti-pattern identification operate to identify candidate patterns and anti-patterns within a deployed system and to confirm or receive confirmation that the identified candidates are indeed patterns or anti-patterns. Embodiments that use patterns and anti-patterns operate to consume the identified patterns and anti-patterns to improve system performance. The embodiments that share patterns and anti-patterns include mechanisms whereby patterns and anti-patterns can be sent to and received from other systems. | 10-27-2011 |
20110264571 | BROKERING AND PAYMENT OPTIMIZATION FOR CLOUD COMPUTING - A system includes a receiving module to receive a purchase inquiry for a cloud computing service from a consumer in a first currency. A pricing module is used to price-out the cloud computing service from a provider where the cloud computing service is provided in a second currency. A reconciliation module reconciles the purchase of the cloud computing service in the consumer's geographical location and currency with the provider's location and currency. | 10-27-2011 |
20110264471 | CERTIFIED IT SERVICES IN-A-BOX - A system, in a cloud computing environment (“CCE”) includes a data processor. One or more cloud computing auditing components are configured to monitor the CCE in accordance with a predefined insurance level agreement (“ILA”) and to create a log of one or more CCE events indicated by the ILA. A neutral data warehouse is configured to store the log. A reporting module generates one or more reports for a party indicated by the ILA from the log in the neutral data warehouse in accordance with the ILA. | 10-27-2011 |
20110258598 | SERVER SIDE APPLICATION INTEGRATION FRAMEWORK - A flexible, platform-independent integration infrastructure is provided. The integration infrastructure may include an integration bridge and at least one plug-in, where the at least one plug-in may include translation rules, mapping rules, and other information associated with a component coupled to the plug-in. The translation rules, mapping rules, and other information may be used by the integration bridge during a mapping process to control communication between components. Based on the rules and information, a mapping translator of the integration bridge converts data received from component into a form readable by another component. | 10-20-2011 |
20110258209 | RULE ORGANIZATION FOR EFFICIENT TRANSACTION PATTERN MATCHING - Efficiently identifying transactions processed by a software application, such as a server application is disclosed. In one embodiment, transactions are identified by applying a set of rules to communications between a client and server to determine whether certain patterns are in the communications. For example, the rules may look for some combination of parameters in the transactions. As a particular example, the rules may be used to look for parameters in HTTP requests. The rules are organized in a way that allows efficient processing. For example, the rules may be organized based on the frequency with which the parameters are expected to occur in the transactions and the frequency with which each transaction is expected to occur. The rules may be updated if the expected frequencies deviate from actual frequencies, such that the rules can be organized for more efficient processing. | 10-20-2011 |
20110252087 | PERFORMANCE MONITORING OF NETWORK APPLICATIONS - Network performance is monitored using timing information retrieved from a client device, server in communication with the client, or both. Client side timing information is retrieved using performance monitoring code provided by the server. The code may be provided to the client as part of a content response. Once content in the provided content response is loaded, the code sends the timing information to the server. The server may then process the timing information to calculate response time and other time information metrics. | 10-13-2011 |
20110252005 | DISTRIBUTED SYSTEM HAVING A SHARED CENTRAL DATABASE - A system for managing electronic information in a distributed system includes a shared central database for which a plurality of servers transmits data for storage. The shared central database is configured to store central schema information used for accessing the one or more data stores of the central database. Local databases each reference at least a portion of the central schema information for accessing the central database. Upon receiving a request for information, a local database directs the request to the central database based on the referenced schema information. The central database processes the request and transmits the data to the local database from which data was requested. | 10-13-2011 |
20110246987 | Energy Efficient Scheduling System and Method - An energy efficient scheduling system and method is disclosed. In some embodiments, a method includes receiving, with a processor, a request for execution of an application. The method also includes receiving, based on the request, a scheduling policy. Additionally, the method includes for each of a plurality of datacenters, determining one or more datacenter attributes associated with each respective datacenter. The method also includes selecting one of the plurality of datacenters to execute the application based, at least in part, on the request, the scheduling policy, and the datacenter attributes and executing the application at the selected datacenter. | 10-06-2011 |
20110246980 | Facilitating Software Acquisition - In certain embodiments, facilitating software acquisition includes accessing a memory storing software programs. A selected software program is identified. One or more product requirements of the selected software program and one or more target parameters of a target environment for the selected software program are determined. One or more commands to install the selected software program at the target environment according to the product requirements and the target parameters are determined. | 10-06-2011 |
20110239050 | System and Method of Collecting and Reporting Exceptions Associated with Information Technology Services - According to one embodiment of the present disclosure, a method of collecting and reporting exceptions associated with information technology services includes receiving exceptions associated with a service, including receiving exceptions associated with an infrastructure and exceptions associated with an application; formatting the exceptions into an exceptions list; correlating at least one of the exceptions associated with the infrastructure and at least one of the exceptions associated with the application to identify a service error condition; and storing the exceptions list and an identifier of the service error condition for presentation to a client associated with the service. | 09-29-2011 |
20110239037 | System And Method For Providing Indexing With High Availability In A Network Based Suite of Services - A suite of network-based services, such as the services corresponding to Microsoft® SharePoint™, are provided to users with high availability. The suite of network-based services may include browser-based collaboration functions, process management functions, index and search functions, document-management functions, and/or other functions. In particular, the indexing service associated with the suite of network-based services may be provided with high availability. | 09-29-2011 |
20110238812 | SYSTEM AND METHOD FOR HIGH-PERFORMANCE PROFILING OF APPLICATION EVENTS - A system and method for high-performance profiling of web-enabled application events are provided. In one embodiment, the method includes registering a profiler as a provider to an event tracer. Information associated with an event is captured using the profiler, the event is associated with a web-enabled application. A function token is associated with the captured information, which is communicated to the event tracer. | 09-29-2011 |
20110238573 | CARDLESS ATM TRANSACTION METHOD AND SYSTEM - A method and system are provided for conducting automatic teller machine (ATM) transactions without the use of an ATM card, using a mobile user device. The mobile user device communicates with an ATM, a provider interface or a network. The ATM communicates with the mobile user device through a contact or contactless means, which may include communication through any wireless connection such as RFID, Bluetooth™ or other near field communication means, or through a USB port or other means of contact. A mobile user device may provide transaction information or authentication information to an ATM or to an authentication system in communication with an ATM. The transaction may be associated with the user's ATM account or another account. The mobile user device may generate a dynamic value which may be used as a password, an authentication value, an account identifier or a transaction identifier. | 09-29-2011 |
20110238515 | SYSTEM AND METHOD FOR SELECTING SERVICES FROM MULTIPLE CLOUD VENDORS - A system and method permits the selection of services from multiple cloud vendors. The system receives parameters relating to a plurality of services offered by a plurality of vendors in a plurality of cloud computing environments. The parameters relate to an actual cost charged by each of the vendors and a cost relating to an environmental impact of each of the vendors. The system calculates a value for each of the vendors as a function of the received parameters, and selects one or more vendors as a function of the calculated value. The system outputs to a display device one or more of the selected vendors and the calculated values for each of the vendors. In another embodiment, the system establishes a communication connection with one or more of the cloud computing environments, and invokes one or more applications or services from the one or more cloud computing environments. | 09-29-2011 |
20110231817 | SYSTEM AND METHOD FOR EVALUATING AND SELECTING SOFTWARE COMPONENTS AND SERVICES - A system that includes one or more computer processors is configured to receive parameters relating to non-functional attributes of a proposed software component, parameters relating to non-functional attributes of one or more available software components, and a weight for each of the non-functional attributes. The system calculates a quality and a risk for each available software component as a function of the parameters of the proposed software component, the parameters for the one or more available software components, and the weight for each of the non-functional attributes. The system outputs to a display device one or more of the quality and the risk for the one or more available software components. | 09-22-2011 |
20110231229 | Hybrid Software Component and Service Catalog - A hybrid software component and service catalog is disclosed. A method according to embodiments of the present disclosure includes identifying a plurality of existing information technology services in an enterprise, wherein each of the plurality of existing information technology services includes a plurality of attributes. The method also includes assigning a quality metric associated with one or more attributes of each of the respective identified existing information technology services. The method also includes identifying a plurality of potential information technology services, wherein each of the plurality of potential information technology services includes a plurality of attributes. Additionally, the method includes receiving a quality metric associated with one or more attributes of each of the respective identified potential information technology services from a source external to the enterprise. The method further includes determining a threshold associated with a selected one of the existing information technology services and comparing the quality metric associated with the selected one of the existing information technology services to the quality metric associated with a selected one of the potential information technology services. The method also includes based at least in part on the comparison and the determined threshold, displaying the potential information technology resource to a user. | 09-22-2011 |
20110219238 | Method and System for Detecting Malware Using a Remote Server - The present disclosure is directed to a method and system for detecting malware using a remote server. In accordance with a particular embodiment of the present disclosure a hash value for a file is generated. The hash value is transmitted to a remote server. A notification is received from the remote server indicating whether the file comprises malware. At least one operation on the file is prevented if the notification indicates the file comprises malware. | 09-08-2011 |
20110219200 | SYSTEM AND METHOD TO ARCHIVE EMAIL MESSAGES IN A SOFTWARE AS A SERVICE SYSTEM - A system includes a client machine or first server, and a second server. The first server is coupled via a network connection to the second server. The second server is configured to provide an electronic mail service. The first server includes a processor configured to receive an electronic mail message from the second server via a network browser rendered on the client machine, to apply an archive policy to the electronic mail message, and to store the electronic mail message in a computer data storage medium coupled to the first server. | 09-08-2011 |
20110219111 | SYSTEM AND METHOD FOR INTELLIGENT SERVICE ASSURANCE IN NETWORK MANAGEMENT - Systems and methods for intelligent service assurance testing provided herein include receiving network infrastructure information relating to a network, receiving one or more service assurance testing parameters, determining a test schedule of one or more service assurance tests for service assurance testing of the network, the test schedule being based at least in part on the network infrastructure information and the one or more service assurance testing parameters, and deploying the one or more service assurance tests on one or more devices of the network according to the test schedule. | 09-08-2011 |
20110219043 | SYSTEM AND METHOD FOR STORING METRICS IN A DATABASE - A system and method for storing data associated with an extensible instrumentation layer are provided. In one embodiment, the method includes receiving metrics from an extensible instrumentation layer in an operating system. The metrics are defined by at least one class and a plurality of properties, with each property being associated with one class. The metrics are converted into at least one database-compliant data structure and stored in a database. | 09-08-2011 |
20110219040 | DATA PACKAGING SYSTEM AND METHOD - A method for communicating data includes selecting a portion of data for communication to a remote computer with the data portion in device-dependent format and comprising at least an integer, a real number, or a binary value. A portable buffer is generated based on the selected data portion, the portable buffer comprising at least one device-independent data representation. The portable buffer is communicated to the remote computer for processing the data portion in a second device-dependent format. | 09-08-2011 |
20110219019 | System And Method For Providing Network-Based Services To Users With High Availability - A suite of network-based services, such as the services corresponding to Microsoft® SharePoint™, are provided to users with high availability. To maintain the availability of the services, the configuration parameters of a first server are updated on an ongoing basis, and the updated configuration parameters are used to configure a second, backup server. In the event of switchover or failover, the backup server is prepared to provide the serving functionality of the first server. | 09-08-2011 |
20110219001 | EMERGING TOPIC DISCOVERY - This document discusses, among other things, a method for discovering a new topic. The method includes identifying a first topic within a first document and comparing the first topic to a first set of topics. The method then determines whether an emergence time for the first topic can be identified. The first topic is recognized as a new topic based on the comparison between the first set of topics and the emergence time for the first topic. For example, when the first topic does not exist within the first set of topics and the emergence time for the first topic can be identified, the first topic is recognized as a new topic. | 09-08-2011 |
20110217987 | SYSTEM AND METHOD FOR PROVIDING WIRELESS NETWORK SERVICES USING THREE-DIMENSIONAL ACCESS ZONES - A system and method for providing wireless network services using three-dimensional access zones is provided. One or more sensors may determine signal strength information, distance, or other positional information for wireless devices. An agent may provide information relating to fixed wireless reference points, and may control underlying operating systems for the reference points based on policies defined by a manager. For example, the manager may be coupled to the sensors and to the agent, and may define a three-dimensional coordinate system for a managed environment. By collecting information from the sensors and the agent, the manager may triangulate three-dimensional locations of the wireless devices, and may enforce three-dimensional access zone policies for the wireless network via the agent. | 09-08-2011 |
20110208928 | System and Method for Improving Performance of Data Container Backups - A method for improving performance of data container backups comprises identifying a data container on a source computer to be backed up. A snapshot image of the data container is generated, wherein the snapshot image comprises one or more partitions. Data is read simultaneously from each of the one or more partitions to a destination computer over one or more transport paths. Each of the one or more transport paths comprises one or more threads. The data read to the destination computer is backed up such that the data retains a physical block sequence of the data container. | 08-25-2011 |
20110208606 | Information Technology Services E-Commerce Arena for Cloud Computing Environments - A system and method for IT services e-commerce arena for cloud computing environments is disclosed. The method includes receiving, from each of a plurality of service clients, a request for processing time on a processor. The method also includes receiving, from each of a plurality of service providers, an offer for processing time on a processor operated by each respective service provider. Additionally, the method includes generating a buyer group based on information included in each respective request, wherein the buyer group comprises a selected one or more of the plurality of service clients to receive processing time on a processing resource and selecting one of the plurality of service providers to provide processing time on the processor operated by the selected service provider to the service clients in the buyer group. Further, the method includes initiating a transaction between each of the service clients in the buyer group and the selected service provider. | 08-25-2011 |
20110202927 | Apparatus, Method and System for Aggregating Computing Resources - A system for executing applications designed to run on a single SMP computer on an easily scalable network of computers, while providing each application with computing resources, including processing power, memory and others that exceed the resources available on any single computer. A server agent program, a grid switch apparatus and a grid controller apparatus are included. Methods for creating processes and resources, and for accessing resources transparently across multiple servers are also provided. | 08-18-2011 |
20110202640 | Identification of a destination server for virtual machine migration - A method for identification of a destination server for VM migration from a source server across a network is provided. The method comprises generating a profile for a virtual machine (VM) located on a source server, wherein the profile includes a plurality of parameters and a plurality of parameter constraints. The method further comprises polling a plurality of servers located on a network for values of the parameters and corresponding weights. It is determined whether the VM requires migration. Upon determination that migration is required, the method comprises identifying one or more destination servers located on the network that satisfy the parameter constraints, creating an ordered list of the one or more destination servers based on the corresponding weights if more than one destination server are identified, selecting a destination server from the ordered list, and migrating the VM to the selected destination server. | 08-18-2011 |
20110202584 | SYSTEM FOR STORING AND TRANSMITTING COMPRESSED INTEGER DATA - A method is disclosed for encoding and decoding integer values ranging over a known gamut of values used by a data system. By noting that a data system may store and/or transmit integer values over a predefined gamut having a minimum and a maximum limit, integer values at or near the maximum may be compressed to a greater degree than in conventional systems without any loss of data resolution. | 08-18-2011 |
20110202529 | CONFIGURATION ITEM RECONCILIATION - This document discusses, among other things, a method for reconciliation of a configuration item with a configuration management database. Properties of the configuration item are divided into a plurality of classes. Different classes correspond to properties having a different relationship with a corresponding configuration item. At least one property of the configuration item is compared to properties of configuration items in a configuration management database. Different actions are taken with respect to the configuration item based on the class of the property being compared. | 08-18-2011 |
20110202368 | EMAILING/TEXTING BIOMETRIC DATA FOR AUTOMATIC EMR INCORPORATION - A message from a device may be automatically identified by an identifier associated with the message or the device or combination thereof. The identifier may be mapped to a user record in a database. The message may be parsed into health related data associated with the user. The health related data is automatically stored into the user record of the database. | 08-18-2011 |
20110191862 | System and Method for Restricting Access to Requested Data Based on User Location - A system and method for restricting access to requested data based on user location are disclosed. The method comprises receiving a data request and determining origin location information of the data request from a source providing information having accuracy to a predetermined standard. The method further comprises retrieving one or more policies associated with the requested data, comparing the origin location information with the policies, and dynamically adjusting access restrictions to the requested data based on the comparison. | 08-04-2011 |
20110191773 | System and Method for Datacenter Power Management - A system and method for datacenter power management is disclosed. In particular embodiments, the method includes receiving, with a processor, a request for execution of an application. The method also includes for each of a plurality of datacenters, determining an amount of electricity required to execute the application at the respective datacenter. The method also includes, for each of the plurality of datacenters, determining a cost associated with executing the application at the respective datacenter based, at least in part, on the amount of electricity required to execute the application at the respective datacenter. The method further includes selecting one of the plurality of datacenters to execute the application based, at least in part, on the cost associated with executing the application at the respective datacenter and executing the application at the selected datacenter. | 08-04-2011 |
20110179313 | System and Method for Correlating Empirical Data with User Experience - A method includes receiving at a computing system empirical data related to one or more information technology entities. The method further includes receiving at the computing system one or more user experience indicators, the user experience indicators indicative of a user's experience using a computer application. The method further includes correlating by the computing system the empirical data with the one or more user experience indicators to determine a quality of service delivered to a user for a plurality of time periods. The method further includes determining by the computing system, based on the correlation, whether one or more issues with one of the one or more information technology entities are related to the quality of service delivered to the user. | 07-21-2011 |
20110167497 | System and Method for Managing Wireless Devices in an Enterprise - Methods and systems are disclosed for managing wireless devices in an enterprise. A first exemplary method manages the physical access points of a wireless network in an enterprise. A second exemplary method manages the assets of wireless devices in an enterprise. A third exemplary method enables virus detection within wireless devices. A fourth exemplary method manages wireless device data backup. | 07-07-2011 |
20110167156 | MONITORING RELATED CONTENT REQUESTS - Multiple transaction components that comprise a transaction are correlated using a GUID generated at a browser application. The transaction components may occur asynchronously or synchronously between a network browser and one or more applications. An identifier is generated for a set of network browser requests corresponding to a single user input or some other event and the identifier is included in each request. Server traffic and the servers processing the request are monitored and data which includes the identifier is generated. Data for the transaction with multiple transaction components is reported using the GUID associated with the transaction. | 07-07-2011 |
20110161306 | Method and Apparatus for Role Grouping by Shared Resource Utilization - Role search apparatus for grouping nodes according to relationships with other nodes, the apparatus comprising: an input for receiving an arrangement of nodes said arrangement comprising at least two partitions of said nodes and with predetermined relationships between nodes across said partitions, and a pattern recognition unit associated with said input, for using pattern recognition on said nodes and said relationships to find relationship patterns amongst said nodes, thereby to form at least one group from nodes of a first of said partitions, wherein said nodes being formed into said group share relationships with same ones of a predetermined number of nodes in a second partition. | 06-30-2011 |
20110153793 | SYSTEM AND METHOD FOR CREATING A SECURE TUNNEL FOR COMMUNICATIONS OVER A NETWORK - A system and method for establishing a virtual local area network (LAN) between a local device and a remote device are provided. The local device and the remote device may each have a physical and a virtual network interface card (NIC), and a virtual driver associated with each respective device virtual NIC may assign a Media Access Control (MAC) address to the virtual NIC and an Internet Protocol (IP) address to the physical NIC. The local device may communicate an IP to MAC address translation to the remote device that maps the assigned IP address to the assigned MAC address. Thereafter, the remote device may transmit secure data that can be received by the local device. For example, the remote device may encapsulate the data being communicated as well as the IP to MAC address translation for the local device into an HyperText Transfer Protocol (HTTP) request. | 06-23-2011 |
20110145660 | DETECTION AND REDUCTION OF EXCESSIVE SNMP TRAFFIC - Various embodiments herein include at least one of systems, methods, and software to detect and reduce messages from network entity management clients that are not utilized by a network management system. Once identified, the network management system may send a command to the network entity management clients to no longer send particular message types to the network management system. The network management system may also, or alternatively configured to take no action when such messages are subsequently received. | 06-16-2011 |
20110145404 | Autonomic Control of a Distributed Computing System Using Finite State Machines - In general, this disclosure describes techniques of managing resources in a service-oriented distributed computing system. As described in this disclosure, one or more control nodes provide for the efficient and automated allocation and management of resources within the distributed computing system. In order to provide automated allocation and management of computing functions and resources, a control node uses a set of governors. This set of governors includes a set of service governors to govern services used in the distributed computing system. The set of governors also includes a set of resource governors that govern individual resources of the services in the distributed computing system. The service governors and the resource governors may be implemented using finite state machines. | 06-16-2011 |
20110145199 | SYSTEM AND METHOD OF STORING BACKUP IMAGE CATALOG - A system and method for managing backup and restore operations associated with a backup system. Metadata associated with files/directories of one or more file systems associated with one or more resources may be received. A virtual catalog image associated with the metadata may be created in a virtual file system image format. Once the virtual catalog image is created, virtualization vendor specific technology may be utilized to mount the image on the backup system and search and browse operations may be performed. The virtual catalog image may contain the file/directory hierarchy without containing actual file data. | 06-16-2011 |
20110144971 | SYSTEM AND METHOD FOR SENTIMENT ANALYSIS - A system includes one or more computer processors that are configured to receive data relating to a composition of a target group, receive logged communications of the target group, extract textual information from the logged communications, analyze the textual information using statistical and linguistic sentiment analysis techniques, identify an individual or sub-group from the target group as a function of the analysis of the textual information, and display on a user interface or transmit to another processor the identified individual or sub-group of the target group and to display on the user interface or transmit to another processor a sentiment assessment of the identified individual or sub-group as a function of the statistical and linguistic sentiment analysis. | 06-16-2011 |
20110119530 | SERVICE MODELING IMPACT ANALYSIS - A computer system includes a plurality of computer processor dependent nodes and a plurality of computer processor antecedent nodes. Each node includes a severity value relating to an operational state of the node. A dependent node and an antecedent node pair include a significance value relating to a criticality that the antecedent node has to its paired dependent node. The antecedent node comprises a relevance value, wherein the relevance value is a function of the severity value of the antecedent node and the significance value for the antecedent node and the dependent node. The relevance value is used to determine an impact that the antecedent node has on the paired dependent node. | 05-19-2011 |
20110118880 | SYSTEM AND METHOD FOR POLICY BASED AUTOMATED CONTROL OF BUILDING EQUIPMENT USING SYSTEMS MANAGEMENT - A system and method for automated control of building equipment. Systems management information including, for example, key stroke information, mouse movement information, host name information and/or IP address information may be utilized to determine a location of a managed resource in a building from which the systems management information is received. Based on, the systems management information, the determined location and/or one or more policies, one or more requests to control appropriate building equipment may be triggered. | 05-19-2011 |
20110118554 | DEVICE-ASSISTED SOCIAL NETWORKING FOR HEALTH MANAGEMENT - Device-assisted social networking for health management, in one aspect, collects health related information associated with one or more users, performs analysis and publishes data resulting from the analyzing to a social networking website associated with one or more users, wherein the data may be shared among the users in a group for peer encouragement in habits that would improve the users' health conditions. | 05-19-2011 |
20110113013 | DUPLICATE BACKUP DATA IDENTIFICATION AND CONSOLIDATION - The various embodiments herein include operate to identify, consolidate, and reduce redundant backup data storage. One embodiment includes storing data blocks and first signatures of data chunks of each stored data block, the first signature of each data chunk including a reference to a storage location of the data chunk within a stored data block, the stored data blocks including data blocks of previous and recent backup sessions. Some embodiments further include storing second signatures in a second signature repository, where the second signatures are calculated based on determined boundaries of the first signatures from previous backup sessions. At least one of the second signatures is calculated based on at least two first signatures, and in the range of 32 to 64 first signatures in some embodiments. Some embodiments may identify data chunks of the recent backup session present in the stored data blocks prior to the recent backup session. | 05-12-2011 |
20110107043 | SELF LEARNING BACKUP AND RECOVERY MANAGEMENT SYSTEM - A system and method provide for a reception of data at a computer processor. The data relates to a dataset in a computer system. The computer processor calculates a weight for the dataset as a function of the data, and the processor executes an action on the dataset as a function of the weight. In an embodiment, the action is a backup of data on the computer system, and through recalculation of the weight over a period of time, the backup schedule, backup media, and other parameters are altered based on the changing weight for a dataset. | 05-05-2011 |
20110099158 | SYSTEM AND METHOD FOR AUTOMATICALLY DETECTING, REPORTING, AND TRACKING CONFLICTS IN A CHANGE MANAGEMENT SYSTEM - A system and method for automatically detecting, reporting, and tracking conflicts in a change management system is provided. In particular, the system and method described herein may be used to identify potential conflicts associated with resources and schedules involved in a proposed change to an information technology infrastructure. A conflict analysis engine may analyze a change order that includes planned changes to an information technology infrastructure to identify potential conflicts associated with the change order that includes the planned changes to the information technology infrastructure. The potential conflicts may then be added to a conflicts list for the change order and a workflow may be created to manage resolving the potential conflicts. Thus, in response to resolving the potential conflicts, the planned changes may be deployed within the information technology infrastructure. | 04-28-2011 |
20110098973 | Automatic Baselining Of Metrics For Application Performance Management - An application monitoring system monitors one or more applications to generate and report application performance data for transactions. Actual performance data for one or more metrics is compared with a baseline metric value(s) to detect anomalous transactions or components thereof. Automatic baselining for a selected metric is provided using variability based on a distribution range and arithmetic mean of actual performance data to determine an appropriate sensitivity for boundaries between comparison levels. A user-defined sensitivity parameter allows adjustment of baselines to increase or decrease comparison sensitivity for a selected metric. The system identifies anomalies in transactions, components of transaction based on a comparison of actual performance data with the automatically determined baseline for a corresponding metric. The system reports performance data and other transactional data for identified anomalies. | 04-28-2011 |
20110083190 | SYSTEM AND METHOD FOR DATA LEAKAGE PREVENTION - According to one embodiment, a method for securing information includes detecting an access to sensitive data and determining user information associated with the access to sensitive data. The method also includes determining a unique user identifier associated with the user information. In addition, the method includes comparing the access to sensitive data to a policy utilizing the unique user identifier. Further, the method includes determining that the access to sensitive data violates the policy in response to comparing the access to the policy. The method also includes recording an entry in response to determining that the access to sensitive data violates the policy. | 04-07-2011 |
20110083159 | SYSTEM AND METHOD FOR ROLE DISCOVERY - According to one embodiment, a method for role determination includes detecting access to sensitive data and determining user information related to the access to sensitive data in response to detecting the access to sensitive data. The method also includes modifying at least one role in response to determining the user information related to the access to sensitive data. In addition, the method includes storing the modified at least one role. | 04-07-2011 |
20110083002 | SYSTEM AND METHOD PROVIDING A PLUGGABLE ARCHITECTURE FOR TASK MANAGEMENT ON COMPUTERS - A system and method retrieve an image using a first computer processor, and transmit the image from the first computer processor to a second remote computer processor. The first computer processor and the second remote computer processor are coupled via a network connection. The image is received at the network connection, and the image is a lightweight operating system that is configured to be stored in and execute in a virtual memory coupled to the second remote computer processor. The second remote computer processor is not equipped with additional hardware or an agent to receive or execute the image. | 04-07-2011 |
20110078798 | REMOTE PROCEDURE CALL (RPC) SERVICES FUZZ ATTACKING TOOL - A system and method for testing a computer program using a computer system includes a plurality of computer systems communicating using a network. An interface parser module defines at least one program interface in a program file of a specified program. A fuzzer module reads the program file and identifies the program interfaces. An attack data generator module attacks the program interfaces and communicates with the fuzzer, and the fuzzer determines vulnerabilities in the specified program. A recorder records the attacking procedure. A verifier verifies remedies for vulnerabilities by replaying the attacking procedure of the program interface and determining vulnerabilities. A service status detective module restarts the specified program when the specified program ceases to operate or crashes. | 03-31-2011 |
20110078256 | ANALYZING CONTENT OF MULTIMEDIA FILES - A method for analyzing content of multimedia files is presented. The method comprises processing messages from mail servers, determining a type of the message, executing a convert module and obtaining text content of the message when said type is audio, extracting text from the text content or the message, creating a text version of components from the text, dividing the text version into different files, and analyzing the different files. Further, the messages can be captured, sent to a pending folder, retrieved from the pending folder. Creating the text version and dividing the text version can be performed by a mail engine. Natural language processing can be performed on the files. The text can be examined for compliance and, if appropriate, marked with quarantine violations. | 03-31-2011 |
20110072487 | System, Method, and Software for Providing Access Control Enforcement Capabilities in Cloud Computing Systems - According to one embodiment, a system comprises one or more processors coupled to a memory. The one or more processors when executing logic encoded in the memory provide a topology manager. The topology manager is configured to maintain a security topology of a plurality of hosts. The security topology associates one or more virtual hosts policies with a plurality of virtual hosts in a cloud computing deployment. The topology manager is also configured to request a query for one or more hosts that are candidates to be enforced. A portability manager is configured to receive a request to deploy an access control agent on the one or more candidate hosts, determine an optimal agent to be deployed from a list of available agents, and deploy the optimal agent on the one or more candidate hosts. | 03-24-2011 |
20110072486 | System, Method, and Software for Enforcing Access Control Policy Rules on Utility Computing Virtualization in Cloud Computing Systems - According to one embodiment, a system comprises one or more processors coupled to a memory and executing logic. A policy life cycle component is configured to maintain a repository of security policies. The repository of security policies comprises policies governing access to a virtual host and to a plurality of virtual machines running on the virtual host. The policy life cycle component is also configured to issue a compound policy for an identified virtual operating system running on the virtual host. The compound policy provides a virtual host policy and access rules for each of the plurality of virtual machines running on the virtual host. A topology manager is configured to receive the compound policy from the policy life cycle component, assign the compound to an access control agent, and maintain a security policy topology. The security policy topology stores associations between access control agents and compound policies. | 03-24-2011 |
20110060617 | System and Method for Managing Sustainability for an Organization - A computer-implemented method for managing sustainability for an organization is disclosed. The method may include storing on one or more memory modules of a computer system a plurality of instances of an ecoActivity object. Each instance of the ecoActivity object may represent an activity of the organization affecting environmental sustainability. The method may further include storing a plurality of instances of an emission factor object. Each instance of the emission factor object may at least partially quantify one or more green house gas emissions as a function of one or more respective metrics. The method may include establishing a computer-based logical link between each one of the plurality of instances of the ecoActivity object and at least one of the instances of the emission factor object. In certain embodiments, the method may include receiving data representing the metric(s) for the logically linked instance(s) of the emission factor object. For each one of the plurality of instances of the ecoActivity object, the method may include calculating one or more green house gas emission quantities based at least in part by applying, for the logically linked at least one of the plurality of instances of the emission factor object, the function of the metric(s) to the received metric(s). Additionally, the method may include aggregating together at least some of the green house gas emission quantities. In various embodiments, the method may include transferring data representing the aggregation of the calculated green house gas emission quantities. | 03-10-2011 |
20110060616 | System and Method for Managing Stakeholder Impact on Sustainability for an Organization - A computer-implemented method for managing stakeholder impact on sustainability for an organization is disclosed. The method may include storing a plurality of instances of a stakeholder object. Each instance may define a plurality of characteristics of a stakeholder of the organization. In certain embodiments, the characteristics may be selected from the group consisting of: a description of the stakeholder, a category of the stakeholder, a description of a relationship with the stakeholder, an owner of the relationship with the stakeholder, a description of a stakeholder investment in the organization, a first indication of an extent to which a stakeholder interest actually aligns with an organizational interest, a second indication of an extent to which the stakeholder interest is optimally aligned with the organizational interest, a description of an approval power granted to the stakeholder, an importance rating of the stakeholder relationship from a perspective of the organization; and an anticipated effect of a sustainability project of the organization on the stakeholder relationship. The method may further include establishing a computer-based logical link between at least one instance of the stakeholder object to at least one sustainability project of the organization. The method may also include generating a progress report of the sustainability project and determining that a particular stakeholder of the organization is logically linked to the sustainability project. In certain embodiments, the method may include, automatically transferring the progress report to the stakeholder of the organization, wherein the progress report is transferred in a desired format. | 03-10-2011 |
20110060615 | System and Method for Managing Assessments for an Organization - According to one embodiment, a computer-implemented method for managing assessments for an organization is disclosed. The method may include storing in a computer system a plurality of instances of an assessment object. Each of the plurality of instances of an assessment object may be configured to track progress of a plurality of assessment attributes. The method may further include receiving an input associated with a plurality of at least a subset of the assessment attributes. Additionally, the method may include generating an assessment plan based at least in part on the received data. In certain embodiments, the method may include establishing a computer-based logical link between the assessment plan and least one sustainability project of the organization, the at least one sustainability project of the organization stored in the computer system. The method may further include receiving from the computer system data for each of the plurality of at least the subset of the assessment attributes. In various embodiments, the method may include generating using a computer unit an assessment report based at least in part on the received data for each of the plurality of at least the subset of the assessment attributes, the assessment report indicating progress of each of the plurality of at least the subset of the assessment attributes. The method may further include transferring the assessment report from the computer unit in a desired format. | 03-10-2011 |
20110060614 | System and Method for Managing Sustainability for an Organization - A computer-implemented method for managing sustainability for an organization is disclosed. The method may include storing in a computer system a plurality of characteristics of an activity. The activity may contribute to the carbon footprint of an organization. The plurality of characteristics may include a unit of measurement, an activity category, a plurality of hierarchical descriptors, and a respective multiplier for each hierarchical descriptor. The method may further include receiving from the computer system data representing a number of the unit of measurement. Additionally, the method may include receiving from the computer system data representing a first one of the plurality of hierarchical descriptors. The method may further include calculating, using a processor of a computer unit, a carbon emission value based at least in part by multiplying the number of the unit of measurement by the respective multiplier of the first one of the plurality of hierarchical descriptors. The method may further include storing in the computer system the carbon emission value and receiving from the computer system data representing a second one of the plurality of hierarchical descriptors. The method may further include, in response to the received data representing the second one of the plurality of hierarchical descriptors, automatically updating the stored carbon emission value with a recalculated carbon emission value at least in part by the processor of the computer unit multiplying the number of the unit of measurement by the respective multiplier of the second one of the plurality of hierarchical descriptors. | 03-10-2011 |
20110060613 | System and Method for Aligning Projects with Objectives of an Organization - According to one embodiment, a computer-implemented method for aligning projects with an objective of an organization is disclosed. The method may include storing in a computer system a representation of an objective of an organization. The method may further include storing in the computer system a plurality of sustainability projects of the organization. Additionally, the method may include establishing a computer-based logical link between the objective of the organization and at least some of the plurality of sustainability projects of the organization. In certain embodiments, the method may include receiving from the computer system data representing one or more respective metrics for each of the at least some of the plurality of sustainability projects of the organization. The method may further include generating one or more key performance indicators for each of the at least some of the plurality of sustainability projects of the organization. Each key performance indicator may indicate a contribution of a particular sustainability project of the organization towards achieving the objective of the organization. | 03-10-2011 |
20110060612 | System and Method for Evaluating Sustainability Projects of an Organization - According to one embodiment, a computer-implemented method for evaluating sustainability projects of an organization is disclosed. The method may include retrieving from a computer system a sustainability objective of the organization. In certain embodiments, the method may include retrieving from the computer system a plurality of project submissions of the organization. Each of the plurality of project submissions may be associated with the sustainability objective of the organization. The method may further include retrieving from the computer system a plurality of first scores, each first score being associated with at least one of the plurality of project submissions. In particular embodiments, the method may include generating at the computer system a displayable output representing an expected contribution of each one of the plurality of project submissions towards the sustainability of the organization. The displayable output may comprise a plurality of second scores. Each of the plurality of second scores may be associated with at least one of the plurality of project submissions. In addition, each of the plurality of second scores may be based at least in part on at least one of the plurality of first scores. The method may further include storing in the computer system an identification of one or more potential projects from among the plurality of project submissions. Each potential project may be adapted to advance the sustainability objective of the organization. At least one of the one or more potential projects may have a highest comparative second score of the plurality of second scores. | 03-10-2011 |
20110055165 | SYSTEM AND METHOD FOR VERSIONING OF CONFIGURATION ITEMS - A system and method for reconstructing a previous state of a configuration item based on information regarding changes to one or more values of one or more attributes associated with the configuration item. | 03-03-2011 |
20110047129 | BACKUP AND RECOVERY OF SYSTEMS INCLUDING BOOT CONFIGURATION DATA IN AN EXTENSION FIRMWARE INTERFACE PARTITION - Various embodiments includes at least one of systems, methods, and software for backup and recovery of systems including boot configuration data in an extension firmware interface partition. Generating a backup, in some embodiments, includes copying Boot Configuration Data (BCD) from a registry of an operating system executing on a computer into a file and storing the file. These and other embodiments may include a system restore process that consumes this file. Such a process may operate to identify an Extension Firmware Interface (EFI) hard disk partition on a hard disk of a system to be restored, temporarily assign a drive letter to the identified EFI hard disk partition, and copy files common amongst all installations an operating system to be restored on the system along with BCD data from the BCD file to the EFI hard disk partition according to the assigned drive letter. The system may then be rebooted. | 02-24-2011 |
20110047123 | SYSTEM AND METHOD FOR BUILDING AND MERGING A RULEBASE WITH OBJECT ORIENTED SOFTWARE - A method for building a rulebase includes receiving a plurality of rulebase components. The method also includes merging the rulebase components to create a consolidated rulebase. | 02-24-2011 |
20110030041 | Session Ticket Authentication Scheme - A method of propagating a user's authentication/session information between different requests to Web services in a network includes a web server receiving a request for access to a first web service. The request is intercepted with an agent and authentication credentials are collected. A determination is made whether the web service customer is authenticated and authorized. If the web service customer is authenticated and authorized, a session and session ticket are created. An ID and the session ticket are returned to the web server. The session ticket ID and a public key are encrypted into an assertion. The assertion is sent to the first web service. The assertion is then returned to the web service customer for use with future requests. The assertion can be in the form of a SAML assertion. | 02-03-2011 |
20110022707 | HIERARCHY FOR CHARACTERIZING INTERACTIONS WITH AN APPLICATION - Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components). | 01-27-2011 |
20110022664 | Cost Based Email Management System - A method for managing email costs includes: identifying a participant of an email message in an email thread; assigning a cumulative cost to the email message; and presenting the email message and the cumulative cost to a recipient of the email message. | 01-27-2011 |
20110022359 | System and Method for Measuring Greenness of an Information Technology Environment - A computer-implemented method for measuring the “greenness” of an IT environment is provided. The method comprises extracting asset data from a plurality of IT assets located on a network and extracting one or more greenness attributes from each of the plurality of IT assets. Key performance indicators are calculated, using the one or more greenness attributes, for each of the plurality of IT assets, and the key performance indicators are presented to a user in a graphical user interface. According to more particular embodiments, the greenness attributes comprise numerical values representing one or more of power requirements, power consumption, and resource utilization. | 01-27-2011 |
20110016467 | System And Method For Managing Virtual Machines - In some embodiments, a method for virtual machine management includes receiving a request for a first virtual machine from a virtual host. The method also includes comparing the request for the first virtual machine to a policy. The policy includes rules that govern access to a plurality of virtual machines. In addition, the method includes providing the virtual host access to a second virtual machine in response to comparing the request for the first virtual machine to the policy. | 01-20-2011 |