CA, Inc. Patent applications |
Patent application number | Title | Published |
20160134620 | LOADING USER DEVICES WITH LISTS OF PROXIMATELY LOCATED BROADCAST BEACONS AND ASSOCIATED SERVICE IDENTIFIERS - A user device transmits a location update message, indicating a location of the user device, to a network server. Responsive to the location update message, the user device receives from the network server a list of radio frequency beacons transmitted by resource devices and associated service identifiers for services available from the resource devices. A radio frequency beacon received from a resource device is identified as being in the list. A message is sent to the resource device requesting access to a service identified by a service identifier in the list associated with the radio frequency beacon and providing credentials for a user of the user device in the message. | 05-12-2016 |
20160127203 | ARRANGEMENT OF NATIVE APPLICATIONS ON A MOBILE DEVICE USER INTERFACE BASED ON USAGE PATTERNS - A method includes performing operations as follows on a processor: detecting invocations of a plurality of native applications residing on a mobile device by a user through a user interface, determining usage patterns for the plurality of native applications based on the invocations by the user, and configuring the user interface to present the native applications for invocation based on the usage patterns that were determined. | 05-05-2016 |
20160125052 | DATABASE VIRTUALIZATION - Frame data is received from an agent instrumented on a software component, the frame data describing a particular request from the software component to a database access component intercepted at the agent. The particular request corresponds to a transaction involving a database and the software component can interface with the database using the database access component. A service mode is identified that corresponds to the transaction and virtualization data is generated based on the service model and the particular request. The virtualization data is sent to the agent that describes a virtualized response to be provided by the agent to the software component as a response to the particular request. | 05-05-2016 |
20160119331 | Counter Sets For Copies Of One Time Password Tokens - One time password (OTP) technology enables a plurality of OTP software token instances (or copies) to be used simultaneously on a plurality of computing devices of a user. OTP software instances may be counter based. An authentication server comprising authentication software assigns a set of counters for each OTP software instance. An OTP software instance may be provided along with the assigned set of counters to each computing device. A range of counters may be partitioned by the authentication server into mutually exclusive sets of counters. An OTP software instance executed by a computing device uses one of the counters in the assigned set of counters to provide an OTP. The authentication server attempts authentication by using each counter in the assigned set of counters to provide a calculated OTP that is compared to the received OTP. The authentication server verifies authenticity when a calculated OTP matches a received OTP. | 04-28-2016 |
20160119324 | Single Sign On Across Multiple Devices Using A Unique Machine Identification - Single sign on technology enables shared access to a protected service, such as an application, from a plurality of dynamically associated computing devices. After logging into the application from one of the computing device, a user may access the application from the other computing devices without re-authentication. A user may also log out from the application from any of the computing device. Unique machine identifications, such as device DNA, for identifying each of the computing devices are used in, for example, a method, apparatus (such as a login server) and computer program product. A single session may be shared across multiple computing devices. The same authentication token, such as a SAML token, may also be used for all of the computing devices having the same user session. | 04-28-2016 |
20160119323 | SINGLE SIGN ON FOR NATIVE AND WRAPPED WEB RESOURCES ON MOBILE DEVICES - A method includes performing operations as follows on a processor: associating a single sign on module with a native application residing on a mobile device, detecting, using the single sign on module, user invocation of the native application, the native application to request access to a resource from a service provider server, determining, using the single sign on module, whether the mobile device has a token stored thereon that indicates the user has been previously authenticated with an identity provider server, sending, using the single sign on module, the token to the identity provider server when the token is determined to be stored on the mobile device, receiving, at the single sign on module, an identity assertion for the user from the identity provider server responsive to sending the token to the identity provider server, and providing, using the single sign on module, the identity assertion to the native application. The service provider server is independent of the identity provider server. | 04-28-2016 |
20160117267 | CONCURRENT VIRTUAL TAPE USAGE - A request to access a virtual tape volume is identified and a lock status is maintained for the virtual tape volume. The lock status includes a shared status and an exclusive lock status. In shared status, it is determined whether the request includes a request for write access to the virtual tape volume. Concurrent access to the virtual tape volume can be allowed by two or more applications during the shared status based at least in part on whether the applications request for write access to the virtual tape volume. | 04-28-2016 |
20160112822 | MOBILE APPLICATIONS INCORPORATING MOBILE-BASED TRANSACTIONS DETECTION AND MONITORING MEANS - Client to server service request and response interactions are monitored. The service requests have embedded therein mobility-dedicated and business organization oriented reporting headers. At the server side of the interactions, a snooping agent picks up information from the headers, combines it with service performance metrics (e.g., time to service the request) and stores the data in a relational database. Queries are afterwards submitted to the database to spot trends including those showing emerging problems and areas for improvement in providing customers who use mobile devices with seamless and high quality service. | 04-21-2016 |
20160112397 | ANOMALY DETECTION FOR ACCESS CONTROL EVENTS - Methods for managing access to protected resources within a computing environment and detecting anomalies related to access control events are described. An access control system may acquire a request for access to a protected resource, identify a username associated with the request, acquire contextual information associated with the request for access (e.g., a time of day associated with a location of a device making the request), acquire a baseline set of rules for the username, detect a deviation from the baseline set of rules based on the contextual information, acquire additional authentication information in response to detecting the deviation, authorize access to the protected resource based on the additional authentication information, generate a record of the request for access including the contextual information, and update the baseline set of rules if an intrusion to the access control system has not been detected within a threshold period of time. | 04-21-2016 |
20160112245 | ANOMALY DETECTION AND ALARMING BASED ON CAPACITY AND PLACEMENT PLANNING - Operational parameters of a running multiserver data processing system are automatically and repeatedly sampled and compared with constraints defined in a capacity and placement planning specification of the multiserver data processing system. Constraint violations are automatically declared as operational anomalies and, if serious enough, corresponding alarm signals are automatically produced. | 04-21-2016 |
20160110386 | AUTOMATIC IDENTITY RECONCILIATION USING IMAGE PROCESSING - A method of automatic identity reconciliation includes identifying a plurality of identifiers that are spaced apart from each other within a digital image of a physical component in a distributed computer system. The method includes retrieving an attribute of the physical component based on one of the plurality of identifiers. Moreover, the method includes storing the plurality of identifiers with an association to the attribute of the physical component. Related apparatuses and computer program products are disclosed. | 04-21-2016 |
20160105799 | EVALUATING PRODUCTIVITY COSTS OF ENTERPRISE MOBILITY MANAGEMENT (EMM) TOOLS BASED ON MOBILE DEVICE METRICS - A method includes performing operations as follows on a processor: receiving metrics from a mobile device associated with the operation of an Enterprise Mobility Management (EMM) tool on the mobile device and generating a score based on the metrics that were received that is indicative of a user productivity cost associated with the EMM tool when using the mobile device. | 04-14-2016 |
20160103881 | PARTITIONING LOG RECORDS BASED ON TERM FREQUENCY AND TYPE FOR SELECTIVE SKIPPING DURING FULL-TEXT SEARCHING - A log record from a host machine node includes terms. Frequency of occurrence of the terms across a stream of log records is determined. Based on the frequency satisfying a threshold, a Bloom filter vector is selected from among a plurality of Bloom filter vectors based on the frequency, the Bloom filter vector is updated based on the terms, and an identifier for the log record is stored with an association to the Bloom filter vector. In contrast, based on the frequency of occurrence not satisfying the defined frequency range, a type identifier is identified based on the terms, a Bloom filter vector is selected from among the plurality of Bloom filter vectors based on the type identifier, the Bloom filter vector is updated based on the terms, and an identifier for the log record is stored with an association to the Bloom filter vector. | 04-14-2016 |
20160098698 | METHODS FOR ENABLING MOBILE PAYMENTS - Methods for enabling secure online transactions using a mobile device are described. A mobile device may capture an image associated with a banking card in order to generate checkout information and to automatically populate checkout fields with the checkout information prior to completing an online transaction. In some cases, the mobile device may be used to select items to be purchased from an online merchant, access a checkout page of the online merchant for purchasing the selected items, acquire an image that encodes checkout information, acquire a personal code associated with an end user of the mobile device, generate the checkout information using the acquired image and the personal code, automatically populate one or more fields associated with the checkout page with the checkout information, delete the checkout information from the mobile device, and submit the checkout information to complete the purchase of the selected items. | 04-07-2016 |
20160085877 | CORRECTING RESOURCE DESCRIPTIVE FRAMEWORK STATEMENTS BASED ON SIMILARITY OF TERMS TO WEB ONTOLOGY - A list of unique terms, each having prefix and associated property data, contained in a defined web ontology is generated. A RDF statement about a web resource is received, and a list of unique terms contained in the RDF statement is generated. A problem term is identified within the list of unique terms contained in the RDF statement that is not present among the list of unique terms contained in the web ontology. A list of candidate terms that are contained in the web ontology that satisfy a threshold similarity to the problem term is generated. A candidate term is selected from among the list of candidate terms having a data type for the property data matching a data type for the property data of the problem term. The candidate term is substituted for each occurrence of the problem term contained in the RDF statement. | 03-24-2016 |
20160085790 | STRATIFIED SAMPLING OF LOG RECORDS FOR APPROXIMATE FULL-TEXT SEARCH - A log record from a host machine node includes an invariant string and a term. A template identifier is selected, from among template identifiers within a template repository, for a template string matching the invariant string. A sampling count threshold is selected from among a set of sampling count thresholds based on the template identifier and the term. A template-term count is obtained based on a number of earlier log records that were received since the count was reset and have a template identifier and a term that match the template identifier and the term of the log record. Based on the template-term count satisfying the sampling count threshold, an index entry is generated in a sampled log records index based on the log record and the template-term count is reset to a defined value. Based on the template-term count not satisfying the sampling count threshold, the template-term count is incremented. | 03-24-2016 |
20160080486 | CROWDSOURCING-BASED DETECTION, IDENTIFICATION, AND TRACKING OF ELECTRONIC DEVICES - In a method of detecting electronic devices, information about a first user equipment device is received at a server. The information is received from at least one second user equipment device within range of a wireless communication interface of the first user equipment device. A presence of the first user equipment device is detected at the server based on the information received from the at least one second user equipment device. The receiving and the detecting may be operations performed by at least one processor of the server. Related apparatus and computer program products are also discussed. | 03-17-2016 |
20160080482 | PRODUCTIVE SPEND METRIC BASED RESOURCE MANAGEMENT FOR A PORTFOLIO OF DISTRIBUTED COMPUTING SYSTEMS - A method of operating a resource management node includes, for each of a plurality of resources available in a plurality of distributed computing systems, determining a productive spend metric based on utilization of the resource and cost associated with making the resource available in the distributed computing system. Relocation of workload of selected ones of the resources between the plurality of distributed computing systems is controlled based on the productive spend metrics determined for the selected ones of the resources. Related computer program products and resource management nodes are disclosed. | 03-17-2016 |
20160080355 | AUTHENTICATION OF API-BASED ENDPOINTS - A method includes detecting an incoming request from a first application to a second application. The method further includes performing an authentication that involves sending a challenge message to a first application. The challenge message may request an account of information associated with processed transactions between the first application and the second application during a particular period preceding the incoming request, a solution to a high-cost calculation associated with a high level of resource use, or a concatenated sequence of characters located at specific positions of a shared value. The authentication further involves receiving a challenge response to the challenge message from the first application, determining a verified response based on the challenge message, and determining whether the challenge response matches the verified response. The method includes authorizing the second application to process the incoming request in response to determining that the challenge response matches the verified response. | 03-17-2016 |
20160070739 | BATCH PROCESSED DATA STRUCTURES IN A LOG REPOSITORY REFERENCING A TEMPLATE REPOSITORY AND AN ATTRIBUTE REPOSITORY - A method by a computer includes, for each of a plurality of log records received as part of a log stream from a host machine node, identifying a template identifier within a template repository for a template string matching an invariant string of the log record, and identifying an attribute identifier in an attribute repository for an attribute string matching a variant string of the log record. The log records are partitioned into batches. Each of the batches are defined by a data structure that includes the template identifier and the attribute identifier for each of the log records within the batch. The data structures for each of the batches are stored into a log repository. | 03-10-2016 |
20160063356 | STATE BASED ADAPTIVE COMPRESSION OF PERFORMANCE TRACES - A method by a computer includes generating polylines based on a sequence of values contained in performance trace data from a software source on a host machine node. Segments of the polylines are generated. Separate ones of the segments are categorized based on patterns of the polylines of the separate ones of the segments. For the separate ones of the segments, compressed data is generated that approximates values contained in the performance trace data corresponding to the polylines of the segment while regulating a level of fidelity of the approximations based on the categorization of the segment. The compressed data is stored in a log repository. | 03-03-2016 |
20160062868 | AUTOMATED INSTRUMENTATION OF APPLICATIONS - Methods for automatically identifying and instrumenting application classes and methods for a particular application are described. In some embodiments, application code (e.g., bytecode or source code) associated with the particular application may be parsed to identify classes and methods within the application code and to identify terminal components (e.g., methods or function calls) and non-terminal components (e.g., control flow statements). Once the terminal components and non-terminal components have been identified, a complexity model and a corresponding score for each of the classes and methods within the application code may be determined. The complexity model may be used to estimate the number of computations that may be required if a particular class or method is used by the particular application. Application classes and methods corresponding with a score that is greater than a threshold may be instrumented by inserting probes into the identified classes and methods. | 03-03-2016 |
20160036921 | ACCESSING ENTERPRISE COMMUNICATION SYSTEMS FROM EXTERNAL NETWORKS - A computer system implements a plurality of modules, including a tenant administration proxy that receives session credentials from a tenant application in the private communication system and authenticates the tenant application in response to the session credentials, a connector service that receives a bridge setup request from the tenant application and establishes a bridge connection with the tenant application in response to the bridge setup request; and a configuration manager that stores service information regarding a cloud-based service that is accessible through the computer system. The tenant administration proxy retrieves the service information from the configuration manager and provides the service information to the tenant application in response to a request from the tenant application, and wherein the connector service facilitates communication between the cloud-based service and an enterprise service in the private communication system over the bridge connection. | 02-04-2016 |
20160036920 | ACCESSING NETWORK SERVICES FROM EXTERNAL NETWORKS - A method for accessing network services from external networks includes receiving at a cloud-based server a bridge setup request from a private communication system, establishing a bridge connection between the cloud-based server and the private communication system, establishing a communication path between the cloud-based server and a cloud-based application, receiving a request from a cloud-based entity that is directed to an enterprise service hosted within the private communication system, transmitting the request to the enterprise service over the bridge connection, receiving a response from the enterprise service over the bridge connection, and transmitting the response to the cloud-based entity. Related computer program products and systems are also disclosed. | 02-04-2016 |
20160034905 | BROADCASTING INCIDENT RESOLUTION INFORMATION TO SERVICE DESK STAFF MEMBERS - A service desk is managed by broadcasting a symptom and a root cause of a customer incident to service desk staff members. In response to receiving input of a service desk staff member, the symptom and the root cause of the customer incident may be stored in a personal knowledge base of the service desk staff member. A personal memory trigger may also be received from the service desk staff member, and the personal memory trigger may also be stored in the personal knowledge base. The personal memory trigger may include free-form text that has meaning to the service desk staff member relative to a given incident. The symptom and root cause of a customer incident may be retrieved from the personal knowledge base of the service desk staff member in response to receiving at least some of the free-form text from the service desk staff member. | 02-04-2016 |
20160034510 | INDEXING AND SEARCHING LOG RECORDS USING TEMPLATES INDEX AND ATTRIBUTES INDEX - A computer partitions a log stream into records having defined intervals. For each of the records, the computer selects a template from among a set of templates in a templates index repository based on an identifier for the record being associated in the templates index repository with the template, identifies an attribute contained in the record based on the template, and stores the attribute associated with an identifier for the record and an identifier for the template in an attributes index repository. The attributes index repository and the templates index repository are used to retrieve records responsive to search queries. | 02-04-2016 |
20160027017 | METHOD AND SYSTEM FOR USING DYNAMIC CVV IN QR CODE PAYMENTS - A method for using dynamic CVV in QR code payments is described. The method comprises generating a random number, via a payment module, on a mobile device for a mobile transaction, authenticating user account information, and decrypting encrypted user data when the user account information is authenticated. The method also comprises retrieving a user account unique key, determining a counter number via an application transaction counter, and generating a dynamic verification code, via the payment module, based on the generated random number, the user data, the counter number, and the user account unique key. The method further comprises generating track data, the track data comprising the user data, the random number, and the dynamic verification code, generating a two-dimensional matrix barcode from the track data, and displaying, via the payment module, the generated matrix barcode to a sales terminal for the mobile transaction. | 01-28-2016 |
20160004769 | ESTIMATING FULL TEXT SEARCH RESULTS OF LOG RECORDS - A method by a computer includes receiving a search query from a user equipment, where the search query defines a logical combination of terms to be searched within a defined interval of records of a log stream. An estimate is generated for the number of occurrences of the logical combination of terms in the defined interval of records. A message containing the estimate for the number of occurrences of the logical combination of terms in the defined interval of records is communicated toward the user equipment. | 01-07-2016 |
20150373015 | AUTHENTICATION AND AUTHORIZATION USING DEVICE-BASED VALIDATION - A method includes authenticating a user of a client device and sending a response to the client device. The response includes browser code configured to retrieve respective first values for a plurality of device properties from the client device. The method also includes storing session information for the user in a memory. The session information includes the first values and criteria for triggering validation of the client device. The method further includes receiving a request, sent from a requesting device, to access a protected resource and determining whether the request is authenticated by determining that the request is associated with the session information and determining that the criteria has been met. Determining whether the request is authenticated also includes retrieving respective second values for the plurality of device properties from the requesting device, and determining whether the second values match the first values to authenticate the request. | 12-24-2015 |
20150371230 | METHODS OF PROCESSING TRANSACTIONS AND RELATED SYSTEMS AND COMPUTER PROGRAM PRODUCTS - A method of operating an authentication node is disclosed. Transaction information for a transaction is received from a merchant node. The transaction information includes an identification for a credit/debit account, a name on the credit/debit account, and a transaction amount for the transaction. Responsive to receiving the transaction information, a complete account number for the credit/debit account is determined using the identification for the credit/debit account and the name on the credit/debit account. The identification for the credit/debit account is different than the complete account number for the credit/debit account. In addition, account information may be transmitted to an acquirer node, and the account information may include the complete account number for the credit/debit account, the name on the credit/debit account, and the transaction amount. Related methods of operating merchant nodes, related computer program products, and related computer systems are also disclosed. | 12-24-2015 |
20150363215 | SYSTEMS AND METHODS FOR AUTOMATICALLY GENERATING MESSAGE PROTOTYPES FOR ACCURATE AND EFFICIENT OPAQUE SERVICE EMULATION - In a method of service emulation, a plurality of messages communicated between a system under test and a target system for emulation are recorded in a computer-readable memory. Ones of the messages are clustered to define a plurality of message clusters, and respective cluster prototypes are generated for the message clusters. The respective cluster prototypes include a commonality among the ones of the messages of the corresponding message clusters. One of the message clusters is identified as corresponding to a request from the system under test based on a comparison of the request with the respective cluster prototypes, and a response to the request for transmission to the system under test is generated based on the one of the message clusters that was identified. Related computer systems and computer program products are also discussed. | 12-17-2015 |
20150350249 | DETERMINING TRUSTWORTHINESS OF API REQUESTS BASED ON SOURCE COMPUTER APPLICATIONS' RESPONSES TO ATTACK MESSAGES - A method includes receiving an application programming interface (API) request from a source computer application that is directed to a destination computer application. An attack response message that is configured to trigger operation of a defined action by the source computer application is sent to the source computer application. Deliverability of the API request to the destination computer application is controlled based on whether the attack response message triggered operation of the defined action. Related operations by API request risk assessment systems are disclosed. | 12-03-2015 |
20150350234 | MANIPULATING API REQUESTS TO INDICATE SOURCE COMPUTER APPLICATION TRUSTWORTHINESS - Methods of operating an application programming interface (API) request risk assessment system include receiving an API request from a source computer application that is directed to a destination computer application. A risk assessment score is generated based on a characteristic of the API request. The risk assessment score indicates a level of trustworthiness of the source computer application. Deliverability of the API request to the destination computer application is controlled based on the risk assessment score. Related methods of operating a source computer and related operations by API request risk assessment systems and source computers are disclosed. | 12-03-2015 |
20150350174 | CONTROLLING APPLICATION PROGRAMMING INTERFACE TRANSACTIONS BASED ON CONTENT OF EARLIER TRANSACTIONS - Some aspects of the present disclosure operate an application programming interface (API) risk assessment equipment. An API transaction request is received from an application processed by a source node. A risk assessment score is generated based on comparison of content of the API transaction request to content of earlier API transaction requests. The risk assessment score indicates trustworthiness of the API transaction request. Deliverability of the API transaction request to a destination node for processing is controlled based on the risk assessment score. | 12-03-2015 |
20150350047 | OPTIMIZATION OF COMPUTING RESOURCES THROUGH MONITORING AND MANIPULATING AVAILABILTY - In a method of managing a computing network, an expected behavior of a host is determined. The host is associated with a network resource, and is configured to be switched between active and inactive states. When the host is in the inactive state, a message is transmitted via the network on behalf of the host based on the expected behavior thereof such that the host appears to be in the active state. Related computer systems and computer program products are also discussed. | 12-03-2015 |
20150332488 | MONITORING SYSTEM PERFORMANCE WITH PATTERN EVENT DETECTION - A method includes receiving a plurality of metric-pattern combinations, each including a respective performance metric and a respective graph pattern. The method also includes receiving a corresponding parameter value for a parameter of each respective graph pattern. The method further includes determining an event equation comprising the plurality of metric-pattern combinations and a boolean operator. The method still further includes evaluating the event equation by determining a respective graph pattern fit curve by applying the corresponding parameter value to the respective graph pattern, and determining an operand value based on whether associated performance data for the respective performance metric exhibits the associated graph pattern by matching the respective graph pattern fit curve to the associated performance data. Evaluating the operand values using the boolean operator to determine a result. The method additionally includes displaying a notification, at a user interface, based on the result. | 11-19-2015 |
20150332028 | SYSTEM THAT ENFORCES ACCOUNTABILITY BY REQUIRING JUSTIFICATIONS FOR SENSITIVE INFORMATION TECHNOLOGY OPERATIONS - A method for requiring justifications for predetermined user operations may include maintaining a plurality of policies in a policy store, and detecting a user operation, via a policy module, that triggers a policy of the plurality of policies. The method may also include pausing user operation, notifying the user of the impact of the user operation that triggered the policy, and requesting justification from the user for the user operation. The method may further include storing user-provided justification in a predetermined location, and then resuming the user operation. | 11-19-2015 |
20150317156 | Systems and Methods for Automated Generation of Interactive Documentation Based on Web Application Description Language Files - In a method of generating documentation for a computing interface, an interface description file that includes a machine-readable description of a computing interface is parsed. Elements of the interface description file are identified according to a template file responsive to the parsing thereof, and an output file that includes human-readable documentation for the computing interface is automatically generated from the elements identified in the interface description file. Related devices and computer program products are also discussed. | 11-05-2015 |
20150317081 | ADAPTIVE SYSTEM PROVISIONING - A method includes determining a plurality of configuration entries based on received provisioning requests and further based on provisioning system resource utilization data. Each configuration entry includes a corresponding virtual system template, and a corresponding number of virtual systems to be provisioned. The method also includes provisioning the corresponding number of virtual systems for a first configuration entry in the plurality of configuration entries. The corresponding number of virtual systems are provisioned based on the corresponding virtual system template for the first configuration entry. The method additionally includes storing the provisioned virtual systems in a resource pool and processing a provisioning request utilizing a pre-provisioned virtual system stored in the resource pool. | 11-05-2015 |
20150310391 | MANAGING VOTING EMAILS - A method includes receiving a request to send a voting message to a plurality of voters. The voting message includes a plurality of ballot options. The method also includes generating a first folder corresponding to a first ballot option and determining a rule for organizing a plurality of voting message responses based on a corresponding selected ballot option in each voting message response. The selected ballot option corresponds to one of the plurality of ballot options. The method further includes receiving a first voting message response. The selected ballot option in the first voting message response corresponds to the first ballot option. The method additionally includes determining whether the first voting message response should be filtered into the first folder based on the rule, and, in response to determining that the voting message should be filtered into the first folder, filtering the first voting message response into the first folder. | 10-29-2015 |
20150309866 | REJUVENATION OF LEGACY CODE INTO RESOURCES-ORIENTED ARCHITECTURES - A method for building a web-based application may include defining a scope of the web-based application, via a programming module, based on a plurality of parameters of a non-web-based application, and defining an error-handling mechanism based on an error-handling mechanism of the non-web-based application. The method may further include defining a plurality of resources for the web-based application, defining the mechanism of function for each resource of the plurality of resources, and generating the web-based application | 10-29-2015 |
20150309789 | MODIFYING MOBILE APPLICATION BINARIES TO CALL EXTERNAL LIBRARIES - A method includes determining a system library method based on a configuration file in an application library. The method also includes generating a wrapper method for the system library method, wherein the wrapper method includes a first instruction to invoke the system library method, and a second instruction to invoke a method in an external library. The method further includes replacing a third instruction that invokes the system library method with a fourth instruction that invokes the wrapper method. A binary class in a plurality of binary classes in the application library comprises the third instruction. | 10-29-2015 |
20150294315 | PAYMENT PROCESSING USING MULTIPLE TRANSACTION CHANNELS - A method includes receiving, from a payment intermediary, a request for approval of a card-not-present payment transaction between a customer and a merchant. The request for approval includes transaction details indicative of a credit account of the customer. The credit account established at an issuing institution. The method also includes transmitting the request for approval to the issuing institution. The method further includes receiving an authorization response from the issuing institution, the authorization response indicative of whether the card-not-present payment transaction is approved. The method additionally includes transmitting the authorization response to a terminal of the merchant, the request for approval not originating from the terminal. | 10-15-2015 |
20150293913 | CONTENT AUGMENTATION BASED ON A CONTENT COLLECTION'S MEMBERSHIP - A method may include selecting a document from a user's corpus, analyzing content of the selected document, and determining a target content group based on the content of the selected document. The method may further include locating a relevant document based on the determined target content group, and presenting the relevant document to the user. In particular, the target content group may be selected form a plurality of predetermined content groups, wherein the predetermined content groups are automatically generated based on clustering of documents of a content group into subgroups that are similar to each other. | 10-15-2015 |
20150288746 | ASSESSMENT OF CLOUD HOSTING SUITABILITY FOR MULTIPLE APPLICATIONS - In accordance with the teachings of the present disclosure, a method of assessment of cloud hosting suitability for multiple applications is disclosed. The method may include creating a second synthetic application definition based on a first synthetic application definition, wherein creating the second application definition comprises defining, in the second synthetic application definition, a second plurality of resource consumptions, wherein the second plurality of resource consumptions are equivalent to consumptions by the candidate application at a second level of user demand. The method may also include consuming, based on the second synthetic application definition, a plurality of quantities of resources of the computing system and evaluating the computing system. The present disclosure additionally includes associated systems and apparatuses. | 10-08-2015 |
20150288614 | DEFINITION OF A MULTI-NODE SYNTHETIC APPLICATION FOR ASSESSMENT OF CLOUD-HOSTING SUITABILITY - In accordance with the teachings of the present disclosure, a method of loading a definition of a synthetic application is disclosed. The method includes identifying a synthetic application definition for use by synthetic applications in nodes in a computing system. The method further includes identifying sets of node properties for the synthetic applications. The sets of node properties specify consumption of quantities of resources in the nodes. The sets of node properties are to cause the synthetic applications to consume resources in the computing system equivalent to consumption by a candidate application. | 10-08-2015 |
20150288579 | ASSESSMENT OF HOSTING SUITABILITY OF MULTIPLE APPLICATIONS IN A CLOUD - In accordance with the teachings of the present disclosure, a method of assessment of hosting suitability of multiple applications in a cloud is disclosed. The method may include defining, in a first synthetic application definition, a first plurality of resource consumptions, wherein the first plurality of resource consumptions are equivalent to consumptions by a first candidate application, and defining, in a second synthetic application definition, a second plurality of resource consumptions, wherein the second plurality of resource consumptions are equivalent to consumptions by a second candidate application. The method may also include consuming quantities of resources of pluralities of nodes of the computing system, recording performances of the synthetic, and evaluating the computing system based upon the recorded performances. The present disclosure additionally includes associated systems and apparatuses. | 10-08-2015 |
20150288577 | ASSESSMENT OF SERVICE LEVEL AGREEMENT COMPLIANCE - In accordance with the teachings of the present disclosure, a method of assessment of service level agreement compliance is disclosed. The method may include defining, in a synthetic application definition, a plurality of resource consumptions, wherein the plurality of resource consumptions are equivalent to consumptions by a candidate application, and distributing the synthetic application definition to a synthetic application in a node of a computing system. The method may further include consuming, with the synthetic application and based on the synthetic application definition, a plurality of quantities of resources of a plurality of nodes of the computing system. The method may additionally include recording a performance of the synthetic application, and comparing the recorded performance to a requirement of a service level agreement (SLA). The present disclosure additionally includes associated systems and apparatuses. | 10-08-2015 |
20150288575 | APPLICATION-SPECIFIC ASSESSMENT OF HOSTING SUITABILITY OF MULTIPLE CLOUDS - In accordance with the teachings of the present disclosure, a method of performing application-specific assessment of hosting suitability of multiple clouds is disclosed. The method may include defining, in a synthetic application definition, a plurality of resource consumptions, wherein the plurality of resource consumptions are equivalent to consumptions by a candidate application. The method may further include consuming a first plurality of quantities of resources of a plurality of nodes of a first computing system and consuming a second plurality of quantities of resources of a plurality of nodes of a second computing system. The method may also include recording a performance of the first and second synthetic application, and comparing the first computing system and the second computing system based upon the first performance and the second performance. The present disclosure additionally includes associated systems and apparatuses. | 10-08-2015 |
20150288558 | ROLE BASED TRANSLATION OF DATA - Methods for automatically generating a report in response to detecting performance and/or availability issues that occur throughout multiple layers of a networked computing environment based on a role of a target recipient of the report are described. In some embodiments, a failure graph may be generated by a root cause identification tool that aggregates data from a plurality of performance management tools monitoring the networked computing environment. The root cause identification tool may acquire a plurality of report templates, determine a first report template of the plurality of report templates based on the role associated with the target recipient, identify a set of variables or an ontology associated with the first report template, assign values to the set of variables using the failure graph, generate a first report based on the first report template, and output the first report to the target recipient. | 10-08-2015 |
20150288557 | HELP DESK TICKET TRACKING INTEGRATION WITH ROOT CAUSE ANALYSIS - Methods for automatically generating help desk tickets in response to detecting performance and/or availability issues that occur throughout multiple layers of a networked computing environment are described. In some embodiments, in response to detecting an alert corresponding with a performance issue affecting the networked computing environment, a root cause identification tool may aggregate a plurality of alarms from a plurality of performance management tools monitoring the networked computing environment, generate a failure graph associated with the performance issue, identify a first leaf node of the failure graph, determine a first remedy associated with the first leaf node, and automatically generate a help desk ticket corresponding with the first leaf node and the first remedy. The automatically generated help desk ticket may specify the failure associated with the first leaf node, the first remedy, a location associated with the first remedy, and an estimated time to fix the failure. | 10-08-2015 |
20150286932 | LEVERAGING UNIQUE OBJECT REFERENCES TO ENHANCE PERFORMANCE OF RETE-BASED RULE ENGINES - The embodiment of this disclosure may include a rule engine that adds a plurality of objects into a working memory, and processes the plurality of objects through a plurality of rules stored in a rule repository. Then, the rule engine may create a rule network comprising a root node and a child node based on the plurality of rules, and associate the root node with a predetermined list of object references. The rule engine may build a multi-object sub-token based on the plurality of objects that satisfy the predetermined list of object references. Then, the rule engine may pass the multi-object sub-token from the root node to the child node. | 10-08-2015 |
20150281918 | MOBILE COMMUNITY DRIVEN HELP FOR SOFTWARE APPLICATIONS - Providing help information includes receiving a message, wherein contents of the message comprise a request for help information related to a user application executing on a separate computer; and forwarding a query to a help repository, the query based on the contents of the message. In response, receipt from the repository of an identification of a resource within the repository occurs that is relevant to the query. Ultimately a notification message is sent to a mobile device associated with a user that is utilizing the user application, wherein contents of the notification message comprise data related to the identification of the resource. | 10-01-2015 |
20150281011 | GRAPH DATABASE WITH LINKS TO UNDERLYING DATA - Methods for visualizing and accessing data associated with causal relationships between failures occurring within a networked computing environment are described. In some embodiments, a failure graph may be generated by a root cause identification tool that aggregates data from a plurality of performance management tools monitoring the networked computing environment. The aggregated data may include a plurality of alarms spanning multiple layers of the networked computing environment, as well as log file data. The root cause identification tool may generate a graphical representation of the failure graph including pointers to portions of the aggregated data supporting directed edges of the failure graph. The root cause identification tool may also provide a user interface for accessing the portions of the aggregated data pointed to by the various links within the failure graph. | 10-01-2015 |
20150280969 | MULTI-HOP ROOT CAUSE ANALYSIS - Methods for monitoring a networked computing environment and for identifying root causes of performance and availability issues that occur throughout multiple layers of the networked computing environment are described. In some embodiments, a software service provided by a networked computing environment may experience a service-related performance or availability issue. In response to detecting the service-related issue affecting the service, a root cause identification tool may aggregate data from a plurality of information technology management software tools monitoring the networked computing environment, identify causal relationships between a plurality of failures associated with the service-related issue based on the aggregated data, determine a chain of failures of the plurality of failures based on the causal relationships, identify a root cause of the service-related issue based on the chain of failures, and transmit an alarm corresponding with the root cause. | 10-01-2015 |
20150280968 | IDENTIFYING ALARMS FOR A ROOT CAUSE OF A PROBLEM IN A DATA PROCESSING SYSTEM - Methods for monitoring a networked computing environment and for consolidating multiple alarms under a single root cause are described. In some embodiments, in response to detecting an alert corresponding with a performance issue in a networked computing environment, a root cause identification tool may aggregate a plurality of alarms from a plurality of performance management tools monitoring the networked computing environment. The root cause identification tool may then generate a failure graph associated with the performance issue based on the plurality of alarms, determine a first set of leaf nodes of the failure graph, determine a first chain of failures based on the first set of leaf nodes, suppress (or hide) alarms that are not associated with the first chain of failures, and output a consolidated alarm associated with the first chain of failures. | 10-01-2015 |
20150278032 | PROVIDING SERVICES ON SYSTEM BEING RECOVERED - A method includes running a backup image of a device on the device while the device is being restored such that the device being restored is capable of servicing users while it is being restored. The method further includes determining if the data requested by an operating system image being executed is available from local storage of the device being restored, and causing the requested data to be stored in the local storage of the device being restored from a backup storage if the storage of the device being restored does not yet have the requested data. | 10-01-2015 |
20150277675 | ANALYTICS THAT RECOMMEND WINDOWS ACTIONS IN A MULTI-WINDOWED OPERATOR ENVIRONMENT - Adjusting a multi-windowed display includes determining a plurality of applications with which an operator is currently interacting, identifying a respective window in the multi-windowed display corresponding to each of the plurality of applications; and monitoring a respective information source associated with each of the plurality of applications. Adjusting the display also includes detecting a signature from one of the respective information source, the signature related to the associated application; and, based on the detected signature, adjusting how the window corresponding to the associated application is displayed within the multi-windowed display. | 10-01-2015 |
20150271163 | SECURE DATA TRANSMISSION USING MULTI-CHANNEL COMMUNICATION - A method includes receiving a request to initiate secure communications from a first client and authenticating the first client. The authenticating includes communicating with a second client using a second communication channel, and receiving a response from the first client, the response being transmitted over a first communication channel. The method also includes receiving a first set of message data from the first client, the first set of message data being transmitted over the first communication channel, and receiving a second set of message data from the second client, the second set of message data being transmitted over the second communication channel. The method additionally includes constructing the message using the first set of message data and the second set of message data. | 09-24-2015 |
20150271036 | GENERATING A REPRESENTATION OF THE STATUS OF A DATA PROCESSING SYSTEM BASED ON EMPIRICAL OPERATIONS METRICS AND DERIVED SENTIMENT METRICS - A method includes performing operations as follows on a processor: communicating with a data processing system to collect empirical data associated with operations of the data processing system, communicating with a customer feedback system to collect user sentiment data associated with the data processing system, generating an operational status of the data processing system based on the empirical data, generating a sentimental status of the data processing system based on the user sentiment data, and generating a composite status of the data processing system based on the operational status and the sentimental status. | 09-24-2015 |
20150269580 | CONTROLLING ECOMMERCE AUTHENTICATION BASED ON COMPARING MERCHANT INFORMATION OF ECOMMERCE AUTHENTICATION REQUESTS - A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including merchant information. A risk score for the eCommerce authentication request is generated based on comparison of the merchant information of the eCommerce authentication request to merchant information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. | 09-24-2015 |
20150269579 | CONTROLLING ECOMMERCE AUTHENTICATION BASED ON COMPARING CARDHOLDER INFORMATION AMONG ECOMMERCE AUTHENTICATION REQUESTS FROM MERCHANT NODES - A method of operating a computer system is disclosed. An eCommerce authentication request is received from a merchant node. The eCommerce authentication request has content including cardholder information. A risk score for the eCommerce authentication request is generated based on comparison of the cardholder information of the eCommerce authentication request to cardholder information of eCommerce authentication requests of a plurality of merchant nodes. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. | 09-24-2015 |
20150269578 | CONTROLLING ECOMMERCE AUTHENTICATION WITH NON-LINEAR ANALYTICAL MODELS - A method of operating a computer system is disclosed. An eCommerce authentication request is received. Content of the eCommerce authentication request is processed through a non-linear analytical model to generate a risk score. The eCommerce authentication request is selectively provided to an authentication node based on the risk score. Related authentication gateway nodes and computer program products are disclosed. | 09-24-2015 |
20150269248 | IMPORTING METADATA INTO METADATA BUILDER - First metadata for a first version of a computer program product and a first metadata schema is converted into second metadata for a second version of the computer program product and/or a second metadata schema. The converting may be performed by recursively processing an object class structure representing the second metadata, to construct objects and their contents pursuant to a set of ID references for the second metadata. The recursive processing may be performed by repeatedly calling methods of an object in the object class structure to populate the content of the object using the set of ID references. The repeatedly calling may be performed using object reflection. Related methods, systems and computer programs are described. | 09-24-2015 |
20150269218 | LOGICAL VALIDATION FOR METADATA BUILDER - Metadata objects in metadata for a computer program are logically validated to confirm that content of the metadata has referential integrity. The metadata objects may also be logically validated according to specific validation rules that apply to the type of the metadata object. Recursive or non-recursive techniques may be used, depending upon the size of the metadata. Related systems, methods and computer programs are described. | 09-24-2015 |
20150269194 | INTERACTIVE USER INTERFACE FOR METADATA BUILDER - An interactive user interface for a metadata builder is provided by displaying a list of errors in metadata for a computer program and changing the list of errors that is displayed, responsive to receiving a change of the metadata for the computer system and processing the change of the metadata for the computer system. Specifically, an error is added to the list of errors that is displayed and/or is deleted from the list of errors that is displayed. The change of the metadata for the computer system may be an edit of the metadata object, a deletion of the metadata object, a cloning of a metadata object and/or an addition of a new metadata object. Related methods, systems and computer program products are described. | 09-24-2015 |
20150269193 | SCHEMA VALIDATION FOR METADATA BUILDER - Metadata is validated against a metadata schema by semantically validating metadata objects in metadata for a computer program, to confirm that required relationships among the metadata objects are present and conform to predefined rules. The metadata objects in the metadata for the computer program are also syntactically validated against a metadata schema for the metadata. Related methods, systems and computer programs are described. | 09-24-2015 |
20150269060 | DEVELOPMENT TOOLS FOR LOGGING AND ANALYZING SOFTWARE BUGS - Methods of debugging code in a development environment are provided including compiling code in the development environment; receiving an error message for an error encountered in the compiled code; and automatically receiving a plurality of suggested resolutions for the error in the compiled code. The plurality of suggested resolutions are based on past resolutions of errors associated with a plurality of developers stored in a common database. The plurality of suggested resolutions are provided in order of relevancy based on a plurality of relevancy metrics. Related systems and computer program products are provided. | 09-24-2015 |
20150269031 | INSTANT VIRTUAL MACHINES - A resource management node is provided including a processor and a memory. The memory is coupled to the processor and comprises computer readable program code that when executed by the processor causes the processor to perform operations including creating a recovery virtual machine (VM) for a primary machine for each of a primary machines. The recovery VM is stored in a cache file in a kernel of an operating system. The data in the cache file is stored in a format readable by a virtual hypervisor. The processor is further caused to perform operations including providing the recovery VM from the cache file in the kernel of the operating system upon request when the primary machine fails without conversion of the data in the cache file. | 09-24-2015 |
20150268975 | MESSAGE MATCHING FOR OPAQUE SERVICE VIRTUALIZATION - In a service emulation method, a transaction library storing a plurality of messages communicated between a system under test and a target system upon which the system under test depends is accessed responsive to receiving a request from the system under test. One of the messages stored in the transaction library is identified as corresponding to the received request based on a distance measure therebetween, and a response to the received request is generated using the one of the messages that was identified. Related systems and computer program products are also discussed. | 09-24-2015 |
20150268935 | GENERATING A PROPOSAL FOR SELECTION OF SERVICES FROM CLOUD SERVICE PROVIDERS BASED ON AN APPLICATION ARCHITECTURE DESCRIPTION AND PRIORITY PARAMETERS - A method includes performing operations as follows on a processor: receiving an architecture description for a software application that identifies a plurality of generic services, receiving a requirement description for the software application that comprises respective values for a plurality of priority parameters for the software application, and generating a proposal that, for each of the plurality of generic services, identifies a specific cloud service for the respective generic service based on the requirement description. | 09-24-2015 |
20150268881 | Enhanced Software Application Platform - A system includes information for generating a first appliance based on first appliance information, information for generating a second appliance based on second appliance information, and information for configuring communication between the first appliance and the second appliance. The system further includes at least one processor configured to generate a first volume by copying the first appliance information using a first set of parameters associated with an environment in which the first volume is situated, and generate a second volume by copying the second appliance information using a second set of parameters associated with an environment in which the second volume is situated. The system also includes at least one processor configured to initiate a first appliance instance by executing code from the first volume using information in the third volume, and initiate a second appliance instance by executing code in the second volume using information in a fourth volume. | 09-24-2015 |
20150264023 | IDENTITY VERIFICATION SERVICES USING PRIVATE DATA - A method includes receiving a request, from a client, to verify that an operator of the client is a purported individual. The request includes a personal identifier associated with the purported individual. The personal identifier corresponds to an account established by the purported individual. The account is provided by a cloud service provider. The method also includes transmitting the personal identifier to the cloud service provider. The method further includes, in response to transmitting the personal identifier, receiving private data indicative of the purported individual's usage of the account. The method still further includes creating an identity assessment based on the private data; The method even further includes receiving an evaluation of the identity assessment from the operator of the client. The method additionally includes determining, based on the evaluation of the identity assessment, whether the operator of the client is the purported individual. | 09-17-2015 |
20150264022 | SECURELY TRACKING ELECTRONIC MESSAGES - Techniques are disclosed herein for systematically tracking the entire forwarding flow of an electronic message, such as an email. A determination is made to track an electronic message prior to it being relayed to an intended recipient. When the electronic message is forwarded by the intended recipient, a feedback message is sent by the forwarder to the originator of the electronic message. This may be used to allow the original author to review and authorize recipients of the forwarded message. The original author need not know up front to whom the message might be forwarded. Note that this not only provides security, but also provides for fine grained system for tracking the flow of messages, such as sensitive emails. The system can automatically assess the risk of authorizing the recipient to whom the message was forwarded to have access to the content based on machine learning, rules, etc. | 09-17-2015 |
20150261790 | SERIALIZING RESOURCE UTILIZATION USING HARDWARE BUILT-IN FUNCTIONS - A method includes identifying a first value of a lock word corresponding to a data structure, by a process in a plurality of processes that each have access to the data structure. The method also includes copying the data structure to a corresponding shadow record. The method additionally includes modifying the shadow record with a desired update for the data structure, and atomically updating the data structure and the lock word, by the process, using a hardware built-in function. The updating includes identifying a second value of the lock word and determining whether the first value of the lock word and the second value of the lock word are equivalent. The method additionally includes, in response to determining that the first value of the lock word and the second value of the lock word are equivalent, replacing the data structure with the shadow record and incrementing the lock word. | 09-17-2015 |
20150261731 | PROVIDING PRODUCT WITH INTEGRATED WIKI MODULE - Systems and methods include instantiating an application on first and second display devices. The application includes objects and an integrated wiki module. The integrated wiki module includes object wiki pages associated with the objects. The first display device is controlled to display a control module when an object is displayed thereon and to display an object wiki page in response to receiving a selection of the control module. The object wiki page includes content associated with the object. Instructions are received to change the content included in the object wiki page. The second display device is controlled to display the control module when the object is displayed on the second display device and to display the object wiki page including the changed content in response to receiving a selection of the control module after receiving the instructions to change the content. | 09-17-2015 |
20150261578 | DEPLOYMENT OF VIRTUAL MACHINES TO PHYSICAL HOST MACHINES BASED ON INFRASTRUCTURE UTILIZATION DECISIONS - A resource management node includes a processor and a memory coupled to the processor. The memory includes computer readable program code that when executed by the processor causes the processor to perform operations. The operations can include, for each of a plurality of guest virtual machines (VMs), determining operational resources of physical host machines available in a distributed computing system that are needed to provide the guest VM. A placement scenario for placing the guest VMs on the physical host machines and placing the physical host machines in cabinets of a distributed computing system is generated. An amount of infrastructure of the distributed computing system used by the placement scenario is determined. A determination is made whether the placement scenario satisfies a defined rule for how much infrastructure of the distributed computing system can be used. Placement of the physical host machines in the cabinets and placement of the guest VMs on the physical host machines is initiated based on the placement scenario satisfying the defined rule. | 09-17-2015 |
20150261577 | CONTROLLING PLACEMENT OF VIRTUAL MACHINES ON PHYSICAL HOST MACHINES AND PLACEMENT OF PHYSICAL HOST MACHINES IN CABINETS - A resource management node includes a processor and a memory coupled to the processor. The memory includes computer readable program code that when executed by the processor causes the processor to perform operations. The operations can include, for each of a plurality of guest virtual machines (VMs), determining operational resources of physical host machines available in a distributed computing system that are needed to provide the guest VM. The operations can further include determining an amount of infrastructure of a distributed computing system used by a defined placement of physical host machines in racks of the distributed computing system. | 09-17-2015 |
20150261574 | DECOMMISIONING PHYSICAL HOST MACHINES AFTER RELOCATING UNPRODUCTIVE VIRTUAL MACHINES THEREFROM - A resource management node includes a processor and a memory coupled to the processor. The memory includes computer readable program code that when executed by the processor causes the processor to perform operations. The operations can include identifying an unproductive group of guest virtual machines (VMs) that satisfy a defined rule for being unproductive on an first group of physical host machines based on infrastructure of a distributed computing system used by the first group of the physical host machines to host the guest VMs. A relocation scenario is generated for relocating the unproductive group of the guest VMs from the first group of the physical host machines to a second group of the physical host machines. An effect of the relocation scenario on infrastructure usage of the distributed computing system is estimated. The unproductive group of the guest VMs is relocated from the first group of the physical host machines to the second group of the physical host machines based on the relocation scenario. | 09-17-2015 |
20150261555 | DETERMINING VIRTUAL MACHINE UTILIZATION OF DISTRIBUTED COMPUTING SYSTEM INFRASTRACTURE - Some embodiments disclosed herein are directed to a resource management node having a processor and memory coupled to the processor. The memory includes computer readable program code that when executed by the processor causes the processor to perform operations. The operations include, for each of a plurality of guest virtual machines (VMs) of a VM cluster provided by computer operations of a physical machine among a plurality of physical machines within a distributed computing system, determining a productivity metric for the guest VM based on resources of the physical machine that are used by the guest VM. The operations further include for each of the guest VMs, determining, based on the productivity metric for the guest VM, an infrastructure value that indicates how much infrastructure of the distributed computing system is attributed to providing the guest VM. | 09-17-2015 |
20150261516 | INSTALLING SOFTWARE USING MULTIPLE METADATA INTERFACES - A method of installing software on a computer system may include storing software for installation on the computer system wherein the software defines elements of metadata required for the installation. A first set of the elements of the metadata required for the installation may be accepted using a first metadata interface, and a second set of the elements of the metadata required for the installation may be accepted using a second metadata interface. More particularly, the first and second sets of the elements of the metadata may be different. The software may be installed using the first and second sets of the metadata. | 09-17-2015 |
20150261414 | COPY AND PASTE BETWEEN DEVICES - Generally discussed herein are systems and methods for transferring content from one device to another device. In one more embodiments an apparatus can include a first module to detect a request to perform a copy operation has been issued, receive content that was selected at a time the request to perform the copy operation was issued, or automatically create a machine-decodable image of the selected content in response to detecting the request, wherein the machine-decodable image includes the selected content encoded therein. The apparatus can include a display coupled to the first module to show the machine-decodable image. | 09-17-2015 |
20150254173 | AUTOMATED GENERATION OF TEST CASES FOR REGRESSION TESTING - Systems, methods and computer program products for performing software regression testing are disclosed. The systems, methods and computer program products are configured to execute a test case against an application under test on a programmable digital computer, to obtain from the programmable digital computer an identity of a first code module invoked by the test case, to associate the test case identifier with the first code module, to identify a second code module that is related to the first code module, and to associate the test case identifier with the second code module. | 09-10-2015 |
20150254090 | SYSTEM AND METHOD FOR MODIFYING ALLOCATED RESOURCES - Various embodiments illustrated and described herein include systems, methods, and computer program products to modify virtual machine resources. Some embodiments collect a wide variety of metrics and then analyze the metrics to determine whether a virtual machine is not being utilized. This determination may include an associated confidence level. When the confidence level reaches a designated threshold, action may be initiated. Such actions can include notifying users of the virtual machine and/or a user's supervisor that the virtual machine is not being utilized and that further action will be taken at a designated time. Further actions can include such thins as archiving the virtual machine, reducing the resources allocated to the virtual machine, archiving user data, and deleting the virtual machine. | 09-10-2015 |
20150254080 | MODIFYING DISK IMAGES - A method includes identifying a first boot configuration type for a disk image. The disk image includes a master boot record and a disk partition. The disk partition comprises a volume boot record. The master boot record comprises first instructions for loading an operating system, and the volume boot record comprises second instructions for loading the operating system. The method further includes receiving an input indicative of a second boot configuration type. The method also includes modifying the disk image to use the second boot configuration type to load the operating system by modifying the first instructions and the second instructions. | 09-10-2015 |
20150248544 | PRIVILEGED SHARED ACCOUNT PASSWORD SANITATION - Sanitizing passwords used in a shared, privileged account includes providing a password of a shared account to a user; identifying a first machine logged into using the password; determining when the first machine enters an inconsistent state; and modifying a memory area associated with the first machine to eliminate occurrences of the password in the memory area. | 09-03-2015 |
20150248276 | API PUBLICATION ON A GATEWAY USING A DEVELOPER PORTAL - A protocol is provided for configuring and publishing an API on an API gateway using an API developer portal. An executable module is created on the API gateway that includes variables that control API runtime behaviors. A flag is included in the executable module indicating that the executable module may be published to the API developer portal. An API template is created on the API gateway that is linked to the flagged executable module, and that specifies the executable module variables that may be configured on the API developer portal. On the API developer portal, the API template is selected, the variables specified by the API template are configured, and the configured API template is saved and published as an API on the API gateway. | 09-03-2015 |
20150248217 | SLIDING ROW DISPLAY OF INFORMATION - A method, system, and computer program product for displaying information on a display screen associated with an electronic device is disclosed. In one aspect, the information includes a number of objects such as various news articles, e-mail messages, etc. A portion of each of the objects may be presented in its own row on the display screen. The user can select one of the objects and slide it in its row to see different portions of the object. While the user is moving through the object by sliding one row, the other rows may remain fixed. | 09-03-2015 |
20150244763 | Generic Cloud Service For Publishing Data To Be Consumed By RSS Readers - Data from applications is published using a web feed document such as according to the Really Simple Syndication (RSS) protocol. The applications can be information technology (IT) services, such as an Application Performance Management program and a Service Desk program, which are used by an organization. The data is received at an Application Programming Interface (API) and stored in a database in a format which is usable by the web feed document. For example, the data can provide a parameter name, parameter label, severity and user type which are associated with placeholder elements in the web feed document. The user type may be used to restrict the publishing of certain parameters to certain users based on their business roles in an organization. The feed server may provide additional details in response to the user selecting a hyperlink in the web feed document. | 08-27-2015 |
20150244645 | INTELLIGENT INFRASTRUCTURE CAPACITY MANAGEMENT - Systems and methods may include receiving first data regarding first devices in a network. The first data may include an amount of utilization of first resources in the network by each device of the first devices. The first data also may include characteristic data of each device of the first devices. Systems and methods may include determining a predictive model for utilization of each resource of second resources in the network based on the first data. Systems and methods may include predicting an amount of utilization of each resource of the second resources by second devices using the predictive model. Systems and methods may include allocating each resource of the second resources based on the predicted amount of utilization of such resource by the second devices. | 08-27-2015 |
20150244595 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR USER SIDE OPTIMIZATION OF ACQUISITION OF VIRTUALIZED RESOURCES - A method includes receiving a request for access to an instance of a computing resource, the request having a performance standard associated therewith, requesting the instance of the computing resource from a computing resource provider, evaluating a performance of the instance of the computing resource provided by the computing resource provider to determine if the performance of the instance of the computing resource complies with the performance standard associated with the request, and providing access to the instance of the computing resource provided by the computing resource provider responsive to a determination that the performance of the instance of the computing resource complies with the performance standard associated with the request. Related systems and computer program products are also disclosed. | 08-27-2015 |
20150242629 | SMART CONTAINERIZATION OF MOBILE COMPUTING DEVICE RESOURCES - A method includes monitoring metrics at a mobile computing device. A substantive change in operating conditions is identified, based upon the monitored metrics. In response to the substantive change in the operating conditions, a smart container is automatically applied to a particular resource of the computing device. The smart container may define an enhanced security access policy. In accordance with a particular embodiment of the disclosure, the enhanced security access policy increases the level of protection to the resource. | 08-27-2015 |
20150242623 | REAL-TIME RECORDING AND MONITORING OF MOBILE APPLICATIONS - Systems and methods may include monitoring data input to and output from an application on a mobile device. Such systems and methods may include storing meta-data, which describes a behavior of the data input to and output from the application, on the mobile device. Such systems and methods may include determining whether a behavior of the application is anomalous based on the meta-data stored on the mobile device. Such systems and methods may include providing detailed data, which includes the data input to and output from the application, to another device in response to determining that the behavior of the application is anomalous based on the meta-data stored on the mobile device. | 08-27-2015 |
20150242460 | RECOMMENDING COLLABORATORS BASED ON USERS' CONTENT COLLECTIONS - A method may include receiving a selected document, or a set of documents, from a user, analyzing a content of the selected document, or documents, and determining a category of skill based on the content of the selected document. The method may also include locating a plurality of collaborators by matching the category of skill with a corresponding category of skill of a potential collaborator selected from a plurality of potential collaborators, and ranking the plurality of collaborators based on a predetermined score for the corresponding category of skill. Further, the method may include presenting the user with a ranked list of the plurality of collaborators based on the ranking of the plurality of collaborators. | 08-27-2015 |
20150242459 | GROUPING CONTENT BASED UPON USER ACTIVITY - A method includes identifying a meeting to be attended by a participant in the future. A context of the meeting is determined based upon meeting information included in an electronic calendar of the participant. Multiple document repositories associated with the participant are queried to identify potentially relevant documents, based upon the context. The potentially relevant documents may be compiled in a content group and the user may be provided with access to the content group. | 08-27-2015 |
20150242431 | COMPUTER SYSTEM LOG FILE ANALYSIS BASED ON FIELD TYPE IDENTIFICATION - A log file analysis computer includes a processor and a memory coupled to the processor. The memory includes computer readable program code that when executed by the processor causes the processor to perform operations. The operations include accessing a log file containing lines of data entries, and identifying which of the data entries in the log file are associated with which of a plurality of field types. A subset of the data entries in the log file are selected based on the associations between the data entries and the field types. A modified log file is generated based on the subset of the data entries. | 08-27-2015 |
20150242376 | Publishing Information Technology Data As A Newsfeed - Data from applications is published using a web feed document such as according to the Really Simple Syndication (RSS) protocol. The applications can be information technology (IT) services, such as an Application Performance Management program and a Service Desk program, which are used by an organization. A user may subscribe to receive periodically-updated data regarding selected parameters of the applications. A received web feed document can be displayed using a feed reader of a web browser or a native application of a client computing device. The user can request additional details regarding a parameter, such as historical data values, by selecting a hyperlink in the web feed document. The user provides login credentials so that the delivery of the additional detailed information is secure. A default display format can be set for the additional details. | 08-27-2015 |
20150242284 | TWO-ALGORITHM SORT DURING BACKUP AND RECOVERY - A backup of a file system is performed by scanning a file system to find elements that require a backup. Once at least one element is found, element identifiers associated with the elements are sorted using a first sorting algorithm to select an element for backup, and the element identifier associated with the selected element is appended to a backup list. A second sorting algorithm may also sort in parallel to the first sorting algorithm. The sorted elements are appended to the backup list until a predetermined rule is satisfied, when the remainder of the elements are sorted using a second sorting algorithm different from the first sorting algorithm. The element identifiers associated with the remaining elements are appended to the backup list in an order determined by the second sorting algorithm. While the sorting is occurring, the elements are backed up in the order of the backup list. | 08-27-2015 |
20150242063 | CONTEXTUALLY RELEVANT DIGITAL COLLABORATION - A method may include receiving, via a content sharing module, a request to find a content sharing collaborator. The method may include receiving context information of the request. The method may also include locating a plurality of potential collaborators based on the context information of the request, and then presenting context relevant to the potential collaborators. | 08-27-2015 |
20150234801 | INTEGRATING PATENT CONSIDERATION INTO AGILE PROCESS AND TOOLS - A computer-implemented development process of a software solution includes providing a user input screen to accept a description about a portion of a software solution and to allow creation of an associated work object relating to completion of an invention submission about a potentially patentable idea within the description. Concurrent with creating the work object, or at some later time, the process can also include generating an invention disclosure form related to the potentially patentable idea and transmitting the invention disclosure form to an invention submission process. | 08-20-2015 |
20150234731 | VIRTUALIZED SOFTWARE INTERACTION CONTRACT - Scenario data is accessed for each of a plurality of scenarios, each scenario corresponding to a respective request by a first software component and a response by a second software component to the respective request. The scenario data of each scenario describes the respective requests and responses included in that scenario. A virtual service that corresponds to the second software component is generated from the scenario data for the plurality of scenarios. A test set that corresponds to the first software component is further generated from the scenario data for the plurality of scenarios | 08-20-2015 |
20150234712 | METHODS OF SYNCHRONIZING FILES INCLUDING SYNCHRONIZED HASH MAP LINKED LISTS AND RELATED DATA PROCESSING NODES - Synchronizing hard link files on master and replica servers includes providing master and replica server hard link file snapshots. The master server hard link file snapshot includes a listing of hard link file names from a root directory of the master server. The replica server hard link file snapshot includes a listing of hard link file names from a root directory of the replica server. The master server hard link file snapshot and the replica server hard link file snapshot are compared. A synchronized hash map linked list may be generated responsive to the comparison. The synchronized hash map linked list includes a listing of group identifications corresponding to physical data files at the master server. For each group identification in the synchronized hash map linked list, the synchronized hash map linked list includes at least a hard link file name from the root directory of the master server. | 08-20-2015 |
20150227572 | SYSTEMS AND METHODS FOR HIGH SPEED REMOTE CHANGE DATA CAPTURE - A system and method are described for change data capture wherein a source database is replicated to a remote database. In one embodiment, a data storage device contains source log blocks containing information regarding database transactions processed for a source database, wherein the data storage device and source database are located in a first location, and at least some of the source log blocks include a plurality of database transactions in the same order as processed in the source database. Messages containing source log blocks are sent from the first location to a second location geographically remote from the first location. One or more components at the second location receive source log blocks from the messages, extract the source transaction data from the source log blocks, and use the source transaction data to write database transaction information to a second database based on the extracted source transaction data. | 08-13-2015 |
20150227397 | ENERGY EFFICIENT ASSIGNMENT OF WORKLOADS IN A DATACENTER - A computing workload is allocated amongst servers based on energy usage considerations. An energy consumption model is created for different server configurations. Based on the energy consumption models for the respective server configurations, different energy consumptions are predicted for executing a workload in corresponding different allocations of the workload on the servers. One of the allocations is selected based on the predicted energy consumptions. The selected allocation could minimize total energy use, reduce peak energy use, spread out energy use, etc. | 08-13-2015 |
20150222638 | MULTI-TENANCY SUPPORT FOR A PRODUCT THAT DOES NOT SUPPORT MULTI-TENANCY - Enterprise software is computer software used to satisfy the needs of an organization and/or multiple individual users. Methods, systems and/or computer program product are described for providing, to a plurality of tenants, access to an enterprise software that is accessible by only a single tenant. At least one of the tenants accessing the enterprise software includes a plurality of users. | 08-06-2015 |
20150220514 | DATA PROCESSING SYSTEMS INCLUDING A TRANSLATION INPUT METHOD EDITOR - A method includes operating a translation input method editor on a data processing system to receive a first word in a first language at an input method editor, generate a second word in a second language that has a defined corresponding meaning as the first word in the first language, and display the second word in the second language. | 08-06-2015 |
20150220423 | TRANSACTIONAL BOUNDARIES FOR VIRTUAL MODEL GENERATION - Data is identified that represents a path of a transaction that includes a plurality of transaction fragments associated with a plurality of software components. The plurality of software components includes a first software component to communicate in the transaction with a second software component over an interface. A transaction boundary is determined between the first and second software components based at least in part on the data. A virtual model is generated to simulate at least a particular one of the plurality of software components based on the identified transaction boundary. | 08-06-2015 |
20150215376 | SYSTEMS AND METHODS FOR DEPLOYING LEGACY SOFTWARE IN THE CLOUD - A system, method, apparatus and computer program product is described to provide a plurality of connectors, the connectors configured to support one or more applications in at least one configuration selected from a group of configurations including: i) a non-tenant, and non-tenant aware, application, ii) a non-tenant, but tenant aware, application, iii) a many tenant application, iv) a multi-tenant application, and v) a native multi-tenant application. Also provided are one or more application programming interfaces (APIs) to the connectors, the one or more APIs providing a substantially uniform interface to applications supported by the connectors. In one embodiment, a governance layer provides the APIs, and the governance layer communicates with the connectors, so that an application's tenancy support is obfuscated. | 07-30-2015 |
20150213449 | RISK-BASED CONTROL OF APPLICATION INTERFACE TRANSACTIONS - An API transaction risk assessment equipment is disclosed that receives an API transaction request through a data network from an application processed by a source node, and generates a risk assessment score based on context information that characterizes the API transaction request. The risk assessment score indicates a level of trustworthiness of the API transaction request for processing by an application on a destination node. The API transaction risk assessment equipment then controls deliverability of the API transaction request through the data network to the destination node for processing based on the risk assessment score. Corresponding methods by API transaction risk assessment equipment are disclosed. | 07-30-2015 |
20150213051 | SYSTEM AND METHOD FOR HIGH AVAILABILITY DATA REPLICATION - A data replication system and method is disclosed in which a master file server uses a first filter in a kernel space to intercept a file I/O events, send the file I/O events over a first network, for example a local area network, to a second filter in a kernel space of a first replica file server, and submit the file I/O event to a file system program in user space of the master file server to be processed. The second filter records the file I/O event in a memory of the second file server and sends an acknowledge message to the first filter indicating the file I/O event received by the second filter has been recorded in the replica file server. The first filter notifies user land in the first file server that the file I/O event has been processed if the first filter has received the acknowledge message and the file system program has completed processing the file I/O event in the first file server. In one embodiment, a data replication engine in the first replica file server replicates data stored in the first replica file server to a second replica file server in a location remote from the second replica file server, using a second network, for example a wide area network. | 07-30-2015 |
20150212920 | SOFTWARE SYSTEM VALIDITY TESTING - Data is identified that represents a path of a transaction that includes a plurality of transaction fragments associated with a plurality of software components. The transaction returns a particular value and a particular one of the plurality of software components is identified as a source of the particular value. A test action is generated that, when executed, is to attempt to verify the particular value from the particular software component. | 07-30-2015 |
20150212808 | AUTOMATED SOFTWARE MAINTENANCE BASED ON FORECAST USAGE - Various embodiments illustrated and described herein schedule a software upgrade as part of normal workload assignment and management. In one embodiment, a workload automation system evaluates the projected workload on a system affected by a software upgrade. Policies may determine requirements that should be met during the software upgrade, such as jobs that may or may not be postponed, preferred times of software upgrade, etc. The software upgrade may also have constraints associated with it, such as a time by which the upgrade must be completed, the order of upgrade if multiple systems are involved, etc. These constraints may be part of the policies or may be separate. Based on forecasted workload automation, policies, and any other constraints a time slot for software upgrade is selected and the upgrade is scheduled for the time slot as part of a work queue. | 07-30-2015 |
20150199250 | DETERMINING AND USING POWER UTILIZATION INDEXES FOR SERVERS - A power utilization index is determined for a server that defines an amount of energy that is consumed by the server for a unit of workload performed by the server. Future power usage by the server may then be predicted based on the power utilization index and a projected workload demand on the server. Moreover, workload for the server may be selectively assigned in response to the predicting. The power utilization index may be determined by a obtaining measurements of power consumed by the server in response to various workloads. Measurements of workload demands placed on the server are also obtained for the workloads. The measurements of workload demands may separately account for demands placed upon a processor subsystem of the server, a memory subsystem of the server, a network communication subsystem of the server and a storage subsystem of the server, for the various workloads. | 07-16-2015 |
20150199238 | EXTENDING THE RECOVERY AND REPORTING RANGES OF OBJECTS - The reporting and recovery of log activity in a computer system is extended by receiving an indication of a desired log activity to be retrieved, and by designating an active index file as a current index file. The current index file includes an inventory of log files, and is constrained in the number of log files. A searching operation is performed in an iterative process. The searching operation determines whether the desired log activity is within any of log files of the current file, designates a backup index file as the current index file if it is determined that the desired log activity is not within the current index file, and accesses a select log file within the current index file that includes the desired log activity, if it is determined that the desired log activity is within the current index file. | 07-16-2015 |
20150199215 | ASSIGNING DATA PROCESSING WORKLOADS IN DATA CENTERS BASED ON NON-DATA PROCESSING OVERHEAD - Data processing workloads are selectively assigned within a data center and/or among data centers based on non-data processing overhead within the data center and/or among the data centers. Power consumption of a rack including servers is predicted based on data processing demands that are placed on the servers for a given data processing workload, and power consumed by the rack is measured when the servers are performing the given data processing workload. A metric of power consumed by the rack for non-data processing overhead is derived based on a difference between results of the predicting and the measuring. A future data processing workload is selectively assigned to the rack based on the metric of power of power consumed by the rack for the non-data processing overhead. Assignment may also take place at an aisle and/or data center level based on these metrics. | 07-16-2015 |
20150195352 | VIRTUAL STAND-IN COMPUTING SERVICE FOR PRODUCTION COMPUTING SERVICE - Provided are methods of providing a virtual service that may provide partial real time service to clients of a production computing service that is unavailable. Methods may include generating, based on transaction data corresponding to a production computing service that is available, a production computing service model that includes multiple request types and multiple confidence values that correspond to ones of the request types. Methods may include responding to a request received from a client of the production computing service with a model-generated response to the request in response to the production computing service being unavailable. The production computing service is updated with the request received from the client and the model-generated response responsive to the production computing service being available after being unavailable. | 07-09-2015 |
20150178264 | REPORTING THE PRESENCE OF HARDCODED STRINGS ON A USER INTERFACE (UI) - A method and apparatus analyzes user interface (UI) screens associated with a software application, and determines whether any of the strings displayed on the UI screens are erroneously displayed to an end user. Based on the analysis, the method and apparatus generates a report for a developer or tester, for example, which allows that party to remove unwanted hardcoded strings from the UI screen code. | 06-25-2015 |
20150163103 | CONTROLLING COMPUTER NODES THROUGH SOCIAL MEDIA - Some embodiments are directed to a computer node that communicates a report message containing information to a social media server to cause publishing of the information to other computer nodes tracking publishing on the social media server by the computer node. The computer node receives a response message from one of the other computer nodes through the social media server, and operates based on the response message. Related embodiments are directed to another computer node that communicates with a social media server to track information published by report messages from other computer nodes, generates a response message based on the information published by one of the other computer nodes, and communicates the response message to the social media server to cause publishing of content of the response message to the other computer nodes. | 06-11-2015 |
20150088938 | SYSTEM AND METHOD FOR ANALYZING SEQUENTIAL DATA ACCESS EFFICIENCY - A system and method is provided for determining a sequential access efficiency for a database table. A number of data block changes that occur during a sequential access of a plurality of rows in a database table may be determined. The sequential access efficiency may be determined based on the determined number of data block changes. | 03-26-2015 |
20150088758 | AUTHENTICATING USERS TO ATMS AND OTHER SECURE MACHINES FOR CARDLESS TRANSACTIONS - Systems, apparatus, methods, and computer program products for using quick response (QR) codes for authenticating users to ATMs and other secure machines for cardless transactions are disclosed. Embodiments of the present disclosure read an image displayed on a display of an external device using a mobile device associated with a user authorized to access a secure resource, decode transaction information encoded in the image, transmit the transaction information and an identifier of the mobile device from the mobile device to an authentication system, and grant access to the secure resource if the transaction information and the identifier satisfy an authentication test performed at the authentication system. | 03-26-2015 |
20150039753 | SYSTEM AND METHOD FOR CAPACITY PLANNING FOR SYSTEMS WITH MULTITHREADED MULTICORE MULTIPROCESSOR RESOURCES - A method for expressing a hierarchy of scalabilities in complex systems, including a discrete event simulation and an analytic model, for analysis and prediction of the performance of multi-chip, multi-core, multi-threaded computer processors is provided. Further provided is a capacity planning tool for migrating data center systems from a source configuration which may include source systems with multithreaded, multicore, multichip central processing units to a destination configuration which may include destination systems with multithreaded, multicore and multichip central processing units, wherein the destination systems may be different than the source systems. Apparatus and methods are taught for the assembling of and utilization of linear and exponential scalability factors in the capacity planning tool when a plurality of active processor threads populate processors with multiple chips, multiple cores per chip and multiple threads per core. | 02-05-2015 |
20150019442 | PRE-GENERATION OF SESSION KEYS FOR ELECTRONIC TRANSACTIONS AND DEVICES THAT PRE-GENERATE SESSION KEYS FOR ELECTRONIC TRANSACTIONS - Methods and devices for pre-generating session keys for securing transactions are provided. A plurality of session cryptographic keys are generated from a master cryptographic key and a respective plurality of possible values of a transaction counter. The session cryptographic keys are encrypted to provide a plurality of encrypted session cryptographic keys, which are stored in the user terminal. The master cryptographic key is deleted from the user terminal after the session keys are generated. To secure a transaction, a cryptogram is generated based on one of the encrypted session cryptographic keys and transaction data for the transaction, and the cryptogram is transmitted to a transaction terminal. The transaction counter is updated, and the encrypted session cryptographic key is deleted from the user terminal. | 01-15-2015 |
20140351316 | SYSTEM AND METHOD FOR SECURING WEB SERVICES - A method and system for securing web services on one or more server computers by one or more client computers, the computers connected to one or more networks through one or more network interfaces, each computer having one or more memories and one or more central processing units (CPUs), the system comprising one or more logical expressions that define constraints on one or more service releases; a gateway process receiving service request messages from one or more of the clients for i) identifying the service request message, ii) processing the service request message in accordance with one or more of the logical expressions associated with the requested service and iii) providing access to the requested service if the constraints are satisfied. The system includes an agent process associated with one or more the clients, for receiving service request messages from an associated client, the message destined for a requested service and applying to the received request message one or more of a subset of the logical expressions associated with the requested service for forwarding to the gateway process. | 11-27-2014 |
20140298419 | SYSTEM AND METHOD FOR BRIDGING IDENTITIES IN A SERVICE ORIENTED ARCHITECTUREPROFILING - A system for bridging user identities between at least a first and a second security domain, comprising a bridge associated with the first security domain for intercepting messages for service in the second domain from users in the first domain. The bridge authenticates the user identities against a local authentication source by using an established key relationship and binds a security token with the message. A gateway is associated with the second domain for gating inbound access and outbound communication with a service in the second domain and for receiving the authenticated message and verifying the authenticity of the security token by using a certificate of the trusted authentication source and authorising access to the service upon confirmation of the authorisation, such that the authorisation is independent of the identity of the user. | 10-02-2014 |
20140282555 | Ensuring Determinism During Programmatic Replay in a Virtual Machine - Aspects of an application program's execution which might be subject to non-determinism are performed in a deterministic manner while the application program's execution is being recorded in a virtual machine environment so that the application program's behavior, when played back in that virtual machine environment, will duplicate the behavior that the application program exhibited when originally executed and recorded. Techniques disclosed herein take advantage of the recognition that only minimal data needs to be recorded in relation to the execution of deterministic operations, which actually can be repeated “verbatim” during replay, and that more highly detailed data should be recorded only in relation to non-deterministic operations, so that those non-deterministic operations can be deterministically simulated (rather than attempting to re-execute those operations under circumstances where the outcome of the re-execution might differ) based on the detailed data during replay. | 09-18-2014 |
20140280268 | SYSTEM AND METHOD FOR VERIFYING CONFIGURATION ITEM CHANGES - A system and method is provided for managing verification of configuration item changes. Discovered configuration data associated with a configuration item may be received. A determination may be made regarding whether a change order for the configuration item exists. A determination may be made regarding whether the change order is in a “verification in progress” state. When the change order is in the “verification in progress” state, alignment of the discovered configuration data with the change order may be determined and a verification policy may be determined based on the determined alignment. | 09-18-2014 |
20140237016 | SYSTEM AND METHOD FOR HAND-OFFS IN CLOUD ENVIRONMENTS - A system, method, and computer-readable storage medium for handling hand-offs in a cloud computing environment is provided. The method includes identifying, at a cloud governance module of a server device, a plurality of applications executing on a plurality of servers belonging to a plurality of cloud computing service providers. The method includes determining, based upon information in a policy module, to hand-off an execution of at least one identified application executing on a first cloud computing service provider platform to a second cloud computing service provider, determining whether the second cloud computing service provider satisfies one or more governance policies associated with the at least one identified application, and handing-off the execution of the at least one identified application to a second cloud computing provider platform based upon the second cloud computing provider being compliant with the one or more governance policies associated with the at least one identified application. | 08-21-2014 |
20140223525 | Access to Vaulted Credentials Using Login Computer and Mobile Computing Device - According to an example computer-implemented method, a password management server receives an access request message from a login computer at which a resource requiring vaulted credentials has been requested. The access request message identifies the requested resource and the login computer. A session identifier (ID) is generated for enabling release of the vaulted credentials. The session ID is linked to the login computer and to the requested resource. The session ID is transmitted to the login computer. Responsive to receiving a value indicative of the session ID from a mobile computing device, the password management server transmits the vaulted credentials to the login computer or to the mobile computing device. | 08-07-2014 |
20140223418 | PERFORMANCE DATA IN VIRTUAL SERVICES - Performance data is accessed that describes a response time of a first software component to a particular request of another software component. A virtual service is instantiated to simulate operation of the first software component. In some instances, the virtual service can be instantiated based on a service model. The virtual service uses the performance data to generate responses to requests received from a second software component based on the performance data. | 08-07-2014 |
20140222836 | DETERMINING DEPENDENCIES DURING MACRO EXPANSION - In certain embodiments, a parser parses a formula to yield one or more functions, at least one function comprising a dependent value of a dependent object. One or more macro handlers configured to execute the functions are determined. At least one macro handler is instructed to register with one or more dominant objects on behalf of the dependent object, where the dominant objects are used to evaluate the dependent value. | 08-07-2014 |
20140215256 | FEATURE CENTRIC DIAGNOSTICS FOR DISTRIBUTED COMPUTER SYSTEMS - A distributed computer system includes components. The components include embedded computer processors that make up an application within the distributed computer system. The computer processors are accessible by an end user of the system. The computer processors are operable to communicate with a plurality of system analyzers, to generate an operational status of the application in the system based on the communication with the plurality of system analyzers, to generate one or more recommendations to address or troubleshoot a non-desired operational status of the application within the system, and to provide a unified interface to the end user that provides to the end user the one or more recommendations to address or troubleshoot the non-desired operational status of the application within the system. | 07-31-2014 |
20140215015 | SYSTEM AND METHOD FOR USING COMMON COMMUNICATION CHANNEL BY WEB PAGE APPLETS - Methods, apparatus, systems and computer-readable media are disclosed for facilitating multiple applets of a web page to communicate with a back end server through a common communication channel. According to one aspect, a method is disclosed for communicating data which includes identifying a common communication applet by a plurality of client applets. The method also includes submitting a set or data requests originating from the client applets to the common communication applet. The method further includes accumulating the data requests received from the plurality of client applets. The data requests are encoded and transmitted to a back-end handler. Results from the back end server are received, decoded and delivered to the appropriate client applet. | 07-31-2014 |
20140208386 | Adaptive Strike Count Policy - An adaptive strike count management is implemented for securing resources. The method authorizes access to a resource if a security credential matches pre-stored security data. However, when the security credential does not match the pre-stored security data, the adaptive strike count management method denies access to the resource; assesses the risk level based on the security credential; increments a strike counter by a predetermined value based on the risk level; and disables further access attempts to the resource if the strike counter exceeds a threshold. The strike counter is incremented by a first value when the risk level is assessed to be a first level, a second value when the risk level is assessed to be a second level, and a third value when the risk level is assessed to be a third level. | 07-24-2014 |
20140207951 | SYSTEM AND METHOD FOR PERFORMING CAPACITY PLANNING FOR ENTERPRISE APPLICATIONS - A system and method for capacity planning for enterprise networks, such as identifying bottlenecks and removing or replacing the bottleneck device are provided. The device utilization for one or more network devices are measured or read from measured data. A relative load is calculated from the device utilization data and device utilization is compared to a device threshold to determine the bottleneck device. A method is also provided for determining network utilizations, network populations and a relative response times based on only limited measurable device usage data. | 07-24-2014 |
20140207871 | APPARATUS, METHOD AND SYSTEM FOR AGGREGRATING COMPUTING RESOURCES - A system for executing applications designed to run on a single SMP computer on an easily scalable network of computers, while providing each application with computing resources, including processing power, memory and others that exceed the resources available on any single computer. A server agent program, a grid switch apparatus and a grid controller apparatus are included. Methods for creating processes and resources, and for accessing resources transparently across multiple servers are also provided. | 07-24-2014 |
20140201763 | COMMAND PRESENTATION AND GENERATION SYSTEMS, METHODS AND COMPUTER PROGRAM PRODUCTS USING LOGICAL TREES - Command methods for command driven computer systems present a list of command driven computer program products in response to activation of the command method, and present a logical tree including commands and related operands and sub-operands for a command driven computer program product in response to receiving a selection of the command driven computer program product from the list of command driven computer program products. The logical tree is presented in the same format for each of the command driven computer program products. The logical tree may be generated by obtaining a text file of a reference guide for the computer program product, identifying commands for the computer program product from the text file and creating lists of dependencies of the related operands and sub-operands for the computer program product. Related computer systems, methods and computer program products are disclosed. | 07-17-2014 |
20140201525 | SYSTEM AND METHOD FOR MULTI-LAYERED SENSITIVE DATA PROTECTION IN A VIRTUAL COMPUTING ENVIRONMENT - Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering guest virtual machines in a virtual computing environment, wherein each of the guest virtual machines may include a local sensitive data control agent. The sensitive data control monitor generates encryption keys for each guest virtual machine which are sent to the local sensitive data control agents and used to encrypt data locally on a protected guest virtual machine. In this manner the data itself on the virtual (or physical) disc associated with the guest virtual machine is encrypted while access attempts are gated by a combination of the local agent and the environment-based monitor, providing for secure yet administrable sensitive data protection. | 07-17-2014 |
20140201158 | METHODS FOR PRESERVING GENERATION DATA SET SEQUENCES - Methods for automating the processing of generation data groups as groups prior to data recovery are described. The generation data groups to be recovered may correspond with a data storage volume that has been taken offline or has suffered a hardware failure. Prior to data recovery, a table of data sets associated with the data to be recovered may be created and then sorted based on the base names, creation dates and generation numbers of the data sets. The sorted table may be used to identify a particular sequence of generation data sets associated with a particular generation data group to be recovered. The generation data sets corresponding with the particular generation data group to be restored may be selected based on a catalog status of the particular generation data group and whether the particular generation data group is in a rolled-off or wrapped state. | 07-17-2014 |
20140201149 | CONSISTENT BOOKMARK - A request to generate a snapshot of the master file system for replication is received. The master file system is frozen and a freeze callback function is invoked to generate a consistent point in time. The freeze callback function initiates generation of a bookmark event based on a current time. The bookmark event indicates the consistent point in time for generation of the snapshot. The freeze callback function also initiates capturing I/O events intended for the master file system in order and suspending journal flushing to data storage so as to avoid deadlock of the master file system. The freeze callback function is forwarded and used to generate the snapshot by indicating the consistent point in time to start generation of the snapshot. | 07-17-2014 |
20140189812 | Privileged Activity Monitoring Through Privileged User Password Management and Log Management Systems - A system and method is provided for allowing seamless auditing compliance and investigations of privileged account access and activities. Account access information and privileged activity information may be stored in a central data repository. The central data repository may be queried to determine who was granted access to a privileged account, the timeframe that the access was granted, and/or what actions were performed by the user who was granted access. | 07-03-2014 |
20140189646 | RULE BASED SYNTAX SOFTWARE TEST CASE GENERATOR - A system and computer implemented method includes receiving an input file containing a mark-up language based description of a syntax diagram having multiple elements and variations for multiple elements describing a set of test case queries, checking and validating the syntax diagram via a parser running on a processor, and generating and storing, on a computer readable medium, the set of test case queries by calculating permutations of the elements in the syntax diagram. | 07-03-2014 |
20140189548 | DOMAIN SPECIFIC LANGUAGE USER INTERFACE - Providing a user interface for editing a domain specific language expression includes displaying, by a master widget, the domain specific language expression within the user interface. This displaying of the domain specific language expression includes displaying, by a compound expression widget, a compound expression of the domain specific language expression and displaying the compound expression includes displaying, by a first expression widget, a first argument of the compound expression, and displaying, by a second expression widget, a second argument of the compound expression. The method further includes detecting, by the compound expression widget, a change to either of the first expression widget and the second expression widget; and in response to the change being detected, updating, by the master widget, the compound expression based on the change. | 07-03-2014 |
20140181528 | FILE TAMPER DETECTION - This disclosure relates generally to methods and systems for determining when a file has changed. According to one aspect of the present disclosure, a method of determining if contents of a file have changed can include determining if a digital signature created as a function of contents of the file has changed, and when the digital signature has changed, overlaying the contents of the file with a first mark that indicates the contents have changed and blocks a view of the contents of the file. | 06-26-2014 |
20140181488 | METHOD AND SYSTEM FOR MACHINE IDENTIFICATION - A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated. | 06-26-2014 |
20140173694 | MULTI-TENANCY GOVERNANCE IN A CLOUD COMPUTING ENVIRONMENT - A cloud computing system includes a plurality of tenants that are permitted to access cloud hosted applications. The system includes an input governance layer associated with each application, and an output governance layer associated with each application. The input governance layer and the output governance layer include an encapsulation of a cloud hosted application. The governance layers receive a request from a tenant-user to access a first application on the cloud computing system, check a governance database to determine if the tenant-user is authorized to access the first application, and allows or denies access accordingly. | 06-19-2014 |
20140172950 | Methods And Systems For Speeding Up Data Recovery - A method for providing recovery from a remote server to a client includes sending at least one data restore request to the remote server. A data block identifier are received at the client system via a network. A data block associated with the data block identifier is retrieved from a local backup server associated with the client system if the local back up server stores the data block. The data block associated with the data block identifier is received from the remote server if the local backup server does not store the data block. The data block is restored to the client system. | 06-19-2014 |
20140164364 | SYSTEM AND METHOD FOR EVENT-DRIVEN PRIORITIZATION - Methods include receiving at a receiving device a plurality of reports, each corresponding to at least one item and comprising data associated with one or more performance metrics. The methods further include identifying events for each report corresponding to at least one item using the data in the report. In addition, the methods include determining a report score for each report based on a number and type of the identified events. The methods also include outputting the report scores. | 06-12-2014 |
20140157380 | Method And System For Hybrid Software As A Service User Interfaces - A hybrid software as a service (SaaS) delivery model allows an enterprise to control sensitive data while application code and non-sensitive data are downloaded from a software provider. A client computing device of the enterprise downloads the application code, which determines an appearance and a behavior of a user interface of the application. The application code is also configured, such as with a network address of a database, to allow the client computing device to access the sensitive data which is hosted by the enterprise. The client computing device may download a file from the enterprise which accesses the application code. For example, an HTML file may access scripting code. Or, the client computing device downloads the application code directly from the software provider, in which case cross-origin resource sharing allows the client computing device to access the sensitive data hosted by the enterprise. | 06-05-2014 |
20140157241 | CODE-FREE TESTING FRAMEWORK - A method, system and computer program product for testing software comprises discovering, by an agent executing on a computer, testable code configured to execute on the computer; receiving, by the agent, a request related to testing the testable code from a requestor; in response to the request, sending the requestor a property of the testable code; receiving, by the agent, data related to the property; activating; by the agent, the testable code wherein the received data is associated with the property in order to produce a result from the activated testable code; and returning, by the agent, the result to the requestor. | 06-05-2014 |
20140157057 | CODE-FREE TESTING FRAMEWORK - A method, system and computer program product for testing testable code of an application comprises sending a request, from a computer-implemented client to a remote test orchestrator, for a list identifying any test agents registered with the remote test orchestrator; and receiving, by the computer-implemented client from the remote test orchestrator, a list identifying the test agent registered with the remote test orchestrator. | 06-05-2014 |
20140156827 | Method and System for Capturing Expertise of a Knowledge Worker in an Integrated Breadcrumb Trail of Data Transactions and User Interactions - A system and method is provided for creating a trail of events. A plurality of data exchange events and a plurality of user interaction events are captured. A frame is generated based on the captured plurality of user interaction events. A cut is generated based on the captured plurality of data exchange events and the frame. The cut represents a historical trail of the plurality of user interaction events associated with the back-end data receive event and the back-end data send event | 06-05-2014 |
20140156709 | AGGREGATING KEYS OF DEPENDENT OBJECTS FOR A GIVEN PRIMARY OBJECT - Keys are obtained and aggregated by storing a primary object as an entry in a parent keys storage and a child keys storage, the entry identified as unvisited in each. An object evaluation process is then performed until all unique entries in the parent keys storage and all unique entries in the child keys storage have been visited and by committing the keys of at least one related object as an entry to the hierarchical database. The object evaluation process visits each unvisited object in the parent keys storage and child keys storage by selecting, for the unvisited object, objects in the parent direction that have not already been visited and objects in the child direction that have not already been visited and by inserting the keys of the selected related objects as entries in the parent keys storage or child keys storage. | 06-05-2014 |
20140149575 | ROUTING OF PERFORMANCE DATA TO DEPENDENT CALCULATORS - A method, system and computer program product are disclosed for routing performance data to compute nodes. According to one aspect of the present disclosure each of a plurality of compute nodes are assigned a topic. Each topic may be associated with a set of calculations. Labeled performance metrics for an application are received. Each performance metric is labeled with a context under which the performance metric was collected. A topic is associated with each of the performance metrics based on the labeled context. Each respective node listens for a topic assigned to it in order to access the performance metrics associated with the assigned topic. Each respective node analyzes the performance metrics associated with the topic assigned to it. | 05-29-2014 |
20140143736 | NAVIGABLE GRAPH OF A SERVICE LEVEL MANAGEMENT DOCUMENT - A service level management document is modeled by a multi-path, navigable graph. The graph is comprised of nodes connected by lines where each node represents part of a modeled service level management document and each line represents the relationship between connected nodes. Each node has a predetermined shape that corresponds to the role of each node in the graph, such as by designating whether the node is a root node, branch node, leaf node, or branch graph node. Moreover, the shape can distinguish whether the node is optional or required. The background color of each node is indicative of the state of the information within a configuration page linked to a corresponding node. The configuration pages of a graph collectively describe the content of the modeled service level management document. | 05-22-2014 |
20140139318 | Mapping Biometrics To A Unique Key - A technique for mapping a biometric credential of a user to a data value such as a key or password. A database stores multiple entries of biometric templates and associated data values for different users. One of the entries is a match for a particular user, and the remaining entries are randomly selected. The number of entries is reasonably large to provide a desired degree of randomness for a given entry, but smaller than a key space of the data values. Based on an input of a biometric sample of the user, a best match is selected from the entries of biometric templates, and the associated data value is used to authenticate the user. Two- or three-factor authentication can be provided. Additional factors can include a password provided by the user and a key which is encrypted by the data value of the matching entry. | 05-22-2014 |
20140136297 | INCREMENTALLY DEVELOPING BUSINESS PERFORMANCE INDICATORS - A method, system and computer program product for developing a business performance indicator for an organization comprises receiving from a first member of the organization a first metric formula M | 05-15-2014 |
20140122428 | SYSTEM AND METHOD FOR NETWORK FILE SYSTEM SERVER REPLICATION USING REVERSE PATH LOOKUP - The system and method described herein may use reverse path lookup to build mappings between file handles that represent network file system objects and full path names associated therewith and distinguish hard links between different file system objects having the same identifier with different parents or file names. The mappings and information distinguishing the hard links may then be cached to enable replicating changes to the file system. For example, a server may search the cached information using a file handle associated with a changed file system object to obtain the file name and full path name associated therewith. The server may then send the file name and full path name and metadata describing how the file system object was changed to a replica host, which may then replicate the change to the file system object. | 05-01-2014 |
20140115709 | SECURED DELETION OF INFORMATION - Secure deletion of a storage device includes monitoring the storage device, determining whether a predetermined condition occurs, and accessing the storage device when it is determined that the predetermined condition occurs. Further, deleted information to be securely wiped is identified in accordance with a predetermined unified policy for a virtual environment comprising the storage device. Alternatively, information being deleted is intercepted when it is determined that the information being deleted satisfies a predetermined condition. The identified or intercepted deleted information is securely wiped from the storage device by filling a portion of the storage device associated with the deleted information with zero bytes before the deleted information is marked as deleted. The secured wiping of deleted information may occur in accordance with a predetermined enterprise-wide policy. | 04-24-2014 |
20140115300 | DATA PROCESSING SYSTEM WITH DATA CHARACTERISTIC BASED IDENTIFICATION OF CORRESPONDING INSTRUCTIONS - Some methods, computer program products, and data processing nodes identify a data unit in a data memory that is to be operated upon by a processor circuit, and uses a characteristic of the data unit to identify what instruction(s) within an instruction memory is be executed by the processor circuit to perform an operation upon the data unit. The data memory may be local to the processor circuit, and the instruction memory may be remotely accessible to the processor circuit through a data network. | 04-24-2014 |
20140109200 | BIOMETRIC IDENTIFICATION FOR MOBILE APPLICATIONS - Methods for automating the entry of password information and other user credentials into native and web-based computing applications are described. In some embodiments, an end user identity and a corresponding authentication level may be determined during an unlock event or during operation of a computing device. The end user identity may be determined by capturing biometric characteristics of an end user of the computing device (e.g., by performing facial recognition and/or voice recognition). Upon the detection of an authentication request from an application running on the computing device, the end user identity and the corresponding authentication level may be used to acquire and provide user credentials for authenticating the end user to the application. | 04-17-2014 |
20140108463 | DATA STRUCTURE FOR EFFICIENTLY IDENTIFYING TRANSACTIONS - A technique for monitoring software which efficiently communicates transaction trace data, including static and dynamic data, from an agent to a manager is disclosed. A tree data structure describes transactions as a sequence of transaction elements. Each branch may correspond to one type of transaction. The nodes along a branch may be associated with components of monitored software that are invoked to perform the transaction. A provisional branch may be constructed when an agent is unable to initially identify the transaction. Transaction data may be stored in association with the nodes in the provisional branch during the monitoring. After information needed to identify the transaction becomes available to the agent, the provisional branch is updated. The transaction data is reported in response to determining the branch in the tree data structure that matches the provisional branch. | 04-17-2014 |
20140101738 | APPLYING A PARTIAL PASSWORD IN A MULTI-FACTOR AUTHENTICATION SCHEME - A method includes transmitting a User ID and a full Password of a user of a client device to a server via the client device, and then establishing a network connection between the client device and the server after the User ID and the full Password. The method also includes receiving, from the server via the client device, an encrypted secret PIN (ESPIN) and a challenge for corresponding positions of a Partial Password, entering the Partial Password via the client device, and computing a secret PIN (SPIN) from the ESPIN via the client device in response to a correct entry of the Partial Password. The Additional Factor is unlocked using the SPIN, and the unlocked Additional Factor is transmitted to the server to request authentication of the user of the client device. The client device includes a processor and memory having instructions for the above method. | 04-10-2014 |
20140101532 | METHOD AND SYSTEM FOR IMPLEMENTING COMMANDS - A method for implementing commands includes storing data defining command operations in a memory. The data defining command operations include a hierarchy of Uniform Resource identifiers (URIs) and Extensible Markup Language (XML) document schema defining XML documents. The method also includes receiving a command request from a remote computer. The command request contains an URI and a Hypertext Transfer Protocol (HTTP) method. Further, the method includes determining a command operation based on the data defining command operations stored in the memory and the command request received, and executing the command operation based on the command request. | 04-10-2014 |
20140101291 | SYSTEM AND METHOD FOR INVOKING WEB SERVICES FROM COMMAND-LINE PROGRAM - A method for invoking web services includes invoking a command-line program. The program receives a plurality of parameters. The method further includes generating a web service request based on the plurality of parameters. The web service request comprises an extensible markup language (XML) document, and the XML document comprises information indicating an application command. The method also includes transmitting the web service request to a server using a network communication protocol. | 04-10-2014 |
20140101290 | SYSTEM AND METHOD FOR INVOKING APPLICATION COMMANDS WITH WEB SERVICE CALLS - A method for invoking an application command includes generating a web service request. The web service request includes an extensible markup language (XML) document in the body of the web service request. The XML document includes information indicating an application command. The method further includes transmitting the web service request to a server using a network communication protocol. | 04-10-2014 |
20140101230 | METHOD AND SYSTEM FOR IMPLEMENTING NOTIFICATIONS - A method for implementing notifications. The method includes storing data defining notification operations in a memory. The data defining notification operations include a hierarchy of Uniform Resource Identifiers (URIs) and Extensible Markup Language (XML) document schema defining XML documents. The method further includes receiving a notification command including an URI and a Hypertext Transfer Protocol (HTTP) method; determining a notification operation based on the data defining notification operations stored in the memory and the notification command received; and executing the notification operation based on the notification command. | 04-10-2014 |
20140096134 | SYSTEM AND METHOD FOR ENFORCEMENT OF SECURITY CONTROLS ON VIRTUAL MACHINES THROUGHOUT LIFE CYCLE STATE CHANGES - Systems and methods associated with virtual machine security are described herein. One example method includes instantiating a guest virtual machine in a virtual computing environment. The method also includes installing a life cycle agent on the guest virtual machine, assigning an identifying certificate, a set of policies, and an encryption key to the guest virtual machine, and providing the certificate, policies, and encryption key to the guest virtual machine. The certificate, policies, and encryption key may then be used by the guest virtual machine to authenticate itself within the virtual computing environment and to protect data stored on the guest virtual machine. | 04-03-2014 |
20140095868 | SYSTEM AND METHOD FOR MULTI-LAYERED SENSITIVE DATA PROTECTION IN A VIRTUAL COMPUTING ENVIRONMENT - Systems and methods for providing sensitive data protection in a virtual computing environment. The systems and methods utilize a sensitive data control monitor on a virtual appliance machine administering guest virtual machines in a virtual computing environment, wherein each of the guest virtual machines may include a local sensitive data control agent. The sensitive data control monitor generates encryption keys for each guest virtual machine which are sent to the local sensitive data control agents and used to encrypt data locally on a protected guest virtual machine. In this manner the data itself on the virtual (or physical) disc associated with the guest virtual machine is encrypted while access attempts are gated by a combination of the local agent and the environment-based monitor, providing for secure yet administrable sensitive data protection. | 04-03-2014 |
20140095451 | SYSTEM AND METHOD FOR MINIMIZING DATA RECOVERY WINDOW - A computer-based system includes a backup server, a production server, a recovery agent that executes on the production server, a database on the production server, a backup database on the backup server, and a meta data file on the backup server. The meta data file includes file names, a file directory, and file attributes. The system is configured to copy the metadata file from the backup server to a production server. When the copying of the metadata file from the backup server to the production server is complete, and before or during a time period in which backup data is copied from the backup server to the production server, the system is configured to receive a request from the production server to restore a file from the backup server with a higher priority than other files on the backup server. | 04-03-2014 |
20140089916 | CENTRALIZED, POLICY-DRIVEN MAINTENANCE OF STORAGE FOR VIRTUAL MACHINE DISKS (VMDKS) AND/OR PHYSICAL DISKS - In a method of operating a computing system, a disk image corresponding to a production managed machine is mounted on a service managed machine that performs operations distinct from those performed by the production managed machine in providing a computing service. The disk image is scanned at the service managed machine to determine a corrective action to be performed with respect to the disk image, and performance of the corrective action for the disk image of the production managed machine is initiated at the service managed machine. Related systems and computer program products are also discussed. | 03-27-2014 |
20140089901 | EMBEDDING PERFORMANCE MONITORING INTO MASHUP APPLICATION DEVELOPMENT - Computer systems, methods and program products can facilitate embedding performance monitoring into a mashup application that is being created in a mashup application development environment. A mashup application analyzer identifies mashup application performance monitors that are applicable to a mashup application that is being created in a mashup application development environment. An instructor is provided to instruct the mashup application development environment to embed selected ones up of the performance monitors into the mashup application that is being created in the mashup application development environment, responsive to a selection from the performance monitors. A provisioner instructs the mashup application development environment how to provision the selected ones of the mashup application performance monitors in the mashup application that is being created in the mashup application development environment, responsive to a selection of provisioning options for the selected ones of the mashup application performance monitors. | 03-27-2014 |
20140082156 | MULTI-REDUNDANT SWITCHABLE PROCESS POOLING FOR CLOUD IT SERVICES DELIVERY - A system, apparatus, method, and computer program product for providing multi-redundant switchable process pooling cloud IT service delivery with one or more containers are disclosed. The containers comprise one or more processes that are configured to provide the at least one service; one or more adapters that are configured to connect the one or more processes to one or more appliances, applications, and other services that are required to provide the at least one service; a container specification that identifies the one or more appliances, applications, and other services that are required to provide the at least one service; and one or more configuration scripts that, when executed by the processor, are configured to connect the one or more processes to the one or more appliances, application, and other services identified by the container specification utilizing the one or more adapters. | 03-20-2014 |
20140082155 | USER INTERFACE WITH CONFIGURATION, REGISTRATION, AND RUNTIME SELECTION OF VIEWS - A method, system and computer program product for providing a configurable user interface comprises receiving, by a server computer, a request for information to be rendered in a user interface; and in response to the request, sending, by the server computer, the information to be rendered and an identifier related to one of a plurality of user interface components. Also, in response to the request, the server computer sends a registry of the plurality of user interface components, wherein the registry comprises a respective entry for each of the plurality of user interface components. More particularly, the respective entry for a particular one of the plurality of user interface components comprises: a) a location of a configuration associated with the particular one user interface component; and b) a plurality of attributes and corresponding attribute values associated with the particular one user interface component. | 03-20-2014 |
20140082131 | AUTOMATICALLY CONFIGURED MANAGEMENT SERVICE PAYLOADS FOR CLOUD IT SERVICES DELIVERY - A system, apparatus, method, and computer program product for automatically configuring management service payloads for cloud IT service delivery are disclosed. A container that provides the cloud IT service comprises a container specification that specifies the payloads that are required to implement the at least one service provided by that container and that comprises automation scripts for downloading and configuring those payloads. And that container is implemented by reading the container specification, invoking the automation scripts to download the payloads that are required to implement the at least one service, and invoking the automation scripts to link the downloaded payloads to the one or more containers. | 03-20-2014 |
20140081951 | MANAGEMENT OF PACKAGE DELIVERY - Apparatuses, Methods and programs are provided. A method may comprise receiving a first request to verify an identifier associated with a destination from a first requester, responding to the request with a response, the response indicating an existence of a physical address associated with the identifier, the response further comprising a list of authorized entities authorized to access information specifying the physical address, receiving a second request from a second requester to access information specifying the physical address associated with the identifier, determining if the second requester is authorized to have access to information specifying the physical address by analyzing the list of authorized entities corresponding to the identifier; and providing the physical address to the second requester if the second requester is authorized. | 03-20-2014 |
20140081684 | SYSTEM AND METHOD FOR PROACTIVE OPTIMIZATION OF SELF-ACTIVATED SERVICES - A method includes monitoring a service provided to a consumer to determine an actual quality attribute of the service provided to the consumer. The method further includes comparing a potential quality attribute of an alternative service with the actual quality attribute of the service provided to the consumer to determine a difference between the potential quality attribute and the actual quality attribute. In addition, the method includes comparing the difference between the potential quality attribute and the actual quality attribute with a potential action preference of the consumer. The method also includes performing an action according to the potential action preference in response to determining that the difference between the potential quality attribute and the actual quality attribute satisfies a specific criterion defined in the potential action preference. | 03-20-2014 |
20140075494 | MANAGING SECURITY CLUSTERS IN CLOUD COMPUTING ENVIRONMENTS USING AUTONOMOUS SECURITY RISK NEGOTIATION AGENTS - A method includes receiving at a similarity arbitrator information about a security policy of a candidate virtual machine that is proposed to be included in a cluster of virtual machines, comparing the security policy of the candidate virtual machine to the security policies of a plurality of virtual machines in the cluster, and in response to the comparison, recommending that a virtualization environment manager exclude the candidate virtual machine from the cluster or include the candidate virtual machine in the cluster. Related systems and computer program products are also disclosed. | 03-13-2014 |
20140068335 | DYNAMIC LOAD CALCULATION AND PREDICTIVE SCALING - A system, apparatus, method, and computer program product for dynamically loading IT products and scaling those loads in a predictive manner are disclosed. Dynamic loading and scaling is performed by generating a load on a computing product with one or more first load generators, increasing the load over time until the first load generators reach their capacity for generating load, monitoring the capacity of the first load generators as the load is increased, provisioning one or more second load generators to generate additional load as any of the first load generators approaches its capacity, increasing the load generated by the second load generators over time until the one or more second load generators reach their capacity for generating load or the computing product reaches a performance goal, and continuing to provision second load generators until the computing product reaches the performance goal. | 03-06-2014 |
20140068271 | METHOD AND SYSTEM FOR MULTIPLE PASSCODE GENERATION - This invention relates to a method and a system for generating user passcodes for each of a plurality of transaction providers from a mobile user device. A method and system for activating a plurality of passcode generators on a user device configured with a passcode application installed on the user device is provided. Each of the passcode generators may correspond to a different user account or transaction provider, such that each passcode generator provides a user passcode configured for the corresponding account or transaction provider. One or more of the passcode generators may include a passcode generating algorithm and a passcode key. Access to one or more of the passcode generators may require providing a PIN or a challenge. | 03-06-2014 |
20140067864 | FILE ACCESS FOR APPLICATIONS DEPLOYED IN A CLOUD ENVIRONMENT - A method of operating a virtual computer system including a file access interceptor and multiple virtual machines that are logically arranged in a virtualization environment that is managed by a virtualization environment manager is provided. The method includes reading file settings definitions that include identifications and properties of files that are configured to be accessed by a computer application, replacing operations of a file interface in the computer application using with file access interceptor operations that use the file settings to decouple file attributes from the computer application, managing file access via the file access interceptor operations to provide data file storage and read access to the files, and synchronizing file actions in each of a plurality of instances of the files. Related systems and computer program products are disclosed. | 03-06-2014 |
20140067683 | SYSTEM AND METHOD FOR GENERATING A DYNAMIC CARD VALUE - A method and system is provided for generating a dynamic card value (DCV) from a mobile user device for use in a transaction between a user cardholder and a transaction provider. The DCV may be configured for use as a card verification value (CVV), also known as a card security code (CSC), a primary account number (PAN), or a portion of a PAN. The DCV may be generated using a DCV generator which may include an algorithm and a DCV generation key. The DCV generation key may be camouflaged. Obtaining a DCV from the user device may require inputting a PIN, a device identifier, a challenge or transaction information. The DCV may be used for any transaction requiring the input of a user identification number and a verification value, including, credit card transactions, debit card transactions, online or telephonic transactions. | 03-06-2014 |
20140059528 | HOT ROLLBACK OF UPDATED AGENT - Technology is disclosed herein for managing versions of an Agent associated with an application. Code for the Agent can be updated, and subsequently rolled back without being disruptive to the application. | 02-27-2014 |
20140059527 | INJECTION OF UPDATED CLASSES FOR A JAVA AGENT - Technology is disclosed for updating an Agent. One embodiment comprises running the Agent for the Application while the Application is also running. The Agent is associated with an identified source of code for the Agent. The code for the Agent is updated, and the updated Agent is run with the Application. | 02-27-2014 |
20140059340 | PERIMETER ENCRYPTION METHOD AND SYSTEM - A method and system for consistent format preserving encryption (C-FPE) are provided to protect data while the data is in a domain while allowing encrypted data to be treated inside the domain as if it were the unencrypted data. The method includes inserting a coupling into a data flow at a perimeter of the domain, and translating a data element from an unprotected data element to a protected data element using the coupling such that the data element is a protected data element within the domain. | 02-27-2014 |
20140057231 | BREAK-FIX SIMULATOR - A system, apparatus, method, and computer program product for implementing at least one break-fix simulation are disclosed. A processor implements the at least one break-fix simulation by invoking a virtualization of a product that is configured to provide a service, executing one or more scripts that are configured to break the virtualization of the product so that at least a portion of the service fails, receiving first input via a user interface that is configured to access one or more tools for restoring the at least a portion of the service to working order, and restoring the at least a portion of the service to working order with the one or more tools utilizing the first input. | 02-27-2014 |
20140053226 | SELF-ADAPTIVE AND PROACTIVE VIRTUAL MACHINE IMAGES ADJUSTMENT TO ENVIRONMENTAL SECURITY RISKS IN A CLOUD ENVIRONMENT - A computer system includes a security coordinator configured to be communicatively coupled to a plurality of managed machines deployed in a same computing environment and managed by an environment manager. The security coordinator is configured to detect a security condition with respect to a first one of the managed machines, and to automatically initiate modification of a second one of the managed machines in the same computing environment responsive to detection of the security condition. The security coordinator is configured to initiate the modification of the second one of the managed machines prior to occurrence of a security condition therein and prior to action by the environment manager with respect to the second one of the managed machines in response to the detected security condition. | 02-20-2014 |
20140047096 | SYSTEM AND METHOD FOR ADAPTIVE BASELINE CALCULATION - A method includes collecting, as data points, variable data associated with a monitored parameter. The method includes determining whether one or more of a first criterion and a second criterion is satisfied. The first and second criteria are satisfied based on a first quantity of the data points and a second quantity of data points in a selective subset of the data points, respectively. The method includes estimating an approximate baseline value for the monitored parameter in a first manner by utilizing each data point of a portion of the data points in response to determining that the first criterion is satisfied and the second criterion is not satisfied, and in a second manner by determining a second baseline value utilizing each data point of a portion of the selective subset of the data points in response to determining that the first criterion and the second criterion are both satisfied. | 02-13-2014 |
20140047000 | SYSTEMS AND METHODS FOR THROTTLING POLLING - Throttling polling may include sending a request to an agent device and determining whether a response to the sent request is successfully received from the agent device. A result of the determination may be stored in a memory and associated with the agent device. Further, a success rate is calculated for the agent device based on a plurality of the results. A metric related to the sent request and a subsequently sent request is adjusted for the agent device in accordance with an algorithm based on the calculated success rate for the agent device. The metric may be an amount of time between the sent request and a subsequently sent request for the agent device or a number of subsequently sent requests for the agent device. | 02-13-2014 |
20140046950 | SYSTEMS AND METHODS FOR EFFICIENT PAGING OF DATA - Paging of data includes querying a table of data to determine an item identifier for each item in the table. An index table including an index identifier column of sequential integers and a corresponding item identifier column for each item in the table is generated and stored in a memory. A page index table including the item identifier that corresponds to a first index identifier and each item identifier that corresponds to one plus a pagesize multiple of the index identifier is generated and stored in a memory. A desired page of data is retrieved using the determined item identifier corresponding to the first item on the desired page and either the determined item identifier corresponding to the first item on a next page after the desired page or a determined item identifier corresponding to the last item on the desired page. | 02-13-2014 |
20140046920 | System and Method for Analyzing Available Space in Data Blocks - A system and method is provided for determining an available space in one or more data blocks. A physical data storage area associated with one or more portions of a database may be determined. An available space in each data block of one or more data blocks in the physical data storage area may be determined. A number of new data rows that can be added to each data block may also be determined. | 02-13-2014 |
20140043985 | SYSTEM AND METHOD FOR LICENSE ENFORCEMENT FOR DATA CENTER MONITORING APPLICATIONS - Methods include receiving a threshold time to live (“TTL”) value associated with a license. The methods include determining a first TTL value based on the threshold TTL value. The methods include transmitting a polling request including the first TTL value from a polling device disposed at the network location to a network device. The first TTL value decreases each time the polling request transits through a node device. The methods include receiving a polling response from the network device if the first TTL value has not decreased to a predetermined value before the polling request is received by the network device. The methods include determining that the license permits communication between a monitoring device disposed at the network location and the network device in response to receiving the polling response. | 02-13-2014 |
20140040997 | SELF-DELETING VIRTUAL MACHINES - Securing a virtual machine to be executed on a host machine is accomplished by authenticating, by the virtual machine during an initial boot routine, an identity of the host machine. If the identity does not match a predetermined value, then authenticating the identity of the host machine fails and data associated with the virtual machine is deleted. | 02-06-2014 |
20140040257 | DASHBOARD VIEWS OF TASK ACTIVITY - Various embodiments illustrated and described herein provide include at least one of systems, methods, and software providing dashboard views of task activity data. Some embodiments include servicing dashboard view requests by retrieving a dashboard configuration that identifies at least one chart template of a chart to be included in the dashboard view and identifying user and activity data to populate respective charts generated based on the respective at least one chart templates. Such embodiments further include retrieving each of the at least one chart template and the respective user and user activity data to populate respective at least one chart. The retrieved chart templates are then processed to incorporate the respective user and user activity data into a respective chart rendering generated based thereon, and each chart rendering is added to a dashboard view data structure which may then be transmitted to a requestor for viewing. | 02-06-2014 |
20140040147 | SECURE AND CONVENIENT MOBILE AUTHENTICATION TECHNIQUES - Security and convenience are provided by a system, apparatus, method, and computer program product that stores two or more encryption keys that correspond to two or more levels of authentication. The encryption keys may be encrypted and decrypted utilizing an endorsement key and trusted computing techniques. Or the encryption keys may be stored in a secure manner utilizing key protection techniques, such as cryptographic camouflaging. A first encryption key is recovered automatically for the first level of authentication. And input is requested to recover the second encryption key for the second level of authentication. | 02-06-2014 |
20140026231 | SELF-GENERATION OF VIRTUAL MACHINE SECURITY CLUSTERS - A method of operating a virtual computing system includes receiving at a security controller security data corresponding to a candidate virtual machine that is proposed to be included in a virtualization environment managed by a virtualization environment manager, comparing the security data of the candidate virtual machine to security data of other virtual machines in the virtualization environment, and in response to the comparison, recommending that the virtualization environment manager exclude the candidate virtual machine from the virtualization environment. Related systems and computer program products are disclosed. | 01-23-2014 |
20140019797 | RESOURCE MANAGEMENT IN EPHEMERAL ENVIRONMENTS - A system executes a method that includes monitoring the systems that provide the provisioning of computing infrastructure resources to provide services for services executing on the resources, to monitor provisioning changes on the infrastructure resources. It further uses the information gathered by the monitoring of the provisioning resource(s) to provide a tag, which denotes the current assignment of each resource with a service name and an instance of the service associated with the resource identifier and a time stamp, and storing this a relational database, as a part of the record of the state, or performance data for that resource during that time interval. | 01-16-2014 |
20140019699 | METHODS AND SYSTEMS FOR IMPLEMENTING TIME-LOCKS - A computer accesses a storage device. The computer includes a processor and a non-transitory computer-readable storage medium storing computer-readable instructions, when executed by the processor, the computer-readable instructions cause the computer to perform: storing a first time-lock and a second time-lock in the storage device; and, when both the first time-lock and the second time-lock are successfully stored in the storage device by the computer, to obtain an exclusive access privilege during a particular time interval associated with the first time-lock and the second time-lock. | 01-16-2014 |
20140019617 | MANAGING ACCESS TO RESOURCES OF COMPUTER SYSTEMS USING CODIFIED POLICIES GENERATED FROM POLICIES - A computer system is disclosed that includes a policy repository, a policy codifier, and a policy manager. The policy repository contains policies. The policy codifier generates codified policies from the policies. The policy manager manages access to resources of the computer system responsive to the codified policies. Related methods and computer program products for operating computer systems are also disclosed. | 01-16-2014 |
20140019611 | DETERMINING SERVICE DEPENDENCIES FOR CONFIGURATION ITEMS - Systems, apparatus, methods, and computer program products for determining which of a plurality of services provided by a production environment depend on which of a plurality of configuration items in the production environment are disclosed. A processor executes computer-readable code to obtain status data for the plurality configuration items utilizing the one or more monitoring tools, integrate the status data for the plurality of configuration items to generate a model of the production environment that identifies the plurality of configuration items in the production environment and their dependencies on one another, and utilize the status data for the plurality of configuration items to identify a channel of configuration items for each of the plurality of services, wherein the channel for each of the plurality of services comprises two or more of the plurality of configuration items that currently are being utilized to provide that service. | 01-16-2014 |
20140019335 | SYSTEMS AND METHODS FOR SELF-SERVICE CLOUD-BASED ARENAS FOR INFORMATION TECHNOLOGY-DRIVEN SITUATIONAL MANAGEMENT - A method includes receiving information from an information provider. The information received from the information provider may comprise metrics collected from a sensor that have been manipulated, meta-data that describes the manipulation, quality information associated with the metrics, and semantic information associated with the metrics. The method includes a process of transforming and correlating the information received from the information provider, such that the information becomes transformed and correlated information. The method includes a process of transmitting the transformed and correlated information to a registered information consumer. The method includes a process of establishing a first account pursuant to the information received from the information provider. The method includes a process of establishing a second account pursuant to the transformed and correlated information transmitted to the registered information consumer. The method includes a process of applying a payment policy based on the first account and the second account. | 01-16-2014 |