Time filter

Source Type

New York, NY, United States

Computer Associates | Date: 2013-02-08

A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machines online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated.

A method, system and program product comprise communicating, to a server, a users request for a report comprising a name associated with a portfolio of patent applications, a first value indicating a time frame, and a second value indicating a period of time. The server is operable for using the name for extracting patent application data from databases to a second database and filtering the extracted data using the first value. The filtered data is organized by offices of filing, patent families, classifications, and status. Costs for patent applications associated with the filtered data are determined using the second value. Filing patterns are determined using the offices of filing and the patent families. Filing activity are determined using the classifications. Times to grant for the offices of filing are determined. At least one report is generated and received over the network.

Computer Associates | Date: 2012-03-19

Embodiments herein include systems, methods, software, and data structures to generate and render visualizations of configuration items (CIs) represented in a Configuration Management Database (CMDB). One embodiment includes receiving a request for a CI graph from a client including a focus CI identifier represented in a CMDB. The focus CI may be used to retrieve data of related CIs, the data including CI identifiers. A process is then executed for each retrieved CI identifier to retrieve CI data as a function of the received CI identifier and to build a node XML and an edge XML representation of relations between the CIs. This method also includes aggregating the node and edge XML representations into a single XML document and then translating the document into a markup language document capable of being rendered in a graphical user interface. The markup language document is then transmitted to the requestor.

Computer Associates | Date: 2012-01-20

According to one embodiment, a method for managing one or more virtual machines includes generating a request for at least one performance characteristic for at least one virtual machine, the at least one virtual machine being associated with a processing group, the processing group including one or more processing modules; receiving a response to the generated request for at least one performance characteristic for the at least one virtual machine; automatically determining whether an increase in the number of processing modules included in the processing group is required, by analyzing the received response to the generated request; and, in response to a determination that an increase in the number of processing modules included in the processing group is required, automatically adding at least one processing module to the processing group.

Computer Associates | Date: 2013-10-14

A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP.

Discover hidden collaborations