Abstract:
Binary files of one or more applications are scanned to identify database command templates contained therein, wherein each DB command template comprises a sequence of elements including one or more input markers. Once the DB command templates are identified, they are copied to a memory. While in the memory, the command templates can be used to identify abnormal DB commands. In one embodiment of a method, a first template is generated in response to receiving a first DB command from a computer system, wherein the first DB command comprises a sequence of elements including one or more user input values. The first template can be generated by replacing all user input values in the received first DB command with input markers. Thereafter the first template is compared to one or more of the DB command templates copied to the memory.
Abstract:
A method and apparatus for detecting malicious software activity, using at least one processor, based on an Internet resource information database in memory is described. In one embodiment, a method for detecting malicious software activity, using at least one processor, based on an Internet resource information database in memory includes processing Internet activity to determine source and time information associated with at least one application download, comparing the Internet resource information database with the source and time information associated with the at least one application download to identify at least one suspicious application, and monitoring execution of the at least one suspicious application.
Abstract:
The embodiments provide a data processing apparatus for automated blueprint assembly. The data processing apparatus includes a micro-blueprint assembler configured to receive a request for automated blueprint assembly for assembling an application, where the request specifies at least one feature, and a model database configured to store model data. The model data includes a plurality of classes and class properties. The data processing apparatus further includes a micro-blueprint database configured to store a plurality of micro-blueprints. Each micro-blueprint corresponds to a functional component of a stack element or service tier, and the functional component is annotated with one or more classes of the plurality of classes and at least one required capability and available capability. The micro-blueprint assembler is configured to generate at least one application blueprint based on the model data and the plurality of micro-blueprints according to the request.
Abstract:
The embodiments provide a data processing apparatus for automated blueprint assembly. The data processing apparatus includes a micro-blueprint assembler configured to receive a request for automated blueprint assembly for assembling an application, where the request specifies at least one feature, and a model database configured to store model data. The model data includes a plurality of classes and class properties. The data processing apparatus further includes a micro-blueprint database configured to store a plurality of micro-blueprints. Each micro-blueprint corresponds to a functional component of a stack element or service tier, and the functional component is annotated with one or more classes of the plurality of classes and at least one required capability and available capability. The micro-blueprint assembler is configured to generate at least one application blueprint based on the model data and the plurality of micro-blueprints according to the request.
Abstract:
A method and apparatus for providing a utility based revenue stream for a security software subscription at a client computer is provided. In one embodiment, the method for providing a utility based revenue stream for a security software subscription at a client computer comprises analyzing a security activity log based on a utility metric to produce an analysis result and determining a value for the security software subscription based on the analysis result.
Abstract:
A method and apparatus for cloning a configuration of a computer in a datacenter is described in the present application. In one embodiment, the method comprises accessing a configuration snapshot for a computer in a data center, wherein the configuration snapshot defines at least one configuration attribute for at least one computer resource and indicates an operating system and at least one software application and provisioning a hardware computer in the data center based on the configuration snapshot.
Abstract:
In an ASP server farm, requests to use an application are directed to a particular executing instance of the application (or an appropriate component thereof) that is identified as being the least loaded of the available such instances of the application or its component. The number of such instances is dynamically increased or decreased in response to the number of requests for the application or components thereof. Requests may be directed (in accordance with the first aspect) or the instances adjusted (in accordance with a second aspect) on a per client-basis, in which instances of the application and/or components thereof are reserved for the use of a user or a particular group of users. Operation in this manner facilitates compliance with service agreements with respective users or groups of users.
Abstract:
A peer-to-peer protocol is based on the use of global timestamps and client priorities in serializing modifications to a shared workspace of real-time collaboration. The method caters to dynamic clients wherein a client can leave or join an ongoing collaboration session as long as there is always at least one client present/remaining in the collaboration session. The method can support multiple definitions of a modification, including partitioning-based definitions, wherein the method provides full support for locking of partitions, and a full treatment of inter-partition synchronization via a modification definition over multiple partitions. The method is capable of utilizing the many standard methods of creating a global, distributed, synchronized clock for the global timestamps utilized by it. The method is rollback-based for correcting tentative but incorrect serializations, and provides additional backup in terms of checkpoints for additional safety and for the support of lightweight, pervasive clients. The method includes many optimizations for efficiency, and includes a method of switching to and back from distributed server-based serialization for the periods when the network response is better suited to a distributed server than the peer-to-peer protocol.