会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Virtual logical volume for overflow storage of special data sets
    • 用于特殊数据集溢出存储的虚拟逻辑卷
    • US08909891B2
    • 2014-12-09
    • US13188142
    • 2011-07-21
    • David Charles ReedMax Douglas SmithKyle Barret DudgeonEsteban Rios
    • David Charles ReedMax Douglas SmithKyle Barret DudgeonEsteban Rios
    • G06F12/08G06F12/02G06F12/10G06F12/00
    • G06F12/08G06F3/0614G06F3/0665G06F3/0689G06F12/00G06F12/02G06F12/023G06F17/30312
    • Method embodiments for facilitating overflow storage of special data sets that reside on a single logical volume are provided. A virtual logical volume is created from unallocated memory units across a plurality of logical volumes in a volume group. The virtual logical volume appears the same as any one of the logical volumes in the volume group to an external client. Upon receipt of a special data set that must reside in a single logical volume, an attempt is first made to allocate the special data set to one of the logical volumes in the volume group. If that allocation attempt fails, the special data set is allocated to the virtual logical volume. The virtual logical volume may be created only upon the failure to allocate the special data set to one of the logical volumes, and may be destroyed if sufficient space in one of the logical volumes is freed up to transfer the special data set. Creation of the virtual logical volume may be reserved for only critical special data sets whose failure would result in a storage system outage.
    • 提供了用于促进驻留在单个逻辑卷上的特殊数据集的溢出存储的方法实施例。 虚拟逻辑卷是通过卷组中多个逻辑卷的未分配内存单元创建的。 虚拟逻辑卷与卷组中的任何一个逻辑卷显示为外部客户端相同。 在收到必须驻留在单个逻辑卷中的特殊数据集之后,首先尝试将特殊数据集分配给卷组中的一个逻辑卷。 如果分配尝试失败,则将特殊数据集分配给虚拟逻辑卷。 只有在将特殊数据集分配给其中一个逻辑卷时,才能创建虚拟逻辑卷,并且如果其中一个逻辑卷中的足够空间被释放以传输特殊数据集,则可能会被破坏。 虚拟逻辑卷的创建可能仅为关键的特殊数据集保留,这些特殊数据集的故障将导致存储系统中断。
    • 3. 发明授权
    • Multiple enhanced catalog sharing (ECS) cache structure for sharing catalogs in a multiprocessor system
    • 多增强目录共享(ECS)缓存结构,用于在多处理器系统中共享目录
    • US08799569B2
    • 2014-08-05
    • US13448884
    • 2012-04-17
    • Eric J. HarrisFranklin Emmert McCuneDavid Charles ReedMax Douglas Smith
    • Eric J. HarrisFranklin Emmert McCuneDavid Charles ReedMax Douglas Smith
    • G06F15/80
    • G06F17/30165
    • Various method and system embodiments for facilitating catalog sharing in multiprocessor systems use multiple ECS cache structures to which catalogs are assigned based on an attribute such as SMS storage class or a high level qualifier (HLQ) (e.g. an N-to-1 mapping) or each individual catalog (e.g. a 1-to-1 mapping). When maintenance is performed on an ECS shared catalog, the multiple ECS cache structure requires only those catalogs associated with a particular ECS cache structure be disconnected. Any catalogs in the structure that are not involved in or affected by the maintenance may be temporarily or permanently moved to a different ECS cache structure. As a result, VVDS sharing is only required for those catalogs on which maintenance is being performed or that remain associated with that ECS cache structure during maintenance. This reduces I/O activity to the DASD, and results in a significant overall performance improvement.
    • 用于促进多处理器系统中的目录共享的各种方法和系统实施例使用基于诸如SMS存储类别或高级限定符(HLQ)的属性(例如,N到1映射)的多个ECS高速缓存结构来分配目录, 每个单独的目录(例如1对1映射)。 当在ECS共享目录上执行维护时,多个ECS缓存结构只需要断开与特定ECS缓存结构相关联的目录。 不涉及或受维护影响的结构中的任何目录可能暂时或永久地移动到不同的ECS缓存结构。 因此,只有在进行维护的目录或维护期间与该ECS缓存结构保持关联的目录中才需要VVDS共享。 这样可以降低DASD的I / O活动,从而提高整体性能。
    • 4. 发明授权
    • Session-controlled-access of client data by support personnel
    • 会话控制由支持人员访问客户端数据
    • US08776257B2
    • 2014-07-08
    • US13453694
    • 2012-04-23
    • David Charles ReedJeffrey Thomas SheridanMax Douglas Smith
    • David Charles ReedJeffrey Thomas SheridanMax Douglas Smith
    • H04L29/06
    • H04L9/0866H04L63/061H04L63/0876H04L2209/56H04M3/51
    • A method for controlling access to client data by support providers is disclosed herein. In one embodiment, such a method includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted.
    • 本文公开了一种用于控制由支持提供者访问客户端数据的方法。 在一个实施例中,这种方法包括响应于接收到来自客户端的帮助请求而在服务器计算机上发起会话,该会话具有与其相关联的客户端数据。 为会话生成会话密钥。 会话密钥包括对应于受让人的会话标识符和支持提供商标识符。 会话密钥还可以包括与客户端对应的客户端标识符。 访问客户端数据的请求包括包括会话标识符和支持提供者标识符的受理人密钥,并且如果需要,可能需要客户端标识符。 将受理人密钥与会话密钥进行比较。 如果在受让人密钥中的标识符和会话密钥之间发现对应关系,则允许访问。
    • 5. 发明授权
    • Session-controlled-access of client data by support personnel
    • 会话控制由支持人员访问客户端数据
    • US08667606B2
    • 2014-03-04
    • US12843013
    • 2010-07-24
    • David Charles ReedJeffrey Thomas SheridanMax Douglas Smith
    • David Charles ReedJeffrey Thomas SheridanMax Douglas Smith
    • H04L29/06
    • H04L9/0866H04L63/061H04L63/0876H04L2209/56H04M3/51
    • A method for controlling access to client data by support providers includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted. A corresponding apparatus and computer program product are also described.
    • 用于由支持提供者控制对客户端数据的访问的方法包括响应于接收到来自客户端的帮助请求而启动在服务器计算机上的会话,所述会话具有与其相关联的客户端数据。 为会话生成会话密钥。 会话密钥包括对应于受让人的会话标识符和支持提供商标识符。 会话密钥还可以包括与客户端对应的客户端标识符。 访问客户端数据的请求包括包括会话标识符和支持提供者标识符的受理人密钥,并且如果需要,可能需要客户端标识符。 将受理人密钥与会话密钥进行比较。 如果在受让人密钥中的标识符和会话密钥之间发现对应关系,则允许访问。 还描述了相应的装置和计算机程序产品。
    • 7. 发明授权
    • Early collection of diagnostic information
    • 早期收集诊断信息
    • US08549360B2
    • 2013-10-01
    • US12986630
    • 2011-01-07
    • Joel Leslie MasserDavid Charles ReedMax Douglas Smith
    • Joel Leslie MasserDavid Charles ReedMax Douglas Smith
    • G06F11/00
    • G06F11/0778G06F11/0709G06F11/0727G06F11/0757G06F11/0781
    • Generation of diagnostic information of a computer-implemented system is made early so that the data is closer to the causation of errors or for performance analysis. At least one selected activity of the system is monitored from initiation of the activity, and the monitoring is for successful completion. Early collection of diagnostic information is provided by comparing the time of the activity without successful completion to an initial trigger, where the initial trigger is less than the time period for a time-out for the activity. If the time of the activity without successful completion exceeds the initial trigger, diagnostic information is collected and an initial dump of the diagnostic information is taken. In one example, a notification that the dump of diagnostic information has been taken is directed to the host or diagnostic terminal.
    • 早期生成计算机实现的系统的诊断信息,使得数据更接近错误的原因或进行性能分析。 从活动的开始监测系统的至少一个选定的活动,并且监测是成功完成的。 通过比较没有成功完成的活动时间到初始触发,提供诊断信息的早期收集,其中初始触发小于活动超时的时间段。 如果没有成功完成的活动时间超过初始触发,则收集诊断信息并采取诊断信息的初始转储。 在一个示例中,已经取得了诊断信息的转储的通知被引导到主机或诊断终端。
    • 9. 发明授权
    • Variable-length record, corruption recovery apparatus, system, and method
    • 可变长度记录,破坏恢复装置,系统和方法
    • US08370405B2
    • 2013-02-05
    • US12355981
    • 2009-01-19
    • Joseph Vincent MalinowskiDavid Charles ReedJeffrey Thomas SheridanMax Douglas Smith
    • Joseph Vincent MalinowskiDavid Charles ReedJeffrey Thomas SheridanMax Douglas Smith
    • G06F12/00G06F17/30
    • G06F11/0763
    • A method for identifying records of variable length within a data block containing corrupted data is disclosed herein. In certain embodiments, such a method may include scanning backward from an end of a data block containing variable-length records. The backward scan may proceed, one record at a time, to identify a first span of good (i.e., non-corrupt) records. The method may further include scanning forward from a front of the data block, also proceeding one record at a time, to identify a second span of good records. The method may include identifying a problem region by identifying data that resides between the first span and the second span. The method may also include creating a new record between the first span and the second span that contains the problem region. A corresponding computer program product, apparatus, and system are also disclosed.
    • 本文公开了一种用于识别包含已损坏数据的数据块内的可变长度记录的方法。 在某些实施例中,这种方法可以包括从包含可变长度记录的数据块的末尾向后扫描。 可以进行向后扫描,一次记录一次,以识别第一个良好(即非腐败)记录。 该方法还可以包括从数据块的前面向前扫描,同时也一次进行一个记录,以识别良好记录的第二跨度。 该方法可以包括通过识别驻留在第一跨度和第二跨度之间的数据来识别问题区域。 该方法还可以包括在包含问题区域的第一跨度和第二跨度之间创建新记录。 还公开了相应的计算机程序产品,装置和系统。