-
公开(公告)号:US11907087B2
公开(公告)日:2024-02-20
申请号:US16507809
申请日:2019-07-10
Applicant: International Business Machines Corporation
Inventor: David C. Reed , Philip R. Chauvet , Esteban Rios , Thomas C. Reed
CPC classification number: G06F11/2069 , G06F3/065 , G06F3/067 , G06F3/0614 , G06F3/0653
Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method automatically sends, from the secondary system to the primary system, one or more commands that are designed to address the abnormal activity. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US11614868B2
公开(公告)日:2023-03-28
申请号:US16587377
申请日:2019-09-30
Applicant: International Business Machines Corporation
Inventor: David C. Reed , Kenneth J. Owin , Philip R. Chauvet , Tabor Powelson
Abstract: A method for preventing data overlays in a data storage system is disclosed. In one embodiment, such a method detects a write operation directed to a storage area of a data storage system. The write operation includes one or more of a format write operation and a full-track write operation. Upon detecting the write operation, the method determines a data set that is associated with the storage area. The method analyzes metadata associated with the data set to determine whether the storage area contains valid data. In the event the storage area contains valid data, the method performs a data protection operation that prevents execution of the write operation and/or logs details of the write operation. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US11061750B2
公开(公告)日:2021-07-13
申请号:US16124153
申请日:2018-09-06
Applicant: International Business Machines Corporation
Inventor: Philip R. Chauvet , David C. Reed , Franklin E. McCune , Keith R. Smith
Abstract: A method for analyzing data corruption is disclosed. In one embodiment, such a method includes identifying a data set to analyze for data corruption. This data set resides on tracks of a volume. The method further determines, from control information associated with the volume, on which tracks of the volume the data set resides. The method reads content of the data set without opening the data set by performing full-track reads of the tracks. The method further determines an expected format of the content by analyzing the control information. An actual format of the content is compared to the expected format to identify areas of the data set that may be corrupt. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US20210011998A1
公开(公告)日:2021-01-14
申请号:US16507736
申请日:2019-07-10
Applicant: International Business Machines Corporation
Inventor: David C. Reed , Franklin E. McCune , Philip R. Chauvet , Thomas C. Reed
Abstract: A method for detecting abnormal activity on a computing system is disclosed. In one embodiment, such a method includes observing, over a period of time, activity occurring on a computing system. The method establishes, for the computing system based on the observations, a normal range associated with the activity. The method further monitors the computing system for the activity and documents activity on the computing system that falls outside the normal range. In certain embodiments, when activity is detected on the computing system that falls outside the normal range, the method gathers or compiles additional information about the activity, notifies a user, and/or generates a report that describes the abnormal activity and events surrounding the abnormal activity. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US10762240B2
公开(公告)日:2020-09-01
申请号:US16108606
申请日:2018-08-22
Applicant: International Business Machines Corporation
Inventor: David C. Reed , Max D. Smith , Philip R. Chauvet , Franklin E. McCune
IPC: G06F17/00 , G06F21/62 , G06F7/58 , G06F16/11 , G06F16/901
Abstract: Apparatuses, methods, and computer program products are provided for anonymizing a data set having an index component and a data component. In certain embodiments, the apparatuses, methods and computer program products make a copy of the data set, removes personal information from the data component, modifies an index component key value with a random value, modifies a data component key value with the same random value, and maintains a data set structure of the index component and the data component.
-
公开(公告)号:US20190095473A1
公开(公告)日:2019-03-28
申请号:US15717814
申请日:2017-09-27
Applicant: International Business Machines Corporation
Inventor: Philip R. Chauvet , David C. Reed , Michael R. Scott
Abstract: A method includes receiving a request to store a record in a base data set and determining whether the base data set can accommodate the record. In the event the base data set cannot accommodate the record, the method automatically creates an overflow data set to accommodate the record, stores the record in the overflow data set, and updates an index of the base data set to include a key associated with the record. The key points to the overflow data set as containing the record. In certain embodiments, the base data set and overflow data set are both keyed VSAM data sets. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US10169394B2
公开(公告)日:2019-01-01
申请号:US14297128
申请日:2014-06-05
Applicant: International Business Machines Corporation
Inventor: Philip R. Chauvet , Franklin E. McCune , David C. Reed , Max D. Smith
Abstract: A method, system, and computer program product for managing data sets of a storage facility is disclosed. The method, system, and computer program product include determining, by analyzing a first data set, that the first data set includes a first record having padded data. To identify the padded data, the method, system, and computer program product include comparing at least a portion of the first record of the first data set with a second record of a second data set. Next, the method, system, and computer program product include removing, from the first record of the first data set, the padded data.
-
公开(公告)号:US10042694B2
公开(公告)日:2018-08-07
申请号:US15257347
申请日:2016-09-06
Applicant: International Business Machines Corporation
Inventor: Philip R. Chauvet , Franklin E. McCune , David C. Reed , Esteban Rios
Abstract: A method for validating control blocks in memory includes monitoring for operations configured to obtain storage space in memory. The method examines the storage space that has been obtained to identify control blocks stored in the storage space. These control blocks are then analyzed to determine whether the control blocks are valid. In certain embodiments, this may be accomplished by comparing the content of the control blocks to information in a validation table that indicates possible values and ranges of values for fields in the control blocks. If a control block is valid, the method records a date and time when the control block was validated. If a control block is not valid, the method generates a message indicating that the control block is not valid. A corresponding system and computer program product are also disclosed.
-
公开(公告)号:US20180196938A1
公开(公告)日:2018-07-12
申请号:US15913761
申请日:2018-03-06
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Philip R. Chauvet , Joseph V. Malinowski , David C. Reed , Max D. Smith
CPC classification number: G06F21/52 , G06F21/44 , G06F2221/2139
Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.
-
公开(公告)号:US20170337235A1
公开(公告)日:2017-11-23
申请号:US15157281
申请日:2016-05-17
Applicant: International Business Machines Corporation
Inventor: Philip R. Chauvet , Andrew E. Deiss , Kenneth J. Owin , David C. Reed
IPC: G06F17/30
CPC classification number: G06F16/185
Abstract: A method for tracking actions performed in association with a data set includes identifying multiple sources of historical information describing actions performed on the data set. The method periodically gathers this historical information from the multiple sources and compiles the historical information in a centralized repository. In certain embodiments, the method stores the historical information in the form of individual records associated with the data set. In the event any actions performed on the data set are the result of policies established for the data set, the method determines the policies associated with the actions where possible. The method includes these policies with the historical information in the centralized repository. A corresponding system and computer program product are also disclosed.
-
-
-
-
-
-
-
-
-