Remote health monitoring in data replication environments

    公开(公告)号:US11907087B2

    公开(公告)日:2024-02-20

    申请号:US16507809

    申请日:2019-07-10

    Abstract: A method for more effectively utilizing computing resources in a data replication environment is disclosed. In one embodiment, such a method detects, at a primary system, activity occurring on the primary system. This activity is recorded in systems logs located at the primary system. The method automatically mirrors the system logs from the primary system to a secondary system that is in a mirroring relationship with the primary system. The system logs are analyzed at the secondary system. In the event abnormal activity is detected in the system logs at the secondary system, the method automatically sends, from the secondary system to the primary system, one or more commands that are designed to address the abnormal activity. A corresponding system and computer program product are also disclosed.

    Data set overlay protection
    32.
    发明授权

    公开(公告)号:US11614868B2

    公开(公告)日:2023-03-28

    申请号:US16587377

    申请日:2019-09-30

    Abstract: A method for preventing data overlays in a data storage system is disclosed. In one embodiment, such a method detects a write operation directed to a storage area of a data storage system. The write operation includes one or more of a format write operation and a full-track write operation. Upon detecting the write operation, the method determines a data set that is associated with the storage area. The method analyzes metadata associated with the data set to determine whether the storage area contains valid data. In the event the storage area contains valid data, the method performs a data protection operation that prevents execution of the write operation and/or logs details of the write operation. A corresponding system and computer program product are also disclosed.

    Corrupted track analyzer
    33.
    发明授权

    公开(公告)号:US11061750B2

    公开(公告)日:2021-07-13

    申请号:US16124153

    申请日:2018-09-06

    Abstract: A method for analyzing data corruption is disclosed. In one embodiment, such a method includes identifying a data set to analyze for data corruption. This data set resides on tracks of a volume. The method further determines, from control information associated with the volume, on which tracks of the volume the data set resides. The method reads content of the data set without opening the data set by performing full-track reads of the tracks. The method further determines an expected format of the content by analyzing the control information. An actual format of the content is compared to the expected format to identify areas of the data set that may be corrupt. A corresponding system and computer program product are also disclosed.

    ABNORMAL ACTIVITY DETECTION
    34.
    发明申请

    公开(公告)号:US20210011998A1

    公开(公告)日:2021-01-14

    申请号:US16507736

    申请日:2019-07-10

    Abstract: A method for detecting abnormal activity on a computing system is disclosed. In one embodiment, such a method includes observing, over a period of time, activity occurring on a computing system. The method establishes, for the computing system based on the observations, a normal range associated with the activity. The method further monitors the computing system for the activity and documents activity on the computing system that falls outside the normal range. In certain embodiments, when activity is detected on the computing system that falls outside the normal range, the method gathers or compiles additional information about the activity, notifies a user, and/or generates a report that describes the abnormal activity and events surrounding the abnormal activity. A corresponding system and computer program product are also disclosed.

    FULL DATA SET AVOIDANCE
    36.
    发明申请

    公开(公告)号:US20190095473A1

    公开(公告)日:2019-03-28

    申请号:US15717814

    申请日:2017-09-27

    Abstract: A method includes receiving a request to store a record in a base data set and determining whether the base data set can accommodate the record. In the event the base data set cannot accommodate the record, the method automatically creates an overflow data set to accommodate the record, stores the record in the overflow data set, and updates an index of the base data set to include a key associated with the record. The key points to the overflow data set as containing the record. In certain embodiments, the base data set and overflow data set are both keyed VSAM data sets. A corresponding system and computer program product are also disclosed.

    Managing data sets of a storage system

    公开(公告)号:US10169394B2

    公开(公告)日:2019-01-01

    申请号:US14297128

    申请日:2014-06-05

    Abstract: A method, system, and computer program product for managing data sets of a storage facility is disclosed. The method, system, and computer program product include determining, by analyzing a first data set, that the first data set includes a first record having padded data. To identify the padded data, the method, system, and computer program product include comparing at least a portion of the first record of the first data set with a second record of a second data set. Next, the method, system, and computer program product include removing, from the first record of the first data set, the padded data.

    Control block validator
    38.
    发明授权

    公开(公告)号:US10042694B2

    公开(公告)日:2018-08-07

    申请号:US15257347

    申请日:2016-09-06

    Abstract: A method for validating control blocks in memory includes monitoring for operations configured to obtain storage space in memory. The method examines the storage space that has been obtained to identify control blocks stored in the storage space. These control blocks are then analyzed to determine whether the control blocks are valid. In certain embodiments, this may be accomplished by comparing the content of the control blocks to information in a validation table that indicates possible values and ranges of values for fields in the control blocks. If a control block is valid, the method records a date and time when the control block was validated. If a control block is not valid, the method generates a message indicating that the control block is not valid. A corresponding system and computer program product are also disclosed.

    PROGRAMMING CODE EXECUTION MANAGEMENT
    39.
    发明申请

    公开(公告)号:US20180196938A1

    公开(公告)日:2018-07-12

    申请号:US15913761

    申请日:2018-03-06

    CPC classification number: G06F21/52 G06F21/44 G06F2221/2139

    Abstract: In one aspect of the present description, operations are described for detecting whether programming code of a first computer program has been modified by a second computer program. In one embodiment, the modification detecting includes registering a first section of programming code of the first computer program in a first registry data structure. To detect a modification, the registered first section of programming code may be validated. In one embodiment, the validating includes comparing the section of programming code actually located at the first memory address to the registered first section of programming code. In another aspect, various selectable remedial actions may be taken upon detecting modification of programming code of the first computer program. Other features and aspects may be realized, depending upon the particular application.

    LIFE CYCLE DATA SET REPOSITORY
    40.
    发明申请

    公开(公告)号:US20170337235A1

    公开(公告)日:2017-11-23

    申请号:US15157281

    申请日:2016-05-17

    CPC classification number: G06F16/185

    Abstract: A method for tracking actions performed in association with a data set includes identifying multiple sources of historical information describing actions performed on the data set. The method periodically gathers this historical information from the multiple sources and compiles the historical information in a centralized repository. In certain embodiments, the method stores the historical information in the form of individual records associated with the data set. In the event any actions performed on the data set are the result of policies established for the data set, the method determines the policies associated with the actions where possible. The method includes these policies with the historical information in the centralized repository. A corresponding system and computer program product are also disclosed.

Patent Agency Ranking