摘要:
Provided are a method, system, and article of manufacture, wherein in certain embodiments a determination is made as to whether a configuration indicator associated with a resource indicates a delayed configuration of the resource, wherein the resource is shared by a plurality of processing complexes via a bus, and wherein if the delayed configuration of the resource is indicated then the resource is prevented from being configured during initial program loads of the plurality of processing complexes. The resource is configured by only one of the of plurality of processing complexes that shares the resource, in response to determining that the configuration indicator associated with the resource indicates the delayed configuration of the resource.
摘要:
A data saving device, system, and method rapidly and deterministically saves data of a computer system. The device may mark data that must be saved when the computer is shut down. In certain embodiments, a boot control module detects a condition requiring a rapid deterministic data saving operation, such as a power failure and reboots the computer, deterministically terminating all existing processes. Additionally, the boot control module loads a data transfer kernel in place of a standard operating kernel used for normal operation. The data transfer kernel supports a set of processes exclusively dedicated to saving data. The data transfer kernel configures the computer and storage devices for the data transfer and saves the marked data with a minimum of interruptions from other processes. Also, the data transfer kernel may shut down the computer and the storage devices after transferring data.
摘要:
Provided are a method, system, and article of manufacture, wherein a plurality of processing nodes in a storage system are partitioned into a plurality of logical processing units, and wherein the plurality of logical processing units can respond to I/O requests from a host coupled to the storage system. At least two logical processing units are grouped, wherein data in a first storage coupled to a first logical processing unit of the least two logical processing units is mirrored by data in a second storage coupled to the second logical processing unit of the at least two logical processing units. In response to a failure of the first logical processing unit, an I/O request from the host is responded to via the second logical processing unit.
摘要:
An I/O enclosure module is provided with one or more I/O enclosures having a plurality of slots for receiving electronic devices. A host adapter is connected a first slot of the I/O enclosure module and is configured to connect a host to the I/O enclosure. A device adapter is connected to a second slot of the I/O enclosure module and is configured to connect a storage device to the I/O enclosure module. A flash cache is connected to a third slot of the I/O enclosure module and includes a flash-based memory configured to cache data associated with data requests handled through the I/O enclosure module. A primary processor complex manages data requests handled through the I/O enclosure module by communicating with the host adapter, device adapter, and flash cache to manage to the data requests.
摘要:
A mold assembly for insert-molding a heterogeneous object includes an upper mold and a lower mold. The upper mold includes a cavity for accommodating an insert object. The lower mold includes a rigid body and a resilient contact member for resting the insert object. The resilient contact member absorbs dimensional variations of the insert object during the insert molding process.
摘要:
Embodiments of the disclosure relate to archiving data in a storage system. An exemplary embodiment comprises making a flash copy of data in a source volume, compressing data in the flash copy wherein each track of data is compressed into a set of data pages, and storing the compressed data pages in a target volume. Data extents for the target volume may be allocated from a pool of compressed data extents. After each stride worth of data is compressed and stored in the target volume, data may be destaged to avoid destage penalties. Data from the target volume may be decompressed from a flash copy of the target volume in a reverse process to restore each data track, when the archived data is needed. Data may be compressed and uncompressed using a Lempel-Ziv-Welch process.
摘要:
Provided are a method, system, and article of manufacture for determining whether to use a full volume or repository for a logical copy backup space. A determination is made of a source volume to backup using a logical copy operation. The logical copy operation is completed upon indicating the source volume data to backup. During a logical copy duration, point-in-time data in the source volume as of a point-in-time when the logical copy was established is copied to a backup space in response to receiving an update to the point-in-time data. A history of writes to the source volume is processed to determine whether to allocate a full target volume as the backup space providing a corresponding data unit for each data unit in the source volume or allocate a repository as the backup space, wherein the repository uses less storage space than the full target volume. The logical copy operation using the determined full target volume or repository as the backup space is initiated.
摘要:
A computer-implemented method detecting malware that includes providing a malware detection application and providing a search engine, the search engine being configured to receive data and commands from the malware detection application and to return data pertaining to search results to the malware detection application. The method also includes sending at least one of scan options and at least one malware-suggestive pattern from the malware detection application to the search engine. The method additionally includes searching, using the search engine and the at least one of scan options and the at least one malware-suggestive pattern, to obtain data pertaining to scan targets. The method also includes sending the data pertaining to the scan targets from the search engine to the malware detection application. The method further includes performing malware detection, using the malware detection application and the data pertaining to the scan targets, on the scan targets.
摘要:
Provided are a method, system and article of manufacture, wherein a request to access data is received from a requestor. A determination is made as to whether the requestor is authorized to access the data. In response to determining that the requestor is authorized to access the data, a determination is made as to whether the data is encrypted. An encryption key is requested from the requester, in response to determining that the data is not encrypted.
摘要:
A method to enable a user mode process to operate in a privileged execution mode is disclosed. Applicants' method provides an operating system comprising a privileged execution mode and a non-privileged execution mode, and a plurality of user mode strings operating in the non-privileged execution mode. The computing device receives a request from a first user mode string to operate in the privileged execution mode to perform one or more designated tasks. Applicants' method authorizes the first user mode string to operate in the privileged execution mode, and the first user mode string performs those one or more designated tasks using the privileged execution mode. Applicants' method continues to permit the first user mode string to operate in the privileged execution mode after completion of the one or more designated tasks.