Abstract:
A voice mail system includes a call processing unit to receive incoming calls and access requests, a data storage unit to store digital representations of audio messages on a storage medium, and an administrative unit to enable a user to define a voice mail profile. The profile includes a set of voice mail conditions and a corresponding set of conditional actions. Each condition specifies at least one characteristic of an incoming call or system access request. The voice mail system processes a system access request or incoming call by determining whether at least one of the voice mail conditions is satisfied and, if so, responding to the system access request or incoming call according to the corresponding conditional action.
Abstract:
The present invention relates to a business method for implementing predefined risk assessment methodology for outputting a series of standardized recommendations. A system administrator or service provider performs a series of hardware, software, and firmware tests on the system. Each test provides the administrator/service provider with a determination output that is standardized into risk assessment levels. Depending on the type of test and the risk level assigned to the determination from the test, the administrator/service provider can recommend various courses of action to lower the risk to the system.
Abstract:
A method for managing phone activity records in an automated voice processing system. In a preferred embodiment, phone activity data from the automated voice processing system is periodically written into a first file. The phone activity data corresponds to a period of time. Prior data in the first file is overwritten each time new phone activity data is written into the first file. Prior to data being overwritten in the first file, the phone activity data from the first file is placed into a master file with prior phone activity records. The master file provides a history of phone activity within the automated voice processing system.
Abstract:
A method and apparatus in a distributed data processing system for backing up data on a computer. A backup image of the data in the computer is created, wherein the backup image is stored in a location in the computer. The backup image from the location in the computer is requested by a server.
Abstract:
The automated splitting process begins by setting appropriate names and values for the new and old filesystems, physical volumes, and logs. Logs are updated for the split. Next, names and values are checked for validity and to see that a specified value is not contrary to the operating system's parameters. The split is performed with specified copies placed into specified logical volumes and filesystems. The automated merging process begins by setting appropriate names and values for log files, and by setting filesystem names to be merged and synchronized. Logs are updated for the merge. Next, names and values are checked for validity and to see that a specified value is not contrary to the operating system's parameters. The secondary filesystem is deleted, and the logical volumes are merged, creating the mirror out of the secondary filesystem.
Abstract:
Initially, a configuration script is stored either remotely or locally on a system. The configuration script is executed based on a set of predefined execution parameters, such as time based parameters, system usage or loading parameters, or even based on the types of operations being performed on the system. Once executed, the configuration script outputs a series of current configuration parameters to a safe storage area. These current configuration parameters define the system in terms of system hardware specifics, software specifics, and firmware specifics, including mappings from logical to physical disk drives. By recording such detailed information in a methodical form and preserving it in an accessible state, a script may be written to place every logical volume, every file system, and every block of data back onto its disk of origin, even if the disk arrays stretch into terabytes. By detailing all relevant system parameters, output can be fed as input into a reconstruction script, which can then be written by anyone skilled in UNIX administration, provided the administrator has the comprehensive system environment description generated by the present invention.
Abstract:
A method and apparatus for testing storage devices in communication with a computer. Logical volumes are created on each storage device. Also, a file system is created on a first storage device in the storage devices, wherein the first storage device is a current storage device. The file system is copied from the current storage device to another storage device, wherein the another storage device is a storage device that has not received a copy of the file system wherein the another storage device becomes the current storage device. The file system is copied over and over again until all of the storage devices have received a copy of the file system. At this point, a single pass through these storage devices has occurred. Different numbers of passes may be selected depending on the amount of time during which testing should occur.
Abstract:
Initially, a table file is built which lists at least filesystems to be backed up. It also may list the type of backup techniques to be used for a specific filesystem, the filesystem's logical location, and the number of copies to be made. The table file is checked for syntax and is then available for other routines. An automated script may be used for building the table, and then it may be manually edited if necessary. Other scripts may be invoked for backing up the filesystems listed in the script by accessing the table file.
Abstract:
A method and apparatus in a data system for processing a recursive link in a directory structure in a data processing system. A path to a directory is identified including the recursive link in the directory structure, wherein the path includes a hierarchy towards a root directory, which is a highest directory. Responsive to identifying the path, a highest unprocessed directory in the path is selected as a current directory and all directories in the directory structure beneath the current directory are identified, excluding a directory below the current directory in the path. This step is performed until all directories in the path down to the directory having the recursive link have been processed to form a set of identified directories. All files within the set of directories are identified to form a set of identified files, which then permits backup operations to proceed.
Abstract:
A system and method for path saturation in a storage area network so that the throughput of the storage area network may be determined. The system and method includes a software utility suite that uses either a system administration scripting language, e.g., Perl or Korn shell, or by compiled or machine language software. The software utility suite includes a set of software tools to be installed on one or more computer systems sharing access to a data storage system, such as a storage area network (SAN). The software tools running on these separate computer systems communicate and collaborate in a peer-to-peer fashion in order to coordinate loading, testing and measurement of storage throughput on the shared data storage system. The software tools further coordinate the collection, storage and presentation of results data obtained through such loading, testing and measurement of the storage throughput of the shared data storage system.