Patent application number | Description | Published |
20080250125 | SUPERVISOR PARTITIONING OF CLIENT RESOURCES - A system for supervisor partitioning of client resources in a subnet communications environment includes a plurality of client nodes, each receiving an allocated set of resources determined by a central authority, which assigns resources to a supervisor key associated with each supervisor of the plurality of client nodes. At each of the client nodes, the allocated set of resources are partitioned using a local supervisor associated therewith, with each supervisor associating one or more resource keys with one or more resources allocated to the corresponding client node, and assigning the one or more resource keys to the one or more applications. The supervisor keys are configured so as to prevent a given supervisor from partitioning resources not allocated to the client node associated therewith. Following the partitioning, communication packets are issued from the one or more applications to a resource provider node without inspection by the corresponding supervisor. | 10-09-2008 |
20080270644 | SYSTEM AND PROGRAM FOR DETERMINING THE AVAILABILITY OF PATHS TO A DEVICE - Disclosed is a system and program for selecting one of multiple proposed paths to a device. For each proposed path, a determination is made of a number of components the proposed path shares with existing paths to the device. The components comprise points of failure such that if one component fails then the path including the component fails. The determined number of shared components for each proposed path is used to select one proposed path. | 10-30-2008 |
20080271125 | Authenticating a Requestor Without Providing a Key - A system for authenticating a requesting entity in a subnet communications environment includes determining a client identification of a client node associated with the requesting entity, and determining whether the requesting entity associated with the client node is acting in a supervisor capacity. A key to the requesting entity is returned from a resource provider node upon determining that the client identification of the client node indicates that the client node is permitted to access one or more resources of the provider node, and that the client node is acting in a supervisor capacity. | 10-30-2008 |
20080271133 | Authenticating a Requestor Without Providing a Key - A method for authenticating a requesting entity in a communications environment. In an exemplary embodiment, the method includes determining a client identification of a client node associated with the requesting entity, and determining whether the requesting entity associated with the client node is acting in a supervisor capacity. A key to the requesting entity is returned from a resource provider node upon determining that the client identification of the client node indicates that the client node is permitted to access one or more resources of the provider node, and that the client node is acting in a supervisor capacity. | 10-30-2008 |
20090003233 | Method, Apparatus, and Computer Program Product for Identifying Selected Applications Utilizing a Single Existing Available Bit In Frame Headers - A method, apparatus, and computer program product are disclosed for collecting data about the transmission of network packets that are associated with specified applications. The packets are transmitted through a communications network fabric that is used to couple data processing systems together. A particular existing single bit in a frame header definition is selected. The bit is defined as part of the standard frame header by a communication protocol as an available bit in the frame header. The standard protocol is unchanged by the selection of this bit. An application is specified to be monitored. The selected bit is then set in each network packet that is generated by the specified application. The fabric collects performance data for each packet that has the bit set. Thus, the fabric collects performance data about a transmission of each packet that is generated by the application when that application is setting the bit. | 01-01-2009 |
20110264878 | Volume Swapping of Point-In-Time Read-Only Target Volumes - A mechanism is provided for adding point-in-time copy relationships to a data processing system. A request is received to establish a first point-in-time copy relationship. Responsive to determining that a first target of the first point-in-time copy relationship is target write inhibited, that a source of the first point-in-time copy relationship is a source of a first continuous synchronous copy relationship, that a target of the first continuous synchronous copy relationship is part of a second point-in-time copy relationship, and that the source of the first point-in-time copy relationship is part of a volume swap configuration, a volume swap relationship is added between the first point-in-time target volume and the second point-in-time target volume to the volume swap configuration. Both point-in-time copy relationships are established and any continuous synchronous copy requirements of the volume swap relationship between the first point-in-time target volume and the second point-in-time target volume are disabled. | 10-27-2011 |
20120331261 | Point-in-Time Copying of Virtual Storage - A method includes making in a real storage, a copy of a first page content stored in a first page data structure by creating a second page content in a second data structure, the second page content pointing to actual data pointed to by the first page content, storing the second page content in the second data structure, marking the first page content in the first page data structure with a page protection bit, wherein the page protection bit prevents a modification of the virtual page, in response to an attempt to modify the virtual page, copying the virtual page in the event the first page content in the first page data structure is marked with the page protection bit, storing the copied virtual page in a second virtual storage, and altering the second page content in the second data structure to point to the stored virtual page. | 12-27-2012 |
20120331264 | Point-in-Time Copying of Virtual Storage and Point-in-Time Dumping - A method includes copying a first virtual storage by making, a point-in-time copy of a first page content stored in a first structure by creating a second page content in a second structure, the second page content pointing to actual data pointed to by the first page content, storing the second page content in the second data structure, marking the first page content in the first structure with a bit, copying the virtual page in the event the first page content in the first structure is marked with the bit, storing the copied virtual page in a second virtual storage, altering the second page content to point to the stored virtual page, and using the second virtual storage to perform the core dump process, wherein the second virtual storage is referenced via the second page content stored in the real storage. | 12-27-2012 |
20130166095 | Proactive Cooling Of Chips Using Workload Information and Controls - A method to reduce large temperature over/undershoot in a computer system. Using workload data, the method proactively modifies controls of mechanical cooling system to anticipate power and take appropriate actions to maintain temperature. Workload control modifies workload and scheduling to reduce power transients and subsequent temperature deviations. In addition, workload control allows more even distribution of temp across chips, allowing for even wear and reduction of small/ripple/noise temp oscillations. A system and program product for carrying out the method are also provided. | 06-27-2013 |
20130318317 | Volume Swapping of Point-In-Time Read-Only Target Volumes - A mechanism is provided for adding point-in-time copy relationships to a data processing system. A request is received to establish a first point-in-time copy relationship. Responsive to determining that a first target of the first point-in-time copy relationship is target write inhibited, that a source of the first point-in-time copy relationship is a source of a first continuous synchronous copy relationship, that a target of the first continuous synchronous copy relationship is part of a second point-in-time copy relationship, and that the source of the first point-in-time copy relationship is part of a volume swap configuration, a volume swap relationship is added between the first point-in-time target volume and the second point-in-time target volume to the volume swap configuration. Both point-in-time copy relationships are established and any continuous synchronous copy requirements of the volume swap relationship between the first point-in-time target volume and the second point-in-time target volume are disabled. | 11-28-2013 |
20140019801 | MULTIPLE HYPERSWAP REPLICATION SESSIONS - A method includes monitoring a plurality of HyperSwap sessions between one or more storage systems located at a first location and one or more storage systems located at a second location, wherein at least one of the one or more storage systems located at the first location and at the second location are designated as a primary storage system. The method includes detecting an error event and freezing communications between the storage systems located at the first location and the second location in response to the error event. The method also includes designating either the first location or the second location as a preferred location and modifying the designation of all of storage systems at the preferred location to be primary storage systems in response to the error event. | 01-16-2014 |
20140019802 | MULTIPLE HYPERSWAP REPLICATION SESSIONS - A method includes monitoring a plurality of HyperSwap sessions between one or more storage systems located at a first location and one or more storage systems located at a second location, wherein at least one of the one or more storage systems located at the first location and at the second location are designated as a primary storage system. The method includes detecting an error event and freezing communications between the storage systems located at the first location and the second location in response to the error event. The method also includes designating either the first location or the second location as a preferred location and modifying the designation of all of storage systems at the preferred location to be primary storage systems in response to the error event. | 01-16-2014 |
20150088821 | DATA MIGRATION USING MULTI-STORAGE VOLUME SWAP - In one embodiment of the present description, data is migrated to a replacement source storage unit of a storage subsystem while being mirrored from the original source storage unit of a storage subsystem to an original target storage unit of a storage subsystem, and the original source storage unit and the replacement storage unit are swapped in a multi-storage volume swap to write updates to the replacement source storage unit instead of the original source storage unit, in input/output operations issued by at least one host. Further, data stored in the replacement source storage unit, is mirrored from the replacement source storage unit to the original target unit. Other aspects are described. | 03-26-2015 |