Patent application number | Description | Published |
20080310635 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING LICENSE KEYS - An apparatus, system, and method are disclosed for managing license keys. A license key service module creates a license key service object of a license key service class. The license key service class extends a SMI-S CIM CIM_Service class. The license key service object comprises a plurality of management operations. A hosted license key service module creates a hosted license key service object of a hosted license key service class. A license key module creates a license key object of a license key class. The license key class extends a SMI-S CIM CIM_ManagedElement class. The license key object comprises a license key and employs the plurality of management operations. A management module manages the license key using the license key object, license key service object, and hosted license key service object. | 12-18-2008 |
20080313657 | APPARATUS, SYSTEM, AND METHOD FOR MANAGING TRAY DEVICES - An apparatus, system, and method are disclosed for managing tray devices. A tray slot module creates a tray slot object of a tray slot class that extends a SMI-S CIM CIM_Slot class. The tray slot object describes a tray slot. A tray physical package module creates a tray physical package object of a tray physical package class that extends a SIM-S CIM CIM_PhysicalPackage class. The tray physical package object describes a tray device, references the tray slot object, and comprises a universal unique identifier. A tray object module creates a tray object of a tray class that extends SMI-S CIM CIM_LogicalDevice class. The tray object describes a tray, is referenced by a SMI-S CIM CIM_ComputerSystem object, references the tray physical package object, and comprises a device identifier. A management module manages the tray device using the tray slot object, tray physical package object, and tray object. | 12-18-2008 |
20100223667 | APPARATUS, SYSTEM, AND METHOD FOR START-UP AUTHENTICATION - An apparatus, system, and method are disclosed for start-up authentication. A prompt module prompts for a hardware password and authentication data on a single display screen. The authentication data comprises a user password. The user password is distinct from the hardware password. A store module stores the authentication data in a target storage space. In addition, the store module stores a pointer to the target storage space in a system register. A retrieve module retrieves the authentication data from the target storage space using the pointer. An authentication module automatically authenticates a user with the authentication data. | 09-02-2010 |
20120089725 | METHODS AND SYSTEMS FOR VERIFYING SERVER-STORAGE DEVICE CONNECTIVITY - Methods and systems for verifying server-storage device connectivity in a storage area network (SAN) environment are provided. One system includes determining which of a plurality of storage devices a server is physically connected and determining which of the plurality of storage devices a zoning configuration in the SAN environment enables the server to access. The method further includes returning to a user an indication of each storage device in the plurality of storage devices that the server is both physically connected and includes zoning access. One system includes a server, a plurality of storage devices, a switch fabric coupling the server to the plurality of storage devices, and a processor coupled to the server, the plurality of storage devices, and each device in the switch fabric. In this system, the processor is configured to perform the method discussed above. | 04-12-2012 |
20120197943 | METHOD, COMPUTER SYSTEM, AND PHYSICAL COMPUTER STORAGE MEDIUM FOR ORGANIZING DATA INTO DATA STRUCTURES - Methods, computer systems, and physical computer storage medium for organizing data are provided. A method includes monitoring usage of the data, detecting a pattern in the usage of the data, and assigning a first concrete implementation associated with a first data structure to the data, based, in part, on the detected pattern of usage of the data. The method also includes identifying a change in the pattern of usage of the data, after the step of assigning and switching the first concrete implementation associated with the first data structure to a second concrete implementation, based, in part, on the change in the pattern of usage. | 08-02-2012 |
20120323861 | DEDUPLICATED CACHING OF QUERIES FOR GREEN IT MANAGEMENT - Exemplary methods, computer systems, and computer program products for smarter deduplicated caching of queries for green IT management in a computer storage device are provided. In one embodiment, the computer environment is configured for ascertaining the most-used data access chains. Multiple access paths to identical data are determined for the most-used data access chains. A generalized chain that is formed from the plurality of access paths to the identical data is determined. Multiple keys and information relating to the access paths to the identical data is deduplicated. | 12-20-2012 |
20130174269 | MANAGING LICENSE KEYS - For managing license keys, a license key service module creates a license key service object of a license key service class. The license key service object includes a plurality of management operations including a get all license keys operation that acquires a license key for licensing services. A hosted license key service module creates a hosted license key service object of a hosted license key service class that includes the license key service object. A license key module creates a license key object of a license key class. The license key object includes the license key and employs the plurality of management operations. A management module manages the license key using the license key object, license key service object, and hosted license key service object. | 07-04-2013 |
20130179460 | PREDICTING A COMMAND IN A COMMAND LINE INTERFACE - An apparatus for predicting a command in a command line interface includes a template command module, a parameter derivation module, and a parameter substitution module. The template command module is configured to determine a template command based on a command line history. The template command includes a command name and a parameter and the command line history includes two or more previously entered commands. The parameter derivation module is configured to determine a parameter derivation rule for deriving the parameter in the template command based on the command line history. The parameter substitution module is configured to substitute a substitute parameter for the parameter of the template command according to the parameter derivation rule. | 07-11-2013 |
20140089482 | DEVICE MANAGEMENT FOR DETERMINING THE AFFECTS OF MANAGEMENT ACTIONS - Aspects of the present invention disclose a system, method and program product for determining the affects of management actions. In an example, a computer determines a connectivity between one or more devices within a management inventory that are connected via a network. The computer determines a connectivity between the one or more devices within the management inventory after a proposed management action. The computer determines the one or more devices affected by the proposed management action. The computer sends a query to the one or more devices affected by the proposed management action for specific impacts of the proposed management action. The computer receives data related to the specific impacts of the proposed management action from the one or more devices affected by the proposed management action. | 03-27-2014 |
20140222869 | METHOD, COMPUTER SYSTEM, AND PHYSICAL COMPUTER STORAGE MEDIUM FOR ORGANIZING DATA INTO DATA STRUCTURES - Methods, computer systems, and physical computer storage medium for organizing data are provided. A method includes monitoring usage of the data, detecting a pattern in the usage of the data, and assigning a first concrete implementation associated with a first data structure to the data, based, in part, on the detected pattern of usage of the data. The method also includes identifying a change in the pattern of usage of the data, after the step of assigning and switching the first concrete implementation associated with the first data structure to a second concrete implementation, based, in part, on the change in the pattern of usage. | 08-07-2014 |
Patent application number | Description | Published |
20120210060 | CREATION OF LOGICAL UNITS VIA BORROWING OF ALTERNATIVE STORAGE AND SUBSEQUENT MOVEMENT OF THE LOGICAL UNITS TO DESIRED STORAGE - A computational device receives a request to create a logical unit. Associated with the request is a first type of storage pool in which creation of the logical unit is desired. In response to determining that adequate space is not available to create the logical unit in the first type of storage pool, a determination is made as to whether a first indicator is configured to allow borrowing of storage space from a second type of storage pool. In response to determining that the first indicator is configured to allow borrowing of storage space from the second type of storage pool, the logical unit is created in the second type of storage pool and a listener application is initiated. The listener application determines that free space that is adequate to store the logical unit has become available in the first type of storage pool. The logical unit is moved from the second type of storage pool to the first type of storage pool, in response to determining, via the listener application, that free space that is adequate to store the logical unit has become available in the first type of storage pool. | 08-16-2012 |
20120297039 | AUTOMATED DEPLOYMENT OF SOFTWARE FOR MANAGED HARDWARE IN A STORAGE AREA NETWORK - In one aspect of the present description, a systems manager based upon a common model of information protocol or standard includes automated storage area network (SAN) expansion management which permits additional provider modules to be automatically installed if needed in response to devices being added to the SAN. In addition, the automated SAN expansion management permits installed provider modules to be automatically configured in response to devices being added to the SAN. Still further, in another aspect, the automated SAN expansion management can automatically determine if a suitable host processor exists to host installation of a new provider module and if not, the automated SAN expansion management | 11-22-2012 |
20130166842 | CREATION OF LOGICAL UNITS VIA BORROWING OF ALTERNATIVE STORAGE AND SUBSEQUENT MOVEMENT OF THE LOGICAL UNITS TO DESIRED STORAGE - A computational device receives a request to create a logical unit. Associated with the request is a first type of storage pool in which creation of the logical unit is desired. In response to determining that adequate space is not available to create the logical unit in the first type of storage pool, a determination is made as to whether a first indicator is configured to allow borrowing of storage space from a second type of storage pool. In response to determining that the first indicator is configured to allow borrowing of storage space from the second type of storage pool, the logical unit is created in the second type of storage pool and a listener application is initiated. The listener application determines that free space that is adequate to store the logical unit has become available in the first type of storage pool. The logical unit is moved from the second type of storage pool to the first type of storage pool, in response to determining, via the listener application, that free space that is adequate to store the logical unit has become available in the first type of storage pool. | 06-27-2013 |
20130185529 | AUTOMATED DEPLOYMENT OF SOFTWARE FOR MANAGED HARDWARE IN A STORAGE AREA NETWORK - In one aspect of the present description, a systems manager based upon a common model of information protocol or standard includes automated storage area network (SAN) expansion management which permits additional provider modules to be automatically installed if needed in response to devices being added to the SAN. In addition, the automated SAN expansion management permits installed provider modules to be automatically configured in response to devices being added to the SAN. Still further, in another aspect, the automated SAN expansion management can automatically determine if a suitable host processor exists to host installation of a new provider module and if not, the automated SAN expansion management can automatically deploy a suitable host processor such as a virtual server to host installation of a new provider module. Other features and aspects may be realized, depending upon the particular application. | 07-18-2013 |
20140115288 | CREATION OF LOGICAL UNITS VIA BORROWING OF ALTERNATIVE STORAGE AND SUBSEQUENT MOVEMENT OF THE LOGICAL UNITS TO DESIRED STORAGE - A computational device receives a request to create a logical unit. Associated with the request is a first type of storage pool in which creation of the logical unit is desired. In response to determining that adequate space is not available to create the logical unit in the first type of storage pool, a determination is made as to whether a first indicator is configured to allow borrowing of storage space from a second type of storage pool. In response to determining that the first indicator is configured to allow borrowing of storage space from the second type of storage pool, the logical unit is created in the second type of storage pool and a listener application is initiated. The listener application determines that free space that is adequate to store the logical unit has become available in the first type of storage pool. The logical unit is moved from the second type of storage pool to the first type of storage pool, in response to determining, via the listener application, that free space that is adequate to store the logical unit has become available in the first type of storage pool. | 04-24-2014 |
Patent application number | Description | Published |
20090119756 | Credential Verification using Credential Repository - A credential repository securely stores user credentials. The credential repository may be accessed by multiple entities. Instead of having a user carry his credentials with him (e.g., on a credit card or driver's license, which can be lost or stolen), the user's credentials are retrieved from the credential repository for use in a transaction. A merchant or other entity requesting the transaction receives these retrieved credentials and uses them to verify the identity of the user who seeks to participate in the transaction. A time-to-live value may be associated with the retrieved credentials. Successful verification of the user's identity enables private or personal data of the user to be released to the merchant or other entity. Optionally, the user explicitly authorizes the release of the data. | 05-07-2009 |
20090119757 | Credential Verification using Credential Repository - A credential repository securely stores user credentials. The credential repository may be accessed by multiple entities. Instead of having a user carry his credentials with him (e.g., on a credit card or driver's license, which can be lost or stolen), the user's credentials are retrieved from the credential repository for use in a transaction. A merchant or other entity requesting the transaction receives these retrieved credentials and uses them to verify the identity of the user who seeks to participate in the transaction. A time-to-live value may be associated with the retrieved credentials. Successful verification of the user's identity enables private or personal data of the user to be released to the merchant or other entity. Optionally, the user explicitly authorizes the release of the data. | 05-07-2009 |
20090125856 | METHODS AND APPARATUS FOR BOOLEAN EQUIVALENCY CHECKING IN THE PRESENCE OF VOTING LOGIC - In a first aspect, a first method of designing a circuit is provided. The first method includes the steps of (1) providing a model of an original circuit design including a latch; (2) providing a model of a modified version of the original circuit design, wherein the modified version of the original circuit design includes a set of latches associated with the latch of the original circuit design and voting logic having inputs coupled to respective outputs of latches in the latch set; and (3) during Boolean equivalency checking (BEC), injecting an error on at most a largest minority of the inputs of the voting logic to test the voting logic function. | 05-14-2009 |
20130159591 | VERIFYING DATA RECEIVED OUT-OF-ORDER FROM A BUS - In an embodiment, load transactions are issued to a bus. The load transactions are stalled if the bus cannot accept additional load transactions, and the load transactions are restarted after the bus can accept the additional load transactions. Responses are received from the bus to the load transactions out-of-order from an order that the load transactions were sent to the bus. The responses comprise data and index values that indicate an order that the load transactions were received by the bus. The data is compared in the order that the load transactions were received by the bus against expected data in the order that the load transaction were sent to the bus. | 06-20-2013 |
20130185477 | VARIABLE LATENCY MEMORY DELAY IMPLEMENTATION - A method includes receiving, from a processor, a first read request mapped including a first read request address to a first memory location of a register array and a second read request including a second read request address to a second memory location of a register array. The method includes assigning a first simulated time delay to the first read request and assigning a second simulated time delay to the second read request. The method includes, in response to a first elapsed time being equal to the first simulated time delay, outputting a first read request response including first data. The first elapsed time commences upon receipt of the first read request. The method includes, in response to a second elapsed time being equal to the second simulated time delay, outputting a second read request response including second data. The second elapsed time commences upon receipt of the second read request. | 07-18-2013 |