Patent application number | Description | Published |
20080215713 | System and Method for Automatically Enforcing Change Control in Operations Performed by Operational Management Products - A system and method for enforcing change control in operations performed by operational management products (OMPs) are provided. The system and method automate the checking of a request-for-change (RFC) state by an OMP when the OMP is installed in an environment where a change management database (CMDB) has been installed and certain resources or operations have been placed under strict change control. The OMPs of the illustrative embodiments require an RFC identifier to be specified when a change operation of the OMP is invoked. The RFC identifier is used by the OMP to access a service management system so that the OMP may determine if the RFC identifier is valid, IT resources are in the correct state, and the change is scheduled to be performed at the current time. If these checks are passed, then the change operation associated with the RFC is permitted to occur. | 09-04-2008 |
20080243860 | Sequential Media Reclamation and Replication - Sequential media reclamation is usually performed after portions of a sequential access volume's data are no longer needed and the unused portion of the volume exceeds a threshold. Improved sequential media reclamation is provided by using a sequential access disk volume (for example, a volume of a virtual tape library (VTL)) embodied as a sparse file. Reclamation of objects stored in the volume is accomplished by nulling out regions of the sparse file that contain the objects that are no longer needed. A replication method is also provided in which information about the objects stored in the sparse file (such as offset and length) is used during replication to enable the correct portions of a target volume (embodied as a sparse file) to be nulled out to match a source volume (also embodied as a sparse file). | 10-02-2008 |
20080307527 | APPLYING A POLICY CRITERIA TO FILES IN A BACKUP IMAGE - Provided are a method, system, and article of manufacture for applying a policy criteria to files in a backup image. A backup image of files in a file system is maintained. A policy is applied to the files in the backup image to determine files satisfying a policy criteria. A list is prepared indicating the determined files. The determined files in the file system are accessed and a deferred operation indicated in the applied policy is applied to the accessed files in the file system. | 12-11-2008 |
20090187975 | SYSTEMS FOR AUTHENTICATING A USER'S CREDENTIALS AGAINST MULTIPLE SETS OF CREDENTIALS - Provided are systems for authenticating the identity of a user for use in a distributed computer network including multiple sets of access credentials. A user request, including the user's input credentials, is received, and then compared simultaneously to multiple sets of access credentials in order to verify the user's input credentials. When the user's input credentials are verified, the appropriate level of access authority is then determined, and proper access is granted to the user. | 07-23-2009 |
20100223233 | MANAGEMENT OF REDUNDANT OBJECT IN STORAGE SYSTEMS - Provided are a method, system, and article of manufacture wherein one client node is selected from a plurality of client nodes. A determination is made that an object corresponding to a client node has to be stored. A determination is made as to whether the object has already been stored in the server node by the one selected client node. The object is stored at the server node, in response to determining that the object has not already been stored in the server node by the one selected client node. | 09-02-2010 |
20110113015 | MANAGEMENT OF REDUNDANT OBJECTS IN STORAGE SYSTEMS - Provided are a method, system, and article of manufacture wherein one client node is selected from a plurality of client nodes. A determination is made that an object corresponding to a client node has to be stored. A determination is made as to whether the object has already been stored in the server node by the one selected client node. The object is stored at the server node, in response to determining that the object has not already been stored in the server node by the one selected client node. | 05-12-2011 |
20110161296 | APPLYING A POLICY CRITERIA TO FILES IN A BACKUP IMAGE - Provided are a method, system, and article of manufacture for applying a policy criteria to files in a backup image. A backup image of files in a file system is maintained. A policy is applied to the files in the backup image to determine files satisfying a policy criteria. A list is prepared indicating the determined files. The determined files in the file system are accessed and a deferred operation indicated in the applied policy is applied to the accessed files in the file system. | 06-30-2011 |
20110161412 | PROCESSING REQUESTS TRANSMITTED USING A FIRST COMMUNICATION DIRECTED TO AN APPLICATION THAT USES A SECOND COMMUNICATION PROTOCOL - Provided are a method, system, and program for processing requests transmitted using a first communication directed to an application that uses a second communication protocol. A request is received from one of a plurality of client computers over a network in a first communication protocol, wherein the client computers communicate over the network in the first communication protocol. A determination is made as to whether the request includes an identifier of an application indicated in a data structure. A socket is processed that enables communication between the application identified by the identifier in response to determining that the identifier included in the request is indicated in the data structure. The socket is provided to the application identified in the request to enable the application to communicate with the client over the network using a second communication protocol. The application transmits a response to the request using the second communication protocol and the provided socket, wherein the request from the client in the first communication protocol is sent to a first communication protocol server managing communication using the first communication protocol, wherein communication with the client following the response to the request is conducted using the second communication protocol and the socket and bypasses the first communication protocol server. | 06-30-2011 |