摘要:
Access to objects of a computing environment is managed. Access to an object of the computing environment is prohibited via one cached entity corresponding to the object, while access to the object is allowed via another cached entity. The cached entities are concurrently maintained for a period of time, but the one cached entity is in a shadow state. In one example, the cached entities are session locks and the object is a file system object.
摘要:
A method for sharing memory resources in a data network is provided. The method comprises monitoring first memory space available to a first system; transferring data to a second system, in response to determining that the first memory space has fallen below a first threshold level; and transferring instructions to the second system to perform a first operation on the data.
摘要:
Methods for identifying symbolic links in network file systems are provided herein. An absolute path may be determined at a network file server. This may include determining a complete client path from an initial client path and combining the complete client path with a server export path. Once the absolute path is determined, it may be traversed using a file descriptor of each file in the absolute path to identify a symbolic link.
摘要:
A technique for avoiding a ping-pong effect on active-passive paths in a storage system managing one or more logical storage units (LUNs) on behalf of one or more host systems. A first path to the LUNs is designated as an active path and a second path to the LUNs is designated as a passive path. The first path is also designated as a preferred path to the LUNs. In response to a path failure in which a host system cannot access the LUNs on the first path, a failover operation is implemented wherein the second path is designated as the active path and the first path is designated as the passive path. The designation of the first path as the preferred path to the LUNs is not changed. Subsequent failback operations are conditionally inhibited so that only the failover host that initiated the failover is permitted to initiate a failback.
摘要:
Systems, methods and computer program products for identifying symbolic links in network file systems are provided herein. An absolute path may be determined at a network file server. This may include determining a complete client path from an initial client path and combining the complete client path with a server export path. Once the absolute path is determined, it may be traversed using a file descriptor of each file in the absolute path to identify a symbolic link.
摘要:
Techniques are provided for processing an Input/Output (I/O) request. At least one data block is allocated for use in completing the I/O request. A current operations record is stored for the I/O request. It is determined whether the I/O request has been completed within a specified period of time. In response to determining that the I/O request has not been completed within the specified period of time, the allocated at least one data block is fenced.
摘要:
A method and system for supporting a concurrent recordation of a change in a data file by a server while allowing an application to continue writing changes to a data file. In response to a change in a data file, a near-instantaneous version of the file is created. Metadata reflecting the change to the data file are synchronized with a version of the file in cache and recorded in persistent storage. During the process of recording metadata changes to the file, subsequent changes to the data file may continue, and metadata reflecting the changes may be recorded in a subsequent near-instantaneous version of the file which may also be synchronized with a version of the metadata in persistent storage.
摘要:
A method, system, and article for management of email communication content across a computer system network. An archive of email communications is retained on storage media in communication with the network. In addition, email communication is retained on storage media in communication with a client machine in the network. To mitigate duplication of email communications, duplicate communications are replaced with a hyperlink to the archive communication. This replacement supports removal of the duplicate communication from the storage media in communication with the client machine.
摘要:
Systems and computer program products for identifying symbolic links in network file systems are provided herein. An absolute path may be determined at a network file server. This may include determining a complete client path from an initial client path and combining the complete client path with a server export path. Once the absolute path is determined, it may be traversed using a file descriptor of each file in the absolute path to identify a symbolic link.
摘要:
In a method for selecting a parking lot exit, a computer receives geographic coordinates of a first parking exit of a parking facility. The computer receives geographic coordinates of a second parking exit of the parking facility. The computer determines a first route from the first parking exit to a destination, using the geographic coordinates of the first parking exit. The computer determines a second route from the second parking exit to the destination, using the geographic coordinates of the second parking exit. The computer selects one of the first parking exit and the second parking exit based on the first route and the second route.