Abstract:
Provided are a method, system, and article of manufacture, wherein a determination is made that an object corresponding to a first client node has to be stored. A further determination is made as to whether the object has already been sent to a server node by a second client node, wherein the sent object is stored in the server node and is represented by a first entry, and wherein objects and representations of objects stored in the server node form a plurality of groups. The server node receives the object from the first client node, in response to determining that the object has not already been stored in the server node by the second client node. A second entry representing the object is stored at the server node, wherein the second entry references the first entry, in response to determining that the object has already been stored in the server node by the second client node.
Abstract:
Any node in a multi-node processing system may be employed to route commands to a selected group of one or more nodes, and initiate local command execution if permitted by local security provisions. The system includes multiple application nodes interconnected by a network, and one or more administrator nodes each coupled to at least one application node. Each administrator node has assigned security credentials. The process starts when the administrator node transmits input to one of the application nodes (an “entry” node). The input includes a command and routing information specifying a list of desired application nodes (“destination” nodes) to execute the command. In response to this input, the entry node transmits messages to all destination nodes to (1) log-in to the destination nodes as the originating administrator node, and (2) request the destination nodes to execute the command. Consulting locally stored security information, each destination node determines whether the entry node's log-in should succeed. If so, the destination node consults locally stored authority information to determine whether the initiating administrator node has authority to execute the requested command. If so, the destination node executes the command. The destination node sends the entry node a response representing the outcome of command execution. The entry node organizes such responses and provides a representative output.
Abstract:
Disclosed are a method, embodiable in computer readable program code, and a system for providing server-to-server event logging. A server-to-server event message is generated including 1) an event identifier, 2) any text insert pertinent to the event message, and 3) a source trail indicating the origin and history of the event, the source trail comprising an identifier of any server forwarding the event, each identifier separated by a special character, so that the origin and any subsequently transmitting servers may be known. Further, the source trail of a received server-to-server event message is parsed to determine each identifier in the source trail, and the event message transmitted to a receiving server only if the receiving server identifier is absent from the parsed source trail, thus preventing any loops which might cause the event to be repeated. Additionally, a receiving server has a listing of events by event identifier with corresponding text messages in the text language of the receiving server. The received event identifier is found in the listing, and the receiving server logs the event, using the identified text message in the listing in the text language of the receiving server, and employing the text inserts.
Abstract:
An apparatus, system, and method are disclosed that provides a user-specific transportable computing environment. The apparatus, system, and method facilitate users configuring their own personal computing environment on a properly configured computing host. Users can insert a personal environment key into the computing host and automatically activate and configure any software they are licensed to use. The personal environment key may include all the data, licenses, and keys necessary to activate software that the user has rights to use.
Abstract:
Provided are a method, system, and article of manufacture wherein one client node is selected from a plurality of client nodes. A determination is made that an object corresponding to a client node has to be stored. A determination is made as to whether the object has already been stored in the server node by the one selected client node. The object is stored at the server node, in response to determining that the object has not already been stored in the server node by the one selected client node.
Abstract:
An apparatus, system, and method are disclosed for establishing an agency relationship to perform delegated computing tasks. The apparatus system and method provide for initiation of the agency relationship, establishment of credentials to perform a delegated computing task, and performance of the delegated computing task. Benefits of establishing an agency relationship in a computing environment include improved security, efficiency, and reliability in performing delegated computing tasks.
Abstract:
Provided are a method, system, and article of manufacture wherein one client node is selected from a plurality of client nodes. A determination is made that an object corresponding to a client node has to be stored. A determination is made as to whether the object has already been stored in the server node by the one selected client node. The object is stored at the server node, in response to determining that the object has not already been stored in the server node by the one selected client node.
Abstract:
A method, system, and computer program product are provided for determining the recovery readiness of a data asset. A set of metrics are identified for a current recovery operation performed for the data asset and a current recovery objective is identified for the data asset. The current recovery operation is applied to the data asset using the set of metrics. A determination is made as to whether the current recovery operation meets the recovery objective for the data asset. Responsive to a failure of the current recovery operation to meet the recovery objective, an error is presented indicating the failure and a determination is made as to whether a different recovery policy may be implemented to meet the recovery objective for the data asset. If a different recovery policy exists that meets the recovery objective for the data asset, the different recovery policy is implemented.
Abstract:
Techniques are provided for allocating storage space to a storage pool. A request for storage space for the storage pool is received. A list of locations associated with the storage pool is obtained, wherein the locations are capable of spanning multiple file systems or multiple directories within a single file system. One or more allocation techniques are applied to select one or more locations at which storage space is to be allocated. The storage space is allocated at the selected one or more locations.
Abstract:
Provided are a system, method, and program for grouping backup objects stored in backup storage. A backup group is created and a plurality of backup objects are added as members of the backup group in separate backup transactions. The backup objects added to the backup group are stored to backup storage.