摘要:
Extending a plurality of manageability capabilities of manageable information technology (IT) resources utilize an “aspect of” association for describing a relationship between a first object representing a manageable resource playing a role of a subject and one or more additional objects each playing a role of an aspect. The “aspect of” association establishes an overall manageability function for the first object representing a manageable resource and the one or more additional objects as a logical composition of a plurality of manageability capabilities. The manageability capabilities are provided using distinct implementation classes for supporting a specific role, and for supporting management-discipline related aspects and behaviors needed by each of a plurality of resource management applications for managing the manageable resource. The one or more additional objects have an aspect life cycle that is bounded maximally by a subject lifecycle of the first manageable resource.
摘要:
An integrated hybrid system is provided. The hybrid system includes compute components of different types and architectures that are integrated and managed by a single point of control to provide federation and the presentation of the compute components as a single logical computing platform.
摘要:
Security is optimized in the context of a credential transformation service (CTS) by utilizing a web services client runtime to gather information for determining whether or not a target web service is hosted in a security domain used by a client application and for determining whether or not the target web service uses an authentication mechanism substantially identical to that used by the client application. The gathered information is carried in an endpoint reference (EPR) of the target web service. In response to the client receiving the EPR, the client applies an optimization process to eliminate a possible unnecessary invocation of the CTS, wherein the target web service is an authoritative manageable resource having minimal or no responsibility for providing its identity, and having minimal or no responsibility for advertising any creation and destruction lifecycle related events.
摘要:
An object factory is registered under multiple interface names. The interface names have an inheritance relationship with an object implementation associated with the object factory. The names are registered in a repository of a name space, such as a Life Cycle Repository. Thus, an object factory can be located using any one of the interface names.
摘要:
A method and system for providing a PROGRAM CALL to a dispatchable unit's base space is described herein. A program call to a dispatchable unit's (PC to DU) base space bit is added to each entry-table entry in order to determine whether a PROGRAM CALL to a base space is to be made. Should the bit indicate that a PROGRAM CALL to a dispatchable unit's base space is to be made, then in one embodiment, the base address space number-second-table entry origin (BASTEO) and base address space number (BASN) stored in the dispatchable unit control table (DUCT) are used in identifying the base space and accessing associated control information for the identified base space. In another embodiment, the BASN stored in the DUCT is used in ASN translation to identify the base space and access the associated control information for the base space.
摘要:
Method and apparatus for creating and accessing data objects stored in a portion of the main memory of a data processing system which is inaccessible to programs. The data processing system includes a central processor for executing programs for processing data and a main memory for storing data and programs. The main memory is divided into a program accessible portion and a program inaccessible portion. Vector control objects and vector entries are stored in the program inaccessible portion of the main memory, with each vector entry having states the meaning of which are program defined. Tokens are generated to locate vector control objects in the program inaccessible portion of the main memory. Each vector control object includes a field for pointing to a vector entry for accessing and making observable to the central processor, the contents of a vector entry for indicating the status therein. The present invention also provides for the serialization of access to stored data objects such that the data objects may be released and reused without the possibility of a latent access to an object which is being reused.
摘要:
Apparatus and method insuring that data objects used to maintain state information for shared data at a local central processing complex (CPC) are coherent with respect to state information maintained at a structured external storage facility (SES) over a link is valid. An error detector is attached to the CPC side of the link for detecting errors on the link, and, when an error is detected, setting a error state pending (ESP) latch to indicate that the link has failed and that the shared data in the local data object may be invalid because a message invalidating the data may not have been received by the CPC. In data processing operations, the ESP latch is interrogated by a central processor in the CPC to determine the health of the message path to the SES facility. A local cache vector reflecting the validity of the shared data in the local cache may then be interrogated to determine if the shared data in the local cache is valid. If a healthy path has continuously existed and the vector indicates that the local cache data is valid, the integrity of the data can be relied on.
摘要:
A computer-executable method for allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous IT management system includes providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource; using a service oriented architecture (SOA) to define one or more services needed to manage the resource within the management system; and using a component model to define one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.
摘要:
A computer-executable method for allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous IT management system includes providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource; using a service oriented architecture (SOA) to define one or more services needed to manage the resource within the management system; and using a component model to define one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.
摘要:
A system for managing topologies includes a topology data datastore that stores topology information. A topology computer element interfaces with the topology data datastore to create and update a topology of resources. A subscription computer element generates notifications to a user based on at least one of the creating and the updating of the topology of resources and further based on subscription data.