DISCOVERING AND IDENTIFYING MANAGEABLE INFORMATION TECHNOLOGY RESOURCES
    21.
    发明申请
    DISCOVERING AND IDENTIFYING MANAGEABLE INFORMATION TECHNOLOGY RESOURCES 失效
    发现和识别可管理的信息技术资源

    公开(公告)号:US20120233330A1

    公开(公告)日:2012-09-13

    申请号:US13447682

    申请日:2012-04-16

    IPC分类号: G06F15/173

    CPC分类号: G06F9/50 G06F2209/508

    摘要: A computer-executable method for allocating resource discovery and identification processes among a plurality of management tools and resources in a distributed and heterogeneous IT management system includes providing at least one authoritative manageable resource having minimal or no responsibility for reporting its identity, minimal or no responsibility for advertising any lifecycle-related creation event for the resource, and minimal or no responsibility for advertising any lifecycle-related destruction event for the resource; using a service oriented architecture (SOA) to define one or more services needed to manage the resource within the management system; and using a component model to define one or more interfaces and one or more interactions to be implemented by the manageable resource within the management system.

    摘要翻译: 一种用于在分布式和异构IT管理系统中的多个管理工具和资源之间分配资源发现和识别过程的计算机可执行方法包括提供至少一个权威可管理的资源,对报告其身份,最小或没有责任至少或不负责任 用于为资源广告任何与生命周期相关的创建事件,并且对资源的任何与生命周期相关的销毁事件进行广告宣传也不承担任何责任; 使用面向服务架构(SOA)来定义在管理系统内管理资源所需的一个或多个服务; 以及使用组件模型来定义要由管理系统内的可管理资源实现的一个或多个接口和一个或多个交互。

    Transactional name service
    25.
    发明授权
    Transactional name service 有权
    交易名称服务

    公开(公告)号:US06553384B1

    公开(公告)日:2003-04-22

    申请号:US09333058

    申请日:1999-06-14

    IPC分类号: G06F1700

    摘要: A transactional name server. One or more objects of the name server are managed as transactional objects, thereby providing a transactional name server. Atomic updates are provided in the name server by the addition of transactional semantics. The transactional semantics include making the objects of the name space managed objects and providing a local interface to a directory service that propagates a transactional context from the name server through a directory down to a resource manager.

    摘要翻译: 事务名称服务器。 名称服务器的一个或多个对象作为事务对象进行管理,从而提供事务名称服务器。 原子更新通过添加事务语义在名称服务器中提供。 事务语义包括使名称空间的对象管理对象,并向目录服务提供本地接口,该目录服务将事务上下文从名称服务器通过目录下载到资源管理器。

    Method and system for locking a page of real storage using a virtual
address
    26.
    发明授权
    Method and system for locking a page of real storage using a virtual address 失效
    使用虚拟地址锁定实际存储页面的方法和系统

    公开(公告)号:US5613086A

    公开(公告)日:1997-03-18

    申请号:US567861

    申请日:1995-12-06

    CPC分类号: G06F12/126 G06F12/10

    摘要: A LOCK PAGE instruction is provided for locking a page of real storage using a virtual address. The LOCK PAGE instruction includes an operation code which specifies the operation to be performed, a first operand which contains the value of the real address obtained during execution of the LOCK PAGE instruction and a second operand which contains the value of the virtual address of the page to be locked during execution of LOCK PAGE. LOCK PAGE enables an address page or a data page to be locked without requiring the entire address space to be locked. A page is locked when a lock control bit in general register 0 is zero, the page is valid in main storage and a lock bit located in a page table entry is zero. In addition to the above, the technique used by an operating system service for reclaiming a page of real storage is altered to intersect with the LOCK PAGE facility.

    摘要翻译: 提供LOCK PAGE指令,用于使用虚拟地址锁定实际存储的页面。 LOCK PAGE指令包括指定要执行的操作的操作代码,第一操作数,其包含在执行LOCK PAGE指令期间获得的实际地址的值和包含页面的虚拟地址的值的第二操作数 在执行LOCK PAGE期间被锁定。 锁定页面可以锁定地址页面或数据页面,而不需要锁定整个地址空间。 当通用寄存器0中的锁控制位为零时,页面被锁定,该页在主存储器中有效,并且位于页表条目中的锁位为零。 除了上述之外,操作系统服务用于回收真实存储页面的技术被改变以与LOCK PAGE设备相交。

    Software cache management of a shared electronic store in a supplex

    公开(公告)号:US5457793A

    公开(公告)日:1995-10-10

    申请号:US860807

    申请日:1992-03-30

    摘要: Storage is managed in a shared electronic store (SES) by assigning storage classes (STCs) to each directory entry having a data item stored in SES. The assignments of directory entries and data elements to the respective STCs can be changed at any time by any CPC. Eventually, no free space remains in the SES cache, and then space for new directory entries and data items must be obtained by reclaiming space occupied by directory entries and associated unchanged data items. The reclaiming of SES space is controlled on a STC basis. Any specified STC may reclaim from itself or from another STC using reclaiming software/microcode in SES, which includes a reclaim vector, a reclaim counter, a queue, and reclaiming controls. The vector and counter have respective elements for all possible STCs to controls how a specified STC may reclaim space from any or all target STC. Any enabled target STC reclaims its space according to an LRU algorithm maintained by a queue for the STC. A CPC can issue a command to load different values in target STC elements in the SES vector for a specified STC to control how reclaiming is apportioned for the specified STC. In SES, associated target counter elements are loaded from its vector. Reclaiming is done automatically in SES upon each directory miss in the current target STC having a non-zero counter value, when no free space exists. The counter is decremented for each reclaimed directory entry until its count reaches zero, and then the counter element for the next non-zero target STC is used for reclaiming until it reaches zero. When all STC elements in the counter are zero for the specified STC, the counter elements are reloaded from the vector elements to repeat the reclaiming operation, as long as a repeat factor for the specified STC has not reached zero. The repeat factor is decremented each time the counters are loaded from the vector. When the counters and repeat factor have all reached zero, reclaiming is disabled for the specified STC.

    Apparatus and accompanying method for use in a sysplex environment for
performing escalated isolation of a sysplex component in the event of a
failure
    28.
    发明授权
    Apparatus and accompanying method for use in a sysplex environment for performing escalated isolation of a sysplex component in the event of a failure 失效
    在sysplex环境中使用的装置和相关方法,用于在发生故障时执行sysplex组件的升级隔离

    公开(公告)号:US5416921A

    公开(公告)日:1995-05-16

    申请号:US147351

    申请日:1993-11-03

    IPC分类号: G06F11/20

    CPC分类号: G06F11/2035 G06F11/2046

    摘要: Apparatus and accompanying methods for use in preferably a multi-system shared data (sysplex (5)) environment which quickly and efficiently isolates (fences), through a pre-defined hierarchical order, failed sysplex components from accessing shared data in order to protect data integrity. Specifically, by dividing a sysplex workload into specified fence groups (FG A, FG B) and providing appropriate software and hardware fence support, fencing can occur at various distinct levels: a member-to-member level, i.e. to allow any member (220, 225, 230, 233,237) of a fence group to fully isolate any other ("target") member of that same group; a fence group level, i.e. to isolate all members of a fence group that execute on a "target" system (200.sub.1, 200.sub.2, 200.sub.3); and a system level, i.e. to fully isolate an entire "target" system. Through pre-defined escalation rules (630), fencing can be escalated from a lower member level to a higher, group or system, level in the event a lower level fence can not be successfully imposed. Member level fencing is accomplished in software (1300, 1500); group and system level fencing is accomplished through dedicated hardware fencing facilities (44). An identifier (444, 464) uniquely designates each different fence group existing on a computer processing complex (CPC) (40.sub.1, 40.sub.2, 40.sub.3, 40.sub.M) in the sysplex over the life of that CPC. Advantageously, this technique eliminates erroneous back level fencing, significantly expedites fence processing and also greatly reduces a need for human intervention.

    摘要翻译: 用于优选多系统共享数据(sysplex(5))环境的装置和伴随方法通过预定义的分级顺序快速有效地隔离(围栏)使得系统组件不能访问共享数据以保护数据 诚信 具体来说,通过将系统工作负载划分为指定的栅栏组(FG A,FG B)并提供适当的软件和硬件围栏支持,防护可以在各种不同的级别发生:成员级别,即允许任何成员(220 ,225,230,233,237),以完全隔离同一组的任何其他(“目标”)成员; 围墙组级别,即隔离在“目标”系统上执行的围栏组的所有成员(2001,2002,2003); 和系统级别,即完全隔离整个“目标”系统。 通过预定义的升级规则(630),如果无法成功施加较低级别的围栏,则围栏可以从较低的成员级别升级到较高的组或系统级别。 成员级围栏是用软件完成的(1300,1500); 组和系统级围栏通过专用的硬体围栏设施完成(44)。 标识符(444,446)唯一地指定存在于该CPC的整个生命周期中的系统复合体中的计算机处理复合体(CPC)(401,402,403,40M)上的每个不同的栅栏组。 有利的是,这种技术消除了错误的背面水平围栏,显着地加快了围栏处理,并且还大大降低了人为干预的需要。