摘要:
Disclosed is a high-voltage diode structure which realizes high reverse recovery capability and high maximum allowable forward current. The distance between a longitudinal end of a p well layer in an anode region and an element isolation region formed to surround the diode is 5 μm or shorter so as to allow a depletion layer to reach the element isolation region when a maximum rated reverse voltage is applied. During reverse recovery, the electric field strength at an end portion of a p well layer is reduced, hole current is reduced, and local temperature rises are reduced.
摘要:
Provided is a method of managing a computer system including a plurality of storage systems and a plurality of management appliances for managing the plurality of storage systems. A first management appliance and a second management appliance hold an identifier of a first storage system and management data obtained from the first storage system. The method includes the steps of: selecting a third management appliance from the plurality of management appliances when a failure occurs in the first management appliance; transmitting the identifier held in the second management appliance from the second management appliance to the selected third management appliance; and holding the identifier transmitted from the second management appliance in the selected third management appliance. Thus, it is possible to prevent, after failing-over due to an abnormality of a maintenance/management appliance, a single point of failure from occurring to reduce reliability of the maintenance/management appliance.
摘要:
In a computer system having a storage system in which storage units are hierarchically configured, a management method for accurately grasping the capacity available to the computer is disclosed.In a computer system in which a management computer manages the capacities of storage units for storing data used by the computer, the management method is typically realized by a storage management system comprising a group of first-level storage units each containing volumes for storing data used by the computer, a group of second-level storage units each of which is hierarchically linked to, and physically connected through a communication path to, one of the first-level storage units and contains volumes for storing data used by the computer, a means for collecting volume information from the first-level and the second-level storage units, a means for collecting inter-volume hierarchy information, and a means for calculating the total effective capacity to the computer based on the volume information and the inter-volume information thus collected.
摘要:
In a system where a management application sends commands to a remotely-located agent over a network, the agent maintains a security specification table defining the security level for each combination of the cipher and authentication algorithms of the communication path to/from the management application and a required security level table defining the minimum security level required for the execution of each command. Upon receiving a command from the management application, the agent obtains, by referencing these tables, the operational security level of the communication path and the required security level for the command, and executes the command only if the former is greater than or equal to the latter. This mechanism ensures high security in system management by preventing a malicious intruder from executing potent commands that can cause a down of a computer system, without unreasonably limiting the use of the management application by the system administrator.
摘要:
The management computer 600 copies data in the volume 111 within the storage device 100A to the volume 115 within the storage device 100B. Upon completion of copy processing, the volume 115 is set to write protect. Then, the data in the volume 111 is read from the storage device 100A, and the data in the volume 115 is also read from the storage device 100B, to compare the two data items. Only when the data items agree with each other, setting of FC switch 400 is changed, and a target of the host computer 500 is switched from the storage device 100A to the storage device 100B.Therefore, it is possible to detect or prevent an illegal data modification in the course of data copying from the source volume to the destination volume.
摘要:
A storage device includes a storage for storing data to be accessed by a computer and an access processing module that controls data access between the storage and the computer. The storage device is equipped with a management interface, a storage region allocation module and a performance allocation module. The management interface receives from a management computer a storage region allocation request to allocate a storage region to the computer. The storage region allocation module allocates to the computer, according to the storage region allocation request, an unallocated storage region in the storage in a manner accessible by the computer. The performance allocation module allocates to the computer, according to the storage region allocation request, performance of at least one target module in the storage device that affects data access between the computer and the storage region allocated.
摘要:
In a computer system having hierarchically-arranged data storage apparatuses, a management computer provides information required for performing operation on the data storage apparatuses. Through a network for collecting management information, storage area information and hierarchy information are collected from each data storage apparatus. Management relation information is created using the collected storage area information and the collected hierarchy information together with programs for respectively managing the data storage apparatuses, and, the created management relation information is held. Based on the created management relation information, a display screen expressing the hierarchy of the data storage apparatuses is created. Further, responding to operation by a user, a return considering the hierarchy is displayed.
摘要:
In a system where a management application sends commands to a remotely-located agent over a network, the agent maintains a security specification table defining the security level for each combination of the cipher and authentication algorithms of the communication path to/from the management application and a required security level table defining the minimum security level required for the execution of each command. Upon receiving a command from the management application, the agent obtains, by referencing these tables, the operational security level of the communication path and the required security level for the command, and executes the command only if the former is greater than or equal to the latter. This mechanism ensures high security in system management by preventing a malicious intruder from executing potent commands that can cause a down of a computer system, without unreasonably limiting the use of the management application by the system administrator.
摘要:
The management computer 600 copies data in the volume 111 within the storage device 100A to the volume 115 within the storage device 100B. Upon completion of copy processing, the volume 115 is set to write protect. Then, the data in the volume 111 is read from the storage device 100A, and the data in the volume 115 is also read from the storage device 100B, to compare the two data items. Only when the data items agree with each other, setting of FC switch 400 is changed, and a target of the host computer 500 is switched from the storage device 100A to the storage device 100B.Therefore, it is possible to detect or prevent an illegal data modification in the course of data copying from the source volume to the destination volume.
摘要:
A case capable of airtightly closing an opening of a mouth of a case body by screwing a lid on the case body; and rotating the lid smoothly in the circumferential direction when the lid is screwed on or unscrewed from the case body. The case including a case body having a mouth, and a lid detachably screwed on the mouth so as to close an opening of the mouth and connected to the case body via an opening and closing hinge so as to pivot in directions of opening and closing the mouth is provided with a rotary ring fitted and held around the mouth so as to rotate in a circumferential direction thereof and connected to the lid via the opening and closing hinge so that the lid rotates together with the rotary ring.