摘要:
A method is provided for isolating errors which occur when code supplied by independent software vendors (ISV code) interacts with code supplied by a primary vendor (host code). Code suspected of containing ISV code with host code is executed. If the results are in error, the code is scanned and then compared with a master host code. Any differences are stored in a delta file, including locations in the host code where ISV code hooks into the host code. The code is then modified to by-pass the hooks to ISV code to generate a side-executable code and both codes are executed and the results are compared. A lack of substantial difference in the results is indicative that the ISV code adversely affects the host code while a difference between the results is indicative of an error in the modified code.
摘要:
Providing a computer program product, system, and method for logging updates to monitored data sets in a storage. A request is received to monitor changes to a monitored data set comprising one of the data sets in the storage. A determination is made of tracks in the storage in which the data set is stored. The determined tracks are indicated in monitored tracks. Updates to the storage are received and a determination is made as to whether the updates are for the monitored tracks. The updates are logged in response to determining that updates are for the monitored tracks. A determination is made of new tracks added to the monitored data set and the determined new tracks are indicated in the monitored tracks.
摘要:
Provided are a computer program product, system, and method for granting and revoking supplemental memory allocation requests. Supplemental memory allocations of memory resources are granted to applications following initial memory allocations of the memory resources to the applications. In response to determining that available memory resources have fallen below an availability threshold, determining a weighting factor for each supplemental memory allocation based on at least one of an amount of the memory resources allocated to the supplemental memory allocation and a measured duration during which the memory resources have been allocated. At least one of the supplemental memory allocations is selected to revoke based on the determined weighting factors of the supplemental memory allocations.
摘要:
An approach to allocating storage that has track managed storage and cylinder managed storage. The approach involves receiving a request to allocate a data set for new data and determining if the size of the new data exceeds a breakpoint value. The size of the new data may be determined by allocating a buffer data set that is the size of the breakpoint value, and writing the new data to the buffer data set. If the new data only partially fills the buffer data set, then the size of the new data is smaller than the breakpoint value. If the new data overfills the buffer data set, then the size of the new data set is larger than the breakpoint value. New data that is larger than the breakpoint value is automatically stored in cylinder managed storage, while new data that is smaller than the breakpoint value is automatically stored in track managed storage.
摘要:
A detection module selects logically adjacent first and second control areas of a cluster. The detection module further determines that the first and second control areas satisfy a migration test wherein the first control area has free space exceeding a free threshold, the free space is at least equal to a space requirement for each second control area control interval, and the second control area has fewer control intervals than a control interval threshold. In addition, a copy module copies each second control area control interval to the first control area in response to determining that the first and second control areas satisfy the migration test.
摘要:
A method of correcting job control language (JCL) jobs scans a JCL job against a set of JCL syntax rules. The method automatically corrects any syntax errors discovered during the scanning, thereby forming a corrected JCL job. The method then runs the corrected JCL job. If the corrected JCL ends abnormally due to an execution error, the method then automatically determines if the execution error is recoverable. If the execution error is recoverable, the method automatically corrects the recoverable error to form a recovered corrected JCL job. The method reruns the recovered corrected JCL job.
摘要:
A method, system and computer-usable medium are disclosed for managing an integrated catalog facility (ICF) catalog. An ICF catalog is monitored by a contention detection module. Information related to a detected catalog resource contention is used by the contention detection module to generate a contention event. Information related to the contention event is then provided to a contention resolution module, which uses the information to perform a contention resolution operation. Once the resolution operation has been performed, contention events and contention resolution operations are reported by a contention reporting module.
摘要:
Provided are a computer program product, system, and method for granting and revoking supplemental memory allocation requests. Supplemental memory allocations of memory resources are granted to applications following initial memory allocations of the memory resources to the applications. In response to determining that available memory resources have fallen below an availability threshold, determining a weighting factor for each supplemental memory allocation based on at least one of an amount of the memory resources allocated to the supplemental memory allocation and a measured duration during which the memory resources have been allocated. At least one of the supplemental memory allocations is selected to revoke based on the determined weighting factors of the supplemental memory allocations.
摘要:
According to one embodiment, a system includes logic adapted to: receive a request to open an existing data set indicating a write operation, receive new data to write to the existing data set, determine that the existing data set is stored on a lower tier of a tiered data storage system, determine that the existing data set is capable of being updated by appending the new data to an end of the existing data set, create a temporary data set on a higher tier of the tiered data storage system comprising the new data, associate the temporary data set on the higher tier of the tiered data storage system with the existing data set on the lower tier of the tiered data storage system, and create a write indicator associated with the new data set indicating that the new data set belongs at the end of the existing data set.
摘要:
A documentation inventory manager which assigns a protection key to each piece of documentation that is received. More specifically, when providing information to a receiving company, a client provides their files to a common FTP server. As a support team of the receiving company accesses the files and stores some or all of the files to a local storage system, the files are modified to include an imbedded header record. In certain embodiments, the imbedded header record includes information regarding an original file name sent by the client, a key value that is assigned to that version of the downloaded file, permissions such as whether the file can be copied, and the inventory manager location. Each time a version of the file is downloaded to a different location within the receiving company, that file name, location, and new unique key is updated in the documentation inventory manager.