摘要:
A method, data processing system, and computer program product autonomously migrate clients serviced by a first VIOS to other VIOSes in the event of a VIOS cluster “split-brain” scenario generating a primary sub-cluster and a secondary sub-cluster, where the first VIOS is in the secondary sub-cluster. The VIOSes in the cluster continually exchange keep-alive information to provide each VIOS with an up-to-date status of other VIOSes within the cluster and to notify the VIOSes when one or more nodes loose connection to or are no longer communicating with other nodes within the cluster, as occurs with a cluster split-brain event/condition. When this event is detected, a first sub-cluster assumes a primary sub-cluster role and one or more clients served by one or more VIOSes within the secondary sub-cluster are autonomously migrated to other VIOSes in the primary sub-cluster, thus minimizing downtime for clients previously served by the unavailable/uncommunicative VIOSes.
摘要:
A method for storing and retrieving blocks of data having different dimensions is disclosed. The method can include receiving a first data segment to be stored in a block storage device where the first data segment has an address. The method can also include determining if the first data segment conforms to a standard dimension and sorting the first data segment according to the destination address if it does not have a standard dimension. The method can further include placing a non-standard data segment into a unfilled block allocation and placing a second non-standard data segment into the unfilled block allocation when the second data segment has the destination identifier. Other embodiments are also disclosed.
摘要:
A computer implemented method and computer program product for sharing licensed applications between virtual machines. When an event is intercepted which comprises an attempted access of a file stored in a hard disk of a guest operating system, wherein the file type has no association with any application installed on the guest operating system, an application installed on a host operating system capable of opening the file is identified. An association of the file type with an application on the host operating system is established, and the file is copied from the hard disk of the guest operating system to a temporary location on the host operating system. The file is opened and accessed using the associated application on the host operating system. The file is then copied back to the hard disk of the guest operating system.
摘要:
A method, data processing system, and computer usable code are provided for protocol definition for software bridge failover. In a first aspect of the present invention, a first software bridge determines the proper working operation of a physical adapter. Limbo packets are sent to a second software bridge alerting the second software bridge that the first software bridge is no longer bridging traffic responsive to the physical adapter failure in the first software bridge. The second software bridge receives the limbo packets, and, in response to receiving the limbo packets, asserts primary control and initiates bridging of traffic. In an alternative aspect of the present invention a first software bridge sends keep-alive packets. A second software bridge monitors the keep-alive packets from the first software bridge and, in response to a failure to detect the keep-alive packets from the first software bridge, the second software bridge initiates bridging of traffic.
摘要:
A method, system, and computer-usable medium for enhancing environment variable and process option invocation in a data processing system. In a preferred embodiment of the present invention, in response to receiving a request for a system startup, an operating system loads a centralized environment file. In response to receiving a request for a user login, the operating system searches for a user environment file. In response to determining that the user environment file conflicts with the centralized environment file, the operating system overrides the user environment file with settings from the centralized environment file.
摘要:
A method for storing and retrieving blocks of data having different dimensions is disclosed. The method can include receiving a first data segment to be stored in a block storage device where the first data segment has an address. The method can also include determining if the first data segment conforms to a standard dimension and sorting the first data segment according to the destination address if it does not have a standard dimension. The method can further include placing a non-standard data segment into a unfilled block allocation and placing a second non-standard data segment into the unfilled block allocation when the second data segment has the destination identifier. Other embodiments are also disclosed.
摘要:
A computer implemented method, apparatus, and program product for extending virtual memory associated with logical partitions. A hosting partition receives a paging request from a logical partition on a logically partitioned data processing. The hosting partition identifies a location of the physical memory space on a remote computing device assigned to the logical partition and sends an extended virtual memory paging request to an extended virtual memory manager located on the remote computing device using a network connection. The extended virtual memory paging request comprises the instructions for the memory page-in or the memory page-out and the location of the physical memory space on the remote computing device that is being paged-in or paged-out. The extended virtual memory manager performs a page-in operation or a page-out operation in accordance with the instructions for the memory page-in or memory page-out.
摘要:
A method for intelligent patch scheduling for a virtual (I/O) server is provided. Virtual I/O performance indicators of a virtual I/O server are monitored. The performance indicators are stored in a database. Historic averages of the performance indicators are maintained in the database. Patches to be applied to a client partition of the virtual I/O server are received. A reboot window is received for the client partition and is an allowed time frame for rebooting to apply the patches. Future virtual I/O utilization is predicted by running predictive modeling utilizing the historic averages of the performance indicators, and based on the predictive modeling, a specific time within the allowed time frame is determined for rebooting the client partition of the virtual I/O server to apply the patches. The virtual I/O server is rebooted to apply the patches to the client partition at the specific time within the reboot window.
摘要:
A method for securely maintaining communications network connection data is disclosed. According to one embodiment, a method is disclosed according to which a user is prompted for network element address substitution data which specifies a substitute network element address for a network element address associated with a network element of a first communications network. The network element address substitution data is then stored within a first storage element, wherein access to the first storage element outside of the first communications network is restricted. Connection monitor data associated with the first communications network is processed utilizing the network element address substitution data. According to the described embodiment, such connection monitor data processing includes identifying metadata of the connection monitor data which specifies the described network element address, and substituting the metadata with metadata which specifies the substitute network element address.
摘要:
A system and method for allocating resources on a network, including a server and at least one client. The resources are associated within a single set, such that the number of resources within the network can be easily incremented or decremented. Flags are associated with each resource, where the flags may be set to one of two states: a first state or a second state. When the server receives a connection request from a client, the server examines the flags associated with the resources to find a flag set to a second state. Upon finding a resource with a flag set to the second state, that resource is assigned to the client. Once the resource is assigned to a client, the associated flag is set to a first state and another flag associated with another resource is set to a second state.