Abstract:
A method to change the IP address of a server from a remote operator station, where that server comprises an HTTP server having a first IP address, and where that server is capable of communicating with one or more remote operator stations. One of those remote operator stations submits to the server, using the first IP address, an IP address change request. That IP address change request includes discontinuing use of the first IP address and commencing use of a second IP address. After receipt of the IP address change request, the server generates an HTML page comprising an embedded applet, where that applet is capable of monitoring the TCP/IP connection between the remote operator station and the server. The server provides that HTML page/applet to the remote operator station. Thereafter, the remote operator station continuously displays the status of the IP address change request using the provided applet. After the IP address change request is completed, the remote operator station communicates with the server using the second IP address.
Abstract:
An information technology (IT) environment includes IT managed resources in which the resources are abstracted using a model. In response to determining that a request for information received from a client is non-optimal in terms of processing the request, a first hint can be constructed that indicates how future requests are to be formulated by the client so that they are more optimal in terms of processing the future requests. In response to determining that the information is internally structured non-optimally in terms of processing the request, a second hint can be constructed that indicates how the information is to be internally structured more optimally in terms of processing future requests. In response to determining that processing the request will be non-optimal, a third hint can be constructed relating to a characteristic that results in non-optimal processing of the request, and logged within a hint log for offline analysis.
Abstract:
A method and apparatus are provided for managing logging data communications in a computer system. The computer system is configured with a proxy agent in communication with a client machine and storage, and an embedded agent in communication with the proxy agent and the client machine. All inbound communications from the client machine to the storage are maintained in a log local to the proxy agent. However, all outbound communications are split between two different communications paths, with one outbound path from the storage directly to the client machine and a second outbound path from the storage to the client machine via the proxy agent. One of the two outbound paths is selected based upon one or more of the characteristics of the associated communication.
Abstract:
An information technology (IT) environment includes IT managed resources in which the resources are abstracted using a model. In response to determining that a request for information received from a client is non-optimal in terms of processing the request, a first hint can be constructed that indicates how future requests are to be formulated by the client so that they are more optimal in terms of processing the future requests. In response to determining that the information is internally structured non-optimally in terms of processing the request, a second hint can be constructed that indicates how the information is to be internally structured more optimally in terms of processing future requests. In response to determining that processing the request will be non-optimal, a third hint can be constructed relating to a characteristic that results in non-optimal processing of the request, and logged within a hint log for offline analysis.
Abstract:
A method to provide redundant accessor availabilty in an automated data storage library. The method provides a data storage and retrieval system comprising one or more data storage devices a robot accessor and a gripper. Either at the same time or at a later time, the user obtains a second gripper and/or a second accessor. The method allows selection and/or authorization for additional support from the second gripper and/or the second accessor upon request and authorization. The redundant accessor capabilities are provided on an honor system for payment for the additional capability, and/or uses a system for tracking the redundant accessor usage, and/or uses license keys or other controls that must be obtained prior to enabling redundant accessor capabilities.
Abstract:
A method and apparatus are provided for managing logging data communications in a computer system. The computer system is configured with a proxy agent in communication with a client machine and storage, and an embedded agent in communication with the proxy agent and the client machine. All inbound communications from the client machine to the storage are maintained in a log local to the proxy agent. However, all outbound communications are split between two different communications paths, with one outbound path from the storage directly to the client machine and a second outbound path from the storage to the client machine via the proxy agent. One of the two outbound paths is selected based upon one or more of the characteristics of the associated communication.
Abstract:
A method to change the IP address of a server from a remote operator station, where that server comprises an HTTP server having a first IP address, and where that server is capable of communicating with one or more remote operator stations. One of those remote operator stations submits to the server, using the first IP address, an IP address change request. That IP address change request includes discontinuing use of the first IP address and commencing use of a second IP address. After receipt of the IP address change request, the server generates an HTML page comprising an embedded applet, where that applet is capable of monitoring the TCP/IP connection between the remote operator station and the server. The server provides that HTML page/applet to the remote operator station. Thereafter, the remote operator station continuously displays the status of the IP address change request using the provided applet. After the IP address change request is completed, the remote operator station communicates with the server using the second IP address.