摘要:
A method for providing a search sample without a search being triggered is disclosed. The method includes receiving at least one partial search term in a search box. Probable search terms are determined by comparing the at least one partial search term to a database of common search terms. The probable search terms are displayed in a format that include a link to a sample search of each probable search term and a backslide button. When the link to a sample search of a probable search term is selected in the probable search terms, the sample search is displayed in a format that includes a close link. When the close link is selected in the sample search, the probable search terms are displayed again. When the backslide button is selected, the right most word from the search term is deleted.
摘要:
A method of minimizing data storage medium fragmentation, wherein the method provides a data storage library comprising (N) data storage media, wherein (N) is greater than or equal to 1. The method establishes a threshold fragmentation index, and determines, for each value of (i), an actual fragmentation index for an (i)th data storage medium, wherein (i) is greater than or equal to 1 and less than or equal to (N). The method receives a data set from a host computer in communication with the data storage library, and writes the data set to an (i)th data storage medium based upon an (i)th actual fragmentation index.
摘要:
Method embodiments for facilitating overflow storage of special data sets that reside on a single logical volume are provided. A virtual logical volume is created from unallocated memory units across a plurality of logical volumes in a volume group. The virtual logical volume appears the same as any one of the logical volumes in the volume group to an external client. Upon receipt of a special data set that must reside in a single logical volume, an attempt is first made to allocate the special data set to one of the logical volumes in the volume group. If that allocation attempt fails, the special data set is allocated to the virtual logical volume. The virtual logical volume may be created only upon the failure to allocate the special data set to one of the logical volumes, and may be destroyed if sufficient space in one of the logical volumes is freed up to transfer the special data set. Creation of the virtual logical volume may be reserved for only critical special data sets whose failure would result in a storage system outage.
摘要:
Various method and system embodiments for facilitating catalog sharing in multiprocessor systems use multiple ECS cache structures to which catalogs are assigned based on an attribute such as SMS storage class or a high level qualifier (HLQ) (e.g. an N-to-1 mapping) or each individual catalog (e.g. a 1-to-1 mapping). When maintenance is performed on an ECS shared catalog, the multiple ECS cache structure requires only those catalogs associated with a particular ECS cache structure be disconnected. Any catalogs in the structure that are not involved in or affected by the maintenance may be temporarily or permanently moved to a different ECS cache structure. As a result, VVDS sharing is only required for those catalogs on which maintenance is being performed or that remain associated with that ECS cache structure during maintenance. This reduces I/O activity to the DASD, and results in a significant overall performance improvement.
摘要:
A method for controlling access to client data by support providers is disclosed herein. In one embodiment, such a method includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted.
摘要:
A method for controlling access to client data by support providers includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted. A corresponding apparatus and computer program product are also described.
摘要:
A method to optimize use of available storage capacity of a plurality of sequential data storage media, wherein the method provides (M) sequential data storage media each comprising a plurality of blockids, where the (i)th sequential data storage medium comprises an (i)th available storage capacity, and where (M) is greater than or equal to 2, and where (i) is greater than or equal to 1 and less than or equal to (M). The method then receives source data comprising a plurality of segments, determines a quantum of data to store, determines if the quantum of data to store is substantially equal to an (i)th available storage capacity. If the quantum of data to store is substantially equal an (i)th available storage capacity, then the method writes the source data to an (i)th sequential data storage medium.
摘要:
Generation of diagnostic information of a computer-implemented system is made early so that the data is closer to the causation of errors or for performance analysis. At least one selected activity of the system is monitored from initiation of the activity, and the monitoring is for successful completion. Early collection of diagnostic information is provided by comparing the time of the activity without successful completion to an initial trigger, where the initial trigger is less than the time period for a time-out for the activity. If the time of the activity without successful completion exceeds the initial trigger, diagnostic information is collected and an initial dump of the diagnostic information is taken. In one example, a notification that the dump of diagnostic information has been taken is directed to the host or diagnostic terminal.
摘要:
A data structure maintained in a computational device stores how many control areas splits have occurred to store a data set, wherein each control area split causes an addition of a single new control area. A command is received to add a new data record to the data set. A determination is made as to whether adding the new data record to the data set will result in a threshold for control area splits to be exceeded. In response to determining that adding the new data record to the data set will result in the threshold for control area splits to be exceeded, creating at least two new control areas in addition to continuing to use one existing control area for storing the data set.
摘要:
A method for identifying records of variable length within a data block containing corrupted data is disclosed herein. In certain embodiments, such a method may include scanning backward from an end of a data block containing variable-length records. The backward scan may proceed, one record at a time, to identify a first span of good (i.e., non-corrupt) records. The method may further include scanning forward from a front of the data block, also proceeding one record at a time, to identify a second span of good records. The method may include identifying a problem region by identifying data that resides between the first span and the second span. The method may also include creating a new record between the first span and the second span that contains the problem region. A corresponding computer program product, apparatus, and system are also disclosed.