摘要:
Provided is a method, system and program for storing data for later retrieval and for transfer within a storage hierarchy. A data storage subsystem stores both individual user files and also managed files, each managed file comprising an aggregation of multiple user files. After receiving user files from a client station, the subsystem stores user files in a retrieval storage pool to facilitate file retrieval. Criteria are subsequently applied to the user files stored in the retrieval storage pool to delete low or lower priority files from the retrieval storage pool. In addition, user files are aggregated in managed files for transfer to another location within the storage hierarchy.
摘要:
Disclosed is a server having a plurality of clients coupled to the server at client nodes, and coupled to a plurality of receivers. Events, which may range from a successful completion message to a major error alert, may be generated relating to the server or to the client nodes. A method is disclosed for dynamically selectively distributing the events to particular ones of the receivers, in response to a selective enabling/disabling of the events to each receiver. The method with respect to client nodes comprises: upon opening a session of a client node, the selectively enabled events/receivers relating to the client node are determined. Upon the selective enabling/disabling occurring during the session of the client node, the determined selectively enabled events/receivers relating to the client node are dynamically updated. Then, upon occurrence of an event relating to a client node, the event is distributed to ones of the receivers having been selectively enabled for the event in the determining and the dynamically updating steps. Additionally, classes of events or wild card groups of client nodes may be enabled.
摘要:
Provided is a method, system and program for storing data for later retrieval and for transfer within a storage hierarchy. A data storage subsystem stores both individual user files and also managed files, each managed file comprising an aggregation of multiple user files. After receiving user files from a client station, the subsystem stores user files in a retrieval storage pool to facilitate file retrieval. Criteria are subsequently applied to the user files stored in the retrieval storage pool to delete low or lower priority files from the retrieval storage pool. In addition, user files are aggregated in managed files for transfer to another location within the storage hierarchy.
摘要:
Disclosed is a method, embodiable in computer readable program code in a network resource, for dynamically changing a network protocol management information base (MIB) module, the protocol requiring predetermined fixed fields in the MIB module. The method comprises inserting a variable in one of the predetermined fixed fields in the MIB module, and providing a first path for dynamically setting a reference to a script which substitutes for the variable, the referenced script defining a user option for operating the network resource. The referenced script operation may sense a value related to the network resource. A second path is provided to the script reference, whereby a query on the second path activates the script operation to provide the value at the MIB, and the provided value is delivered on the second path. The referenced script operation may additionally comprise conducting an operation of the network resource, and the value relates to the operation of the network resource. The second path provided to the script reference allows a query on the second path to activate the script operation and to provide the value at the MIB.
摘要:
Provided is a method, system and program for storing data for later retrieval and for transfer within a storage hierarchy. A data storage subsystem stores both individual user files and also managed files, each managed file comprising an aggregation of multiple user files. After receiving user files from a client station, the subsystem stores user files in a retrieval storage pool to facilitate file retrieval. Criteria are subsequently applied to the user files stored in the retrieval storage pool to delete low or lower priority files from the retrieval storage pool. In addition, user files are aggregated in managed files for transfer to another location within the storage hierarchy.
摘要:
Provided is a method for managing retention of stored objects, comprising: receiving a modification request with respect to an attribute or archive policy for an object; determining whether an attribute modification protection flag or setting is set in response to the modification request requesting to modify the attribute for the object; allowing the modification of the attribute object in response to determining that the attribute modification protection flag or setting is not set; determining whether a protection retention mechanism or setting is set in response to the modification request requesting to modify the archive policy for the object; and allowing the modification of the archive policy for the object in response to determining that the protection retention mechanism or setting is not set.
摘要:
Provided are a method, system, and program for managing retention of stored objects. A modification request is received with respect to a stored object. A determination is made as to whether a retention protection mechanism is set and a storage policy associated with the stored object is processed to determine whether the stored object has expired according to the storage policy in response to determining that the retention protection mechanism is set. The modification request is allowed to proceed in response to determining that the stored object has expired.
摘要:
A copy method is disclosed to provide a duplicate copy of source data where the duplicate copy is consistent with the source data as of a designated time. The method includes creating a copy-on-write relationship between specified source data and an original image cache, utilizing an application outboard of the designated host application to copy all items of source data and their associated locations to a secondary data object without regard to whether the items source data have been updated since creating the copy-on-write relationship, and copying a specified amount of contents of the original image cache to the secondary data object. The specified amount includes contents of the original image cache as of completion of the utilizing operation. In addition, the method includes permitting copy-on-write relationship to continue during the utilizing operation and during at least part of the copying operation.
摘要:
Any node in a multi-node processing system may be employed to route commands to a selected group of one or more nodes, and initiate local command execution if permitted by local security provisions. The system includes multiple application nodes interconnected by a network, and one or more administrator nodes each coupled to at least one application node. Each administrator node has assigned security credentials. The process starts when the administrator node transmits input to one of the application nodes (an “entry” node). The input includes a command and routing information specifying a list of desired application nodes (“destination” nodes) to execute the command. In response to this input, the entry node transmits messages to all destination nodes to (1) log-in to the destination nodes as the originating administrator node, and (2) request the destination nodes to execute the command. Consulting locally stored security information, each destination node determines whether the entry node's log-in should succeed. If so, the destination node consults locally stored authority information to determine whether the initiating administrator node has authority to execute the requested command. If so, the destination node executes the command. The destination node sends the entry node a response representing the outcome of command execution. The entry node organizes such responses and provides a representative output.
摘要:
Disclosed are a method, embodiable in computer readable program code, and a system for providing server-to-server event logging. A server-to-server event message is generated including 1) an event identifier, 2) any text insert pertinent to the event message, and 3) a source trail indicating the origin and history of the event, the source trail comprising an identifier of any server forwarding the event, each identifier separated by a special character, so that the origin and any subsequently transmitting servers may be known. Further, the source trail of a received server-to-server event message is parsed to determine each identifier in the source trail, and the event message transmitted to a receiving server only if the receiving server identifier is absent from the parsed source trail, thus preventing any loops which might cause the event to be repeated. Additionally, a receiving server has a listing of events by event identifier with corresponding text messages in the text language of the receiving server. The received event identifier is found in the listing, and the receiving server logs the event, using the identified text message in the listing in the text language of the receiving server, and employing the text inserts.