摘要:
A method for maintaining a high availability data transmission and processing environment. A network of clusters is provided. Each cluster of the network includes at least two identical servers. Each cluster of the network is directly connected to at least one other cluster of the network. Each pair of clusters directly connected to each other is characterized by each server in a first cluster of the pair of clusters being directly connected to at least one server in a second cluster of the pair of clusters via a communication link. Provided is a control server adapted to monitor an operational status of the communication link (i.e., the communication link is operational or non-operational). The control server is directly linked to at least one server in each cluster via a communication channel between the control server and the at least one server.
摘要:
A root user identifier of a computing system is disabled. Thereafter, and in response to determining that a problem with the computing system requires root privileges to the computing system to solve, a code patch for installation on the computing system is received from a third party. The code patch is installed on the computing system, resulting in a user identifier temporarily having the root privileges to the computing system. The user identifier is different than the root user identifier is. A password for the user identifier is provided to the third party to permit the third party to solve the problem with the computing system using the root privileges, via the user identifier temporarily having the root privileges to the computing system. The code patch is computer code installable on the computing system.
摘要:
A method include forming an initial bitmap from the de-duplicated data on virtual volumes, sorting discrete blocks according to frequency of occurrence to form a revised bitmap to first include a plurality of most common discrete blocks, creating a physical volume map from the revised bitmap, reviewing, from the physical volume map, an initial virtual volume of the virtual volumes contained on a corresponding original physical volume, to determine whether moving the initial virtual volume to a different physical volume reduces the total number of data blocks in the physical volume map, deleting the initial virtual volume from its corresponding original physical volume and adding the initial virtual volume to the different original physical volume to create a revised physical volume map including revised physical volumes, and writing the revised physical volumes to the target set of physical media using the revised physical volume map.
摘要:
A mechanism is provided for reducing duplicate information. Diagnostic data associated with a new incident that has occurred is received and at least one new incident dump file is created for the new incident that includes some or all of the diagnostic data. The diagnostic data in the at least one new incident dump file is compared to diagnostic data in at least one corresponding preceding incident dump file. Responsive to the at least one new incident dump file comprising diagnostic data that is different from the at least one corresponding preceding incident dump file, at least one comparison dump file is generated that comprises only the differences in the at least one new incident dump file that are not contained in the at least one corresponding preceding incident dump file. A report package that includes the at least one comparison dump file is then transmitted to a support system.
摘要:
A method include forming an initial bitmap from the de-duplicated data on virtual volumes, sorting discrete blocks according to frequency of occurrence to form a revised bitmap to first include a plurality of most common discrete blocks, creating a physical volume map from the revised bitmap, reviewing, from the physical volume map, an initial virtual volume of the virtual volumes contained on a corresponding original physical volume, to determine whether moving the initial virtual volume to a different physical volume reduces the total number of data blocks in the physical volume map, deleting the initial virtual volume from its corresponding original physical volume and adding the initial virtual volume to the different original physical volume to create a revised physical volume map including revised physical volumes, and writing the revised physical volumes to the target set of physical media using the revised physical volume map.
摘要:
A root user identifier of a computing system is disabled. Thereafter, and in response to determining that a problem with the computing system requires root privileges to the computing system to solve, a code patch for installation on the computing system is received from a third party. The code patch is installed on the computing system, resulting in a user identifier temporarily having the root privileges to the computing system. The user identifier is different than the root user identifier is. A password for the user identifier is provided to the third party to permit the third party to solve the problem with the computing system using the root privileges, via the user identifier temporarily having the root privileges to the computing system. The code patch is computer code installable on the computing system.
摘要:
Automated system, method and program for managing a change to a computer program. One or more servers which the changed computer program accesses or uses to perform one or more functions are determined. One or more other computer programs in one or more other servers which access the one or more servers are determined. People responsible for the one or more servers and the one or more other computer programs and/or the one or more other servers that the changed computer program has been changed are notified. Another automated system, method and program for managing a change to a computer program is disclosed. One or more servers which the changed computer program accesses are determined by automatically querying configuration files of the changed computer program. People responsible for the one or more servers are notified that the changed computer program has been changed.
摘要:
A mechanism is provided for reducing duplicate information. Diagnostic data associated with a new incident that has occurred is received and at least one new incident dump file is created for the new incident that includes some or all of the diagnostic data. The diagnostic data in the at least one new incident dump file is compared to diagnostic data in at least one corresponding preceding incident dump file. Responsive to the at least one new incident dump file comprising diagnostic data that is different from the at least one corresponding preceding incident dump file, at least one comparison dump file is generated that comprises only the differences in the at least one new incident dump file that are not contained in the at least one corresponding preceding incident dump file. A report package that includes the at least one comparison dump file is then transmitted to a support system.
摘要:
For forming an initial bitmap from deduplicated data on virtual volumes, discrete blocks are sorted according to frequency of occurrence to form a revised bitmap to first include a plurality of most common discrete blocks. A physical volume map is created from the revised bitmap. An initial virtual volume of the virtual volumes contained on a corresponding original physical volume is reviewed to determine whether moving the initial virtual volume to a different physical volume reduces the total number of data blocks in the physical volume map. The initial virtual volume is deleted from its corresponding original physical volume and added to the different original physical volume to create a revised physical volume map including revised physical volumes. The revised physical volume is written to the target set of physical media using the revised physical volume map.
摘要:
Computer implemented method for determining an amount to bill a first owner of a first application executing in a computer, and a second owner of a second application executing in the computer. The computer receives a request from a remote client to transfer a file to the client. The file is shared by the first and second applications. The client made a prior request to the first application before making the request for the file. A determination is made that the request from the client to transfer the file should be billed to the first owner based on the client's prior request to the first application. The client made the prior request to the first application closer in time, than another prior request from the client to the second application, to the request to transfer the file.