摘要:
Control of the discard of data from cache during backup of the data. In a computer-implemented system comprising primary data storage; cache; backup data storage; and at least one processor, the processor is configured to identify data stored in the primary data storage for backup to the backup data storage, where the identified data is placed in the cache in the form of portions of the data, and where the portions of data are to be backed up from the cache to the backup storage. Upon backup of each portion of the identified data from the cache to the backup storage, the processor marks the backed up portion of the identified data for discard from the cache. Thus, the backed up data is discarded from the cache right away, lessening cache pollution.
摘要:
A method for software processing includes obtaining change information, which records changes that have been performed in respective locations in software code. The change information is processed so as to assign to at least some of the locations respective priorities, which are indicative of respective likelihoods that the locations contain program faults. The at least some of the locations are presented to a user in accordance with the assigned priorities.
摘要:
An apparatus and a method to allocate device adapter bandwidth, where that device adapter is disposed in an information storage and retrieval system capable of communicating with one or more host computers, and where that device adapter interconnects a data cache with information storage devices. The data storage and retrieval system receives a plurality of requests from the host computers to read information from, or to write information to, information storage devices. The method determines a read/write request ratio and a non-volatile storage utilization ratio. The method allocates device adapter bandwidth based upon the read/write request ratio and/or the non-volatile storage utilization ratio.
摘要:
A method for transferring data over a network operating in accordance with a protocol, such as the ESCON protocol, that supports a limited logical address range includes establishing a logical path over the network from a host or other device to a second device, such as a storage system, using path logical addresses within the given logical address range. A virtual path is created over the logical path to carry the data from the source to the target, wherein the target logical subsystem has a subsystem logical address which is outside the given logical address range.