摘要:
Adaptively pre-fetching data includes collecting a first set of statistics based on a number of avoidable read-misses in which data exists that is prior to data being read, collecting a second set of statistics based on a number of avoidable read-misses in which data exists that follows data being read, and collecting a third set of statistics based on said first and second sets of statistics. On the basis of the second set of statistics, a pre-fetch technique is selected from a first technique that pre-fetches data following data being read and a second technique that pre-fetches data before and following the data being read. The first and third set of statistics may be used to determine when to pre-fetch data.
摘要:
A facility for providing an IM mixed mode operation by utilizing both page mode IM and session based IM jointly in the same IM conversation is provided. The facility initiates an IM conversation between an originating user registered at an originating device and a remote user registered at a plurality of devices initially in page mode. Subsequent to discovering the identity of a remote device used by the remote user to initially reply to the IM conversation, the facility converts the IM conversation from page mode IM to session based IM.
摘要:
Described are techniques used in connection with determining one or more pairs of logical volumes (LVs) to increase the performance of storage devices by swapping these LVs. Future performance of the anticipated potential LV swap is determined in accordance with past performance data collected prior to actually performing the swap. Data is gathered for a first arrangement of data storage devices for a period of time. A proposed modification to the first arrangement, such as swapping LVs of data on one or more storage devices, is produced. A performance estimation is produced using past performance data for the one or more pairs of proposed LV swap candidates. The search for pairs of LV candidates is determined using an iterative technique in which earlier iterations attempt to produce candidates from a smaller, more focused pool of possible LVs. The pool of LVs is expanded upon subsequent iterations if earlier iterations using heuristics providing for a more focused search are unsuccessful.
摘要:
Data units are prefetched into a cache memory by executing a first prefetch task to prefetch a first prefetch series of data units from off-cache. A first prefetch operation is executed to prefetch and store a first selected set of data units. Decisions are made about the first prefetch task, subsequent prefetch operations and prefetch tasks based on in-cache data units associated with the first prefetch task and on other data units that are read from off-cache but that are not associated with the first prefetch task. A determination is made whether an additional data unit that is read from an off-cache logical location is a first prefetch series member. If so, it is associated with the first prefetch task, and, for decision making, is treated as having been prefetched into cache in accordance with the first prefetch task.
摘要:
Described are techniques for managing a sequential stream in a data storage system. A front-end component receives a plurality of data operations for a plurality of data portions and determines that the plurality of data portions are associated with a sequential stream. Each of the plurality of data portions of the sequential stream is associated with a sequential stream identifier, and a position indicator uniquely identifying a position of said each data portion in said sequential stream. Each of the plurality of data portions that is prefetched is associated with a remaining prefetched identifier and included in a prefetched chunk of data portions. The front-end component uses information about said sequential stream in connection with managing said sequential stream. The information includes the sequential stream identifier, one or more position indicators, and one or more remaining prefetched identifiers.
摘要:
Described are techniques for determining a cache slot. A set of criteria for each of a plurality of families is received. A received data operation associated with a first of said plurality of families is obtained. It is determined, in accordance with the criteria associated with the received data operation, whether to allocate a cache slot in the cache for the received data operation. The criteria for the first family includes a minimum value and a maximum value used in determining a cache partition size range for the first family. The maximum value is used in determining a maximum cache partition size allowable for the first family.
摘要:
A method and system for identifying whether an electronic communication is likely to be unwanted by the recipient is provided. A trust system relies on a trust provider, such as a sending domain, to indicate whether an electronic communication is likely to be unwanted. The sending domain may assign its trust level to the electronic communications based on various factors. Upon receiving the electronic communication and the trust level assigned by the sending domain, the receiving domain may determine whether to forward the electronic communication to the recipient based on the trust level. If a sending domain consistently provides trust levels that are accurate assessments of whether electronic communications are unwanted, then the receiving domain learns to trust the trust levels assigned by the sending domain. In contrast, if the assigned trust levels are not accurate, then the receiving domain learns not to trust the sending domain and may discard all message from the receiving domain without forwarding them to the recipients.
摘要:
A system and method for determining whether activity graphs (hereinafter “graphs”) for logical volumes of data storage are correlated. A number of correlation criteria are applied to the graphs, including the area ratio criteria determines whether an area ratio described by the graph is at least as great as a predetermined value; the peak ratio criteria indicates that one graph is correlated to another graph if a peak ratio described by the two graphs is as large as a predetermined peak ratio value; and the sharp peak criteria indicates in the event that one graph is correlated to another graphs having at least one coincidental peak. Different combinations of all or some of the disclosed correlation criteria and the traditional correlation coefficient may be used to determine whether graphs of logical volumes are correlated, the level of correlation, and how “strong” of a correlation exists between the graphs.
摘要:
A method and system for identifying whether an electronic communication is likely to be unwanted by the recipient is provided. A trust system relies on a trust provider, such as a sending domain, to indicate whether an electronic communication is likely to be unwanted. The sending domain may assign its trust level to the electronic communications based on various factors. Upon receiving the electronic communication and the trust level assigned by the sending domain, the receiving domain may determine whether to forward the electronic communication to the recipient based on the trust level. If a sending domain consistently provides trust levels that are accurate assessments of whether electronic communications are unwanted, then the receiving domain learns to trust the trust levels assigned by the sending domain. In contrast, if the assigned trust levels are not accurate, then the receiving domain learns not to trust the sending domain and may discard all message from the receiving domain without forwarding them to the recipients.
摘要:
A method and system for handling otherwise rejectable messages (e.g., out-of-order messages) sent using a communication protocol (e.g., SIP) is provided. When a message is received at a protocol layer of a client system, the message (or at least its information) is passed to a higher layer (e.g., an application layer) even if it is otherwise rejectable at the protocol layer. In this way, the protocol layer provides an application layer with the option of determining whether to discard the otherwise rejectable message. In some embodiments, the protocol layer may automatically acknowledge acceptance of the message, while in other embodiments, the protocol layer may wait to receive an indication from the higher layer to determine whether to acknowledge or negatively acknowledge acceptance of the message.