摘要:
Systems and computer program products are provided for optimizing selection of files for deletion from one or more data storage devices to free up a predetermined amount of space in the one or more data storage devices. A method includes analyzing an effective space occupied by each file of a plurality of files in the one or more data storage devices, identifying, from the plurality of files, one or more data blocks making up a file to free up the predetermined amount of space based on the analysis of the effective space of each file of the plurality of files, selecting one or more of the plurality of files as one or more candidate files for deletion, based on the identified one or more data blocks, and deleting the one or more candidate files for deletion from the one or more data storage devices.
摘要:
An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security requirements require that the computer system identifies the current storage locations of files along with the files' respective security levels. Files containing changed security levels due to the changed security requirements are relocated to storage locations clustered with storage locations containing files of the same security level. In another embodiment, the computer system receives a file having a certain security level, identifies current storage locations of files with the files' respective security levels, and finally allocates the new file to a storage location clustered with storage locations containing files of the same security level.
摘要:
Exemplary embodiments for increased in-line deduplication efficiency in a computing environment are provided. In one embodiment, by way of example only, hash values are calculated in nth iterations on data samples from fixed size data chunks extracted from an object requested for in-line deduplication. For each of the nth iterations, the calculated hash values for the data samples from the fixed size data chunks are matched in an nth hash index table with a corresponding hash value of existing objects in storage. The nth hash index table is exited upon detecting a mismatch during the matching. The mismatch is determined to be a unique object and is stored. A hash value for the object is calculated. A master hash index table is updated with the calculated hash value for the object and the calculated hash values for the unique object.
摘要:
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session ticket from the client that includes a security protocol mounting selection. The file server decrypts the client's user's encrypted private key, and then decrypts the requested encrypted file system using the private key. In turn, the file server sends the decrypted file system to the client over a secure channel, which is based upon the security protocol mounting selection. In one embodiment, a key distribution center server receives a request from the client for the client's user to access the encrypted file system at the file server. The key distribution center server retrieves an intermediate key; includes the intermediate key in a session ticket; and sends the session ticket to the client.
摘要:
A method, computer program product, and system for rebalancing database table space in a hybrid storage environment of heterogeneous storage units used by a plurality of users to store associated extents. The storage units are ranked according to various performance characteristics such as IOPS rates and power consumption, and the users are ranked according to various characteristics such as whether they have subscribed to standard or premium storage subscriptions. Upon detection of a change in the relative ranking of the users or the storage units, the stored extents are mapped, characterized as standard or priority extents, and redistributed across the storage units if needed to provide higher ranked storage for priority extents and for higher ranked users.
摘要:
According to one embodiment of the present disclosure, a method and technique is disclosed for maintaining a network connection during transfer of the workload from a global environment of a logical partition to a workload partition of the logical partition and during any subsequent transfer(s).
摘要:
The present invention, in one embodiment, aids the user during composition of emails/letters/documents with assistance for correct gender usage. In one example application, first an automated user information look-up process is initiated over centralized databases using the proper names mentioned in the composition. Once matches are found, gender-related information is retrieved and the composer is assisted with gender recognition tools while composing gender-sensitive statements. When mismatches between proper nouns and the corresponding adjectives/pronouns are found, this method proceeds with highlighting or otherwise flagging the mismatching words. Upon right-clicking the highlighted words, the user is given suggestions for the most probably correct options. Examples of the idea explained in this invention can be incorporated in existing software/systems of email/document editor/composers.
摘要:
A computer implemented method, data processing system, and computer program product for securing confidential and sensitive information displayed on a computer monitor. Confidential information is displayed in an application on a computer, wherein the application is registered in a registration list comprising a list of all applications containing confidential information. A monitoring device is used to monitor an area around a user of the computer for a possible intruder. Responsive to detecting a possible intruder, an action for securing the confidential information displayed on the computer is identified based on the applications specified in the registration list. The action is then executed.
摘要:
A multi-display system and method supporting differing accessibility feature selection provides a suitable display for a user with limited visual acuity, while providing a second display having a different accessibility feature set to a second user. An application or operating system checks selected accessibility features and display settings corresponding to each graphical display device and generates multiple graphical outputs in conformity with program output and the corresponding accessibility features and display settings for each device. One graphical display may be a personal computer display and the other a projector, so that an accessible desktop can be presented to the presenter, while the presentation can be shown with a desired set of attributes. The operating system may support the above-described operation by generating the multiple display outputs from the accessibility settings and a single program output. Alternatively, an application can generate two display outputs in conformity with accessibility selections.
摘要:
Exemplary method, system, and computer program product embodiments for increased in-line deduplication efficiency in a computing environment are provided. In one embodiment, by way of example only hash values are calculated in nth iterations for accumulative data chunks extracted from an object requested for in-line deduplication. For each of the nth iterations, the calculated hash values for the accumulative data chunks are matched in a nth hash index table with a corresponding hash value of existing objects in storage. The nth hash index table is exited upon detecting a mismatch during the matching. The mismatch is determined to be a unique object and is stored. A hash value for the object is calculated. A master hash index table is updated with the calculated hash value for the object and the calculated hash values for the unique object. Additional system and computer program product embodiments are disclosed and provide related advantages.