摘要:
Provided are a computer program product, system, and method for modifying memory space allocation for inactive tasks. Information is maintained on computational resources consumed by tasks running in the computer system allocated memory space in the memory. The information on the computational resources consumed by the tasks is used to determine inactive tasks of the tasks. The allocation of the memory space allocated to at least one of the determined inactive tasks is modified.
摘要:
Provided are a computer program product, system, and method for allowing writes to complete without obtaining a write lock to a file. A lock is provided to a first request, comprising a read or write request, to access the file. A second write request is received while the first request maintains the lock. A temporary file associated with the file for the second write request is created. The second write request is controlled to write to the temporary file while the lock is held by the first request. In response to completing the first request, the lock is granted to the second write request to write the data in the temporary file to the file.
摘要:
Provided are a computer program product, system, and method for managing traces to capture data for memory regions in a memory. A trace includes a monitor parameter used by a trace procedure to monitor data in a memory device. A frequency is determined at which the trace procedure monitors the memory device. The trace procedure is invoked at the determined frequency to perform trace procedure operations comprising determining a region in the memory device according to the monitor parameter and copying data in the determined region to trace data in a data space.
摘要:
Providing a computer program product, system, and method for logging updates to monitored data sets in a storage. A request is received to monitor changes to a monitored data set comprising one of the data sets in the storage. A determination is made of tracks in the storage in which the data set is stored. The determined tracks are indicated in monitored tracks. Updates to the storage are received and a determination is made as to whether the updates are for the monitored tracks. The updates are logged in response to determining that updates are for the monitored tracks. A determination is made of new tracks added to the monitored data set and the determined new tracks are indicated in the monitored tracks.
摘要:
According to one embodiment, a test system includes a data collection module adapted for collecting data from a test system, a storage module adapted for storing the collected data in an organized format, the data including problem data, associated configuration information, associated performance information, and activity data, an analysis module adapted for analyzing the collected data to define at least two activity zones by correlating the problem data, the associated configuration information, the associated performance information, and the activity data, the at least two activity zones including a safe zone where the test system operates normally and a danger zone where the test system is susceptible to operational problems, and an adjustment module adapted for adjusting available resources and/or workload of the test system to cause the test system to operate in the danger zone thereby increasing a likelihood of fault occurrence for testing purposes.
摘要:
In one embodiment, a system includes a critical partitioned dataset extended (PDSE) stored to memory of the system; logic adapted for protecting the critical PDSE by creating a copy of the critical PDSE, referred to as a PDSE copy; logic adapted for providing a critical dataset redundancy (CDR) task with exclusive access to the PDSE copy; logic adapted for providing a replacement critical PDSE by redirecting corralled connections to the PDSE copy; logic adapted for protecting the replacement critical PDSE by creating a copy of the replacement critical PDSE, referred to as a replacement PDSE copy; and logic adapted for providing the CDR task with exclusive access to the replacement PDSE copy.
摘要:
An approach to selectively recording trace data. The approach sifts through process control and state data to store data that is most relevant to aiding debugging while reducing the overall amount of data that is stored in a trace data set by a trace facility. The approach may involve initiating a trace operation for the software component and, for each resource of the software component, determining whether the resource is currently in use. For those resources in use, the current state of the resource is compared with the previous state of the resource. If the current state has changed, the current state is written to the trace data set. If the resource is not in use, or the current state has not changed, no entry is made to the trace data set. The approach may also analyze users to determine which resources the users are holding and/or waiting for.
摘要:
An approach to allocating storage that has track managed storage and cylinder managed storage. The approach involves receiving a request to allocate a data set for new data and determining if the size of the new data exceeds a breakpoint value. The size of the new data may be determined by allocating a buffer data set that is the size of the breakpoint value, and writing the new data to the buffer data set. If the new data only partially fills the buffer data set, then the size of the new data is smaller than the breakpoint value. If the new data overfills the buffer data set, then the size of the new data set is larger than the breakpoint value. New data that is larger than the breakpoint value is automatically stored in cylinder managed storage, while new data that is smaller than the breakpoint value is automatically stored in track managed storage.
摘要:
A method is provided for isolating errors which occur when code supplied by independent software vendors (ISV code) interacts with code supplied by a primary vendor (host code). Code suspected of containing ISV code with host code is executed. If the results are in error, the code is scanned and then compared with a master host code. Any differences are stored in a delta file, including locations in the host code where ISV code hooks into the host code. The code is then modified to by-pass the hooks to ISV code to generate a side-executable code and both codes are executed and the results are compared. A lack of substantial difference in the results is indicative that the ISV code adversely affects the host code while a difference between the results is indicative of an error in the modified code.
摘要:
A method for controlling access to client data by support providers is disclosed herein. In one embodiment, such a method includes initiating a session on a server computer in response to receipt of a request for assistance from a client, the session having client data associated therewith. A session key is generated for the session. The session key includes a session identifier and a support provider identifier corresponding to an assignee. The session key may further include a client identifier corresponding to the client. Requests to access the client data include an assignee key including a session identifier and a support provider identifier, and potentially a client identifier if needed. The assignee key is compared to the session key. If correspondence is found between the identifiers in the assignee key and the session key, access is granted. A corresponding apparatus and computer program product are also disclosed herein.