摘要:
Methods, and systems for migrating personality of a computing environment from a source machine platform to a target machine platform through a CIM-based system management infrastructure. A system includes: database wherein migration rules of CIM objects between a plurality of platforms are recorded; and migration tool for implementing migration according to the migration rules in the database, which includes: migration rule extractor, CIM object extractor, migration task producer and migration task executor. The extractor extracts CIM objects related to personality of the computing environment from source machine platform according to migration rule extracted from the database by rule extractor, and extracts from the target machine platform objects corresponding to the extracted CIM objects of the source machine platform. The migration task producer generates the migration tasks according to extracted migration rules. The migration task executor executes generated migration tasks on the CIM objects of the target platform.
摘要:
Computer systems in which at least two operating systems coexist independently from each other, and that swap between the operating systems. Provides methods to have at least two operating systems coexist independently of each other and swap the operating systems. A computer system includes a memory allocation component to be called by a power-on self test (POST) routine in order to allocate RAM for the operating systems when the computer system starts up, and backup and restore component to be called by a suspension routine in order to backup and restore the data specific to the operating systems, wherein each of the operating systems can transfer itself to the memory area belonging to itself, turn an allocated memory area into a physical RAM, and call the suspension routine to swap to other operating systems by setting swap parameters. The computer system can swap between operating systems easily and conveniently.
摘要:
A method/system for avoiding software conflicts, with library being divided into layer 1 to layer M and M≧1. The method including the following steps: before a program runs, prescanning calling functions of the binary executable code of the program and called functions that belong to libraries of layer 1 and are individually called by the calling functions of the binary executable code of the program, and if M>1, further prescanning calling functions that belong to libraries of layer 1 to layer M−1 and called functions that belong to libraries of layer 2 to layer M and are individually called by the calling functions that belong to libraries of layer 1 to layer M−1, so as to determine whether there exists any individual conflict between the calling functions and the corresponding called functions; if there exists at least one conflict, storing at least one piece of conflict information individually indicating the at least one conflict; and when the program calls a library directly called by the program, abandoning loading of the library if conflict information correspond to the library has been stored, or loading the library otherwise.