摘要:
A method include forming an initial bitmap from the de-duplicated data on virtual volumes, sorting discrete blocks according to frequency of occurrence to form a revised bitmap to first include a plurality of most common discrete blocks, creating a physical volume map from the revised bitmap, reviewing, from the physical volume map, an initial virtual volume of the virtual volumes contained on a corresponding original physical volume, to determine whether moving the initial virtual volume to a different physical volume reduces the total number of data blocks in the physical volume map, deleting the initial virtual volume from its corresponding original physical volume and adding the initial virtual volume to the different original physical volume to create a revised physical volume map including revised physical volumes, and writing the revised physical volumes to the target set of physical media using the revised physical volume map.
摘要:
A database of action plans carried out by a service provider is provided that stores the action plan as a series of action codes as well as the associated information such as error code, error type and whether the action plan resolved the problem. When an error occurs and is reported automatically, the database is searched for the error that occurred. Action plans as well as success rates are collected with most probable solutions being presented first. Each action code in the action plan corresponds to a particular point in maintenance documentation that is stored, e.g., on a management console, at the customer location. After reporting the error, the management console receives action plans for the error based on actual service reports as well as action plans suggested by documentation. When a service representative accesses the management console for information about the error, appropriate documentation is presented for each step in the action plan, allowing the service representative to follow along the suggested action plans and associated maintenance documentation onsite.
摘要:
A method, computer program product, and computer system for client-server communication based on delta transfer. A server of the computer system receives from a client a HTTP request for transferring a current image page, compares the current image page and a saved image page which is stored on the server for the client. Based on the comparison, the server of the computer system constructs delta contents between the current image page and the saved image page. The server of the computer system updates the saved image page on the server with the current image page and sends a HTTP response comprising the delta contents to the client.
摘要:
A method for performing wellness checking on a plurality of distributed networks of independent subsystems, the plurality of distributed networks including a plurality of first nodes and a plurality of second nodes, the method comprising: allowing initialization of a wellness check on the plurality second nodes; allowing each of the plurality of first nodes to send a request to corresponding plurality of second nodes; commencing a first wellness check for checking a first wellness status of each of the plurality of second nodes; checking for the physical network connection of each of the plurality of second nodes; sending wellness status with a determined severity level of each of the plurality of second nodes to corresponding plurality of first nodes; establishing errors of each of the plurality of second nodes; commencing a second wellness check for re-checking a second wellness status of each of the plurality of second nodes with the established errors; sending a notification identifying the established errors; and scheduling a third wellness check for re-checking a third wellness status of each of the plurality of second nodes after a predetermined period of time.
摘要:
A method and system are disclosed for automated context-sensitive message organization. The method in the disclosed embodiments substantially includes determining a logical correlation between a message identifier and a message file. The method may also include scanning a source code file to identify a reference to the message identifier and the associated context of the reference. In a further embodiment, the method includes analyzing source code file and message file based on a context of the identified reference in accordance with a predetermined analysis rule. Additionally, the method may include generating an output based on a result of the analysis.
摘要:
A method for autodiscovery of components on a network without requiring that the components have built-in knowledge of the discovery method is set forth. The method uses a combination of attempting broadcast discovery as well as listening to network traffic. More specifically, a substantially continuously executing program is executed on a management console of the network that performs the broadcast and listening functions. The autodiscovery uses these methods in combination to identify systems that are included within the VTS system.
摘要:
A method and apparatus are provided for maintaining cache coherency of object management data in a computer system. The computer system is configured with a bit mask to represent changes in object management data. All changes in an object are reflected by setting an associated bit in the bit mask. A cache update of object management data is limited to the bit(s) set in the bit mask.
摘要:
A method for providing failure notifications to dependent nodes within a computer network is disclosed. A first node monitors data traffic within a computer network. If the data traffic includes data exchanged between the first node and a second node, the first node adds the second node to a list of interested nodes stored within the first node. If the first node experiences an error, the first node generates an error notification packet that includes a hop limit value that corresponds to a pre-defined level of nodes within the computer network that the error notification packet may propagate. The first node sends the error notification packet with the hop limit value to the second node and other nodes within the list of interested nodes. After receiving the error notification packet, the second node decrements the hop limit, performs one or more actions, and if the hop limit value is greater than zero, the second node also forwards the error notification packet to each node within its list of interested nodes.
摘要:
Real-time notification is provided of an event which has occurred in a computer-related device. Upon the occurrence of an event, a record of the event is stored in a buffer, such as a Really Simple Syndication buffer, associated with the device. The buffer is updated based on indications and other events noted by a CIM agent in the device. One of a series of regular requests is received from an open browser window on a user computer, the request inquiring about any record of the event stored in the buffer. In response to the request, the record of the event is transmitted to an HTML event element in a page of the browser window whereby the record of the event is inserted into the HTML element and displayed in the browser window.
摘要:
A plurality of network addresses identify a source device in the network. A plurality of subscriptions for the source device to receive messages from the target devices each identify one of the target devices and one of the source network addresses the identified target device uses to communicate with the source device. Upon detecting a change to a changed network address, a determination is made of a subscription indicating the changed network address and the target device indicated in the determined subscription is determined. A selection is made of a selected network address, other than the changed network address is selected. If the selected network address can be used to communicate between the determined target device and the source device, then the selected network address is used and provided to the determined target device.